mirror of
				https://github.com/yuezk/GlobalProtect-openconnect.git
				synced 2025-05-20 07:26:58 -04:00 
			
		
		
		
	Compare commits
	
		
			13 Commits
		
	
	
		
			v2.3.11
			...
			gpauth_win
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | 3175d1083a | ||
|  | fe3d3df662 | ||
|  | 2f90b73683 | ||
|  | 5186e80c6f | ||
|  | 4ff1c1dc1f | ||
|  | c1427040f6 | ||
|  | a7ad02acb6 | ||
|  | b188d61be1 | ||
|  | ec85e857bc | ||
|  | d37ccafdc2 | ||
|  | 0c9b8e6c63 | ||
|  | 8f8ad466f4 | ||
|  | 0f67be465b | 
| @@ -1,4 +1,4 @@ | |||||||
| FROM ubuntu:18.04 | FROM ubuntu:22.04 | ||||||
|  |  | ||||||
| ARG USERNAME=vscode | ARG USERNAME=vscode | ||||||
| ARG USER_UID=1000 | ARG USER_UID=1000 | ||||||
| @@ -7,8 +7,9 @@ ARG USER_GID=$USER_UID | |||||||
| ENV RUSTUP_HOME=/usr/local/rustup \ | ENV RUSTUP_HOME=/usr/local/rustup \ | ||||||
|     CARGO_HOME=/usr/local/cargo \ |     CARGO_HOME=/usr/local/cargo \ | ||||||
|     PATH=/usr/local/cargo/bin:$PATH \ |     PATH=/usr/local/cargo/bin:$PATH \ | ||||||
|     RUST_VERSION=1.75.0 |     RUST_VERSION=1.80.0 | ||||||
|  |  | ||||||
|  | # Install common dependencies | ||||||
| RUN set -eux; \ | RUN set -eux; \ | ||||||
|   apt-get update; \ |   apt-get update; \ | ||||||
|   apt-get install -y --no-install-recommends \ |   apt-get install -y --no-install-recommends \ | ||||||
| @@ -18,34 +19,50 @@ RUN set -eux; \ | |||||||
|     gnupg \ |     gnupg \ | ||||||
|     git \ |     git \ | ||||||
|     less \ |     less \ | ||||||
|     software-properties-common \ |     software-properties-common | ||||||
|     # Tauri dependencies |  | ||||||
|     libwebkit2gtk-4.0-dev build-essential wget libssl-dev libgtk-3-dev libayatana-appindicator3-dev librsvg2-dev; \ |  | ||||||
|   # Install openconnect |  | ||||||
|   add-apt-repository ppa:yuezk/globalprotect-openconnect; \ |  | ||||||
|   apt-get update; \ |  | ||||||
|   apt-get install -y openconnect libopenconnect-dev; \ |  | ||||||
| # Create a non-root user | # Create a non-root user | ||||||
|  | RUN set -eux; \ | ||||||
|   groupadd --gid $USER_GID $USERNAME; \ |   groupadd --gid $USER_GID $USERNAME; \ | ||||||
|   useradd --uid $USER_UID --gid $USER_GID -m $USERNAME; \ |   useradd --uid $USER_UID --gid $USER_GID -m $USERNAME; \ | ||||||
|   echo $USERNAME ALL=\(root\) NOPASSWD:ALL > /etc/sudoers.d/$USERNAME; \ |   echo $USERNAME ALL=\(root\) NOPASSWD:ALL > /etc/sudoers.d/$USERNAME; \ | ||||||
|   chmod 0440 /etc/sudoers.d/$USERNAME; \ |   chmod 0440 /etc/sudoers.d/$USERNAME | ||||||
|   # Install Node.js |  | ||||||
|   mkdir -p /etc/apt/keyrings; \ |  | ||||||
|   curl -fsSL https://deb.nodesource.com/gpgkey/nodesource-repo.gpg.key | gpg --dearmor -o /etc/apt/keyrings/nodesource.gpg; \ |  | ||||||
|   echo "deb [signed-by=/etc/apt/keyrings/nodesource.gpg] https://deb.nodesource.com/node_16.x nodistro main" | tee /etc/apt/sources.list.d/nodesource.list; \ |  | ||||||
|   apt-get update; \ |  | ||||||
|   apt-get install -y nodejs; \ |  | ||||||
|   corepack enable; \ |  | ||||||
|   # Install diff-so-fancy |  | ||||||
|   npm install -g diff-so-fancy; \ |  | ||||||
| # Install Rust | # Install Rust | ||||||
|  | RUN set -eux; \ | ||||||
|   curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --default-toolchain $RUST_VERSION; \ |   curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --default-toolchain $RUST_VERSION; \ | ||||||
|   chown -R $USERNAME:$USERNAME $RUSTUP_HOME $CARGO_HOME; \ |   chown -R $USERNAME:$USERNAME $RUSTUP_HOME $CARGO_HOME; \ | ||||||
|   rustup --version; \ |   rustup --version; \ | ||||||
|   cargo --version; \ |   cargo --version; \ | ||||||
|   rustc --version |   rustc --version | ||||||
|  |  | ||||||
|  | # Install Node.js | ||||||
|  | RUN set -eux; \ | ||||||
|  |   curl -fsSL https://deb.nodesource.com/setup_20.x | bash -; \ | ||||||
|  |   apt-get install -y nodejs; \ | ||||||
|  |   corepack enable; \ | ||||||
|  |   # Install diff-so-fancy | ||||||
|  |   npm install -g diff-so-fancy | ||||||
|  |  | ||||||
|  | # Install openconnect | ||||||
|  | RUN set -eux; \ | ||||||
|  |   add-apt-repository ppa:yuezk/globalprotect-openconnect; \ | ||||||
|  |   apt-get update; \ | ||||||
|  |   apt-get install -y openconnect libopenconnect-dev | ||||||
|  |  | ||||||
|  | # Tauri dependencies | ||||||
|  | RUN set -eux; \ | ||||||
|  |   apt-get install -y \ | ||||||
|  |     libwebkit2gtk-4.1-dev \ | ||||||
|  |     build-essential \ | ||||||
|  |     curl \ | ||||||
|  |     wget \ | ||||||
|  |     file \ | ||||||
|  |     libxdo-dev \ | ||||||
|  |     libssl-dev \ | ||||||
|  |     libayatana-appindicator3-dev \ | ||||||
|  |     librsvg2-dev | ||||||
|  |  | ||||||
| USER $USERNAME | USER $USERNAME | ||||||
|  |  | ||||||
| # Install Oh My Zsh | # Install Oh My Zsh | ||||||
|   | |||||||
							
								
								
									
										109
									
								
								.github/workflows/build.yaml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										109
									
								
								.github/workflows/build.yaml
									
									
									
									
										vendored
									
									
								
							| @@ -14,6 +14,11 @@ on: | |||||||
|       - release/* |       - release/* | ||||||
|     tags: |     tags: | ||||||
|       - v*.*.* |       - v*.*.* | ||||||
|  |  | ||||||
|  | concurrency: | ||||||
|  |   group: ${{ github.workflow }}-${{ github.ref }} | ||||||
|  |   cancel-in-progress: true | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   # Include arm64 if ref is a tag |   # Include arm64 if ref is a tag | ||||||
|   setup-matrix: |   setup-matrix: | ||||||
| @@ -24,7 +29,8 @@ jobs: | |||||||
|       - name: Set up matrix |       - name: Set up matrix | ||||||
|         id: set-matrix |         id: set-matrix | ||||||
|         run: | |         run: | | ||||||
|           if [[ "${{ github.ref }}" == "refs/tags/"* ]]; then |           # Set the matrix to include arm64 if the ref is a tag or is the dev branch | ||||||
|  |           if [[ "${{ github.ref }}" == "refs/tags/"* || "${{ github.ref }}" == "refs/heads/dev" ]]; then | ||||||
|             echo 'matrix=[{"runner": "ubuntu-latest", "arch": "amd64"}, {"runner": "arm64", "arch": "arm64"}]' >> $GITHUB_OUTPUT |             echo 'matrix=[{"runner": "ubuntu-latest", "arch": "amd64"}, {"runner": "arm64", "arch": "arm64"}]' >> $GITHUB_OUTPUT | ||||||
|           else |           else | ||||||
|             echo 'matrix=[{"runner": "ubuntu-latest", "arch": "amd64"}]' >> $GITHUB_OUTPUT |             echo 'matrix=[{"runner": "ubuntu-latest", "arch": "amd64"}]' >> $GITHUB_OUTPUT | ||||||
| @@ -34,18 +40,20 @@ jobs: | |||||||
|     runs-on: ubuntu-latest |     runs-on: ubuntu-latest | ||||||
|     needs: [setup-matrix] |     needs: [setup-matrix] | ||||||
|     steps: |     steps: | ||||||
|     - uses: pnpm/action-setup@v2 |     - uses: pnpm/action-setup@v4 | ||||||
|       with: |       with: | ||||||
|         version: 8 |         version: 9 | ||||||
|     - name: Prepare workspace |     - name: Prepare workspace | ||||||
|       run: rm -rf source && mkdir source |       run: rm -rf source && mkdir -p source/artifacts | ||||||
|  |  | ||||||
|     - name: Checkout GlobalProtect-openconnect |     - name: Checkout GlobalProtect-openconnect | ||||||
|       uses: actions/checkout@v3 |       uses: actions/checkout@v4 | ||||||
|       with: |       with: | ||||||
|         token: ${{ secrets.GH_PAT }} |         token: ${{ secrets.GH_PAT }} | ||||||
|         repository: yuezk/GlobalProtect-openconnect |         repository: yuezk/GlobalProtect-openconnect | ||||||
|         ref: ${{ github.ref }} |         ref: ${{ github.ref }} | ||||||
|         path: source/gp |         path: source/gp | ||||||
|  |  | ||||||
|     - name: Create tarball |     - name: Create tarball | ||||||
|       run: | |       run: | | ||||||
|         cd source/gp |         cd source/gp | ||||||
| @@ -54,13 +62,69 @@ jobs: | |||||||
|           touch SNAPSHOT |           touch SNAPSHOT | ||||||
|         fi |         fi | ||||||
|         make tarball |         make tarball | ||||||
|  |  | ||||||
|  |         mv -v .build/tarball/*.tar.gz ../artifacts/ | ||||||
|  |  | ||||||
|  |     - name: Generate RPM spec file | ||||||
|  |       env: | ||||||
|  |         RELEASE_TAG: ${{ github.ref == 'refs/heads/dev' && 'snapshot' || github.ref_name }} | ||||||
|  |       run: | | ||||||
|  |         cd source/gp | ||||||
|  |  | ||||||
|  |         make init-rpm \ | ||||||
|  |           REVISION='1%{?dist}' \ | ||||||
|  |           RPM_SOURCE=https://github.com/yuezk/GlobalProtect-openconnect/releases/download/${RELEASE_TAG}/%{name}-%{version}.tar.gz | ||||||
|  |  | ||||||
|  |         mv -v .build/rpm/*.spec ../artifacts/ | ||||||
|  |  | ||||||
|     - name: Upload tarball |     - name: Upload tarball | ||||||
|       uses: actions/upload-artifact@v3 |       uses: actions/upload-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         name: artifact-source |         name: artifact-source | ||||||
|         if-no-files-found: error |         if-no-files-found: error | ||||||
|         path: | |         path: | | ||||||
|           source/gp/.build/tarball/*.tar.gz |           source/artifacts/* | ||||||
|  |  | ||||||
|  |   tarball-offline: | ||||||
|  |     if: ${{ github.ref == 'refs/heads/dev' || startsWith(github.ref, 'refs/tags/') }} | ||||||
|  |     runs-on: ubuntu-latest | ||||||
|  |     needs: | ||||||
|  |     - tarball | ||||||
|  |     steps: | ||||||
|  |     - uses: pnpm/action-setup@v4 | ||||||
|  |       with: | ||||||
|  |         version: 9 | ||||||
|  |  | ||||||
|  |     - name: Prepare workspace | ||||||
|  |       run: rm -rf source-offline && mkdir source-offline | ||||||
|  |  | ||||||
|  |     - name: Download tarball | ||||||
|  |       uses: actions/download-artifact@v4 | ||||||
|  |       with: | ||||||
|  |         name: artifact-source | ||||||
|  |         path: source-offline | ||||||
|  |  | ||||||
|  |     - name: Create offline tarball | ||||||
|  |       run: | | ||||||
|  |         cd source-offline | ||||||
|  |  | ||||||
|  |         offline_tarball=$(basename *.tar.gz .tar.gz).offline.tar.gz | ||||||
|  |  | ||||||
|  |         # Extract the tarball | ||||||
|  |         tar -xzf *.tar.gz | ||||||
|  |  | ||||||
|  |         cd */ | ||||||
|  |         make tarball OFFLINE=1 | ||||||
|  |  | ||||||
|  |         # Rename the tarball to .offline.tar.gz | ||||||
|  |         mv -v .build/tarball/*.tar.gz ../$offline_tarball | ||||||
|  |  | ||||||
|  |     - name: Upload offline tarball | ||||||
|  |       uses: actions/upload-artifact@v4 | ||||||
|  |       with: | ||||||
|  |         path: source-offline/*.offline.tar.gz | ||||||
|  |         name: artifact-source-offline | ||||||
|  |         if-no-files-found: error | ||||||
|  |  | ||||||
|   build-gp: |   build-gp: | ||||||
|     needs: |     needs: | ||||||
| @@ -79,7 +143,7 @@ jobs: | |||||||
|         rm -rf build-gp-${{ matrix.package }} |         rm -rf build-gp-${{ matrix.package }} | ||||||
|         mkdir -p build-gp-${{ matrix.package }} |         mkdir -p build-gp-${{ matrix.package }} | ||||||
|     - name: Download tarball |     - name: Download tarball | ||||||
|       uses: actions/download-artifact@v3 |       uses: actions/download-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         name: artifact-source |         name: artifact-source | ||||||
|         path: build-gp-${{ matrix.package }} |         path: build-gp-${{ matrix.package }} | ||||||
| @@ -87,18 +151,18 @@ jobs: | |||||||
|       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin |       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin | ||||||
|     - name: Build ${{ matrix.package }} package in Docker |     - name: Build ${{ matrix.package }} package in Docker | ||||||
|       run: | |       run: | | ||||||
|         docker run --rm \ |         docker run --pull=always --rm \ | ||||||
|           -v $(pwd)/build-gp-${{ matrix.package }}:/${{ matrix.package }} \ |           -v $(pwd)/build-gp-${{ matrix.package }}:/${{ matrix.package }} \ | ||||||
|           yuezk/gpdev:${{ matrix.package }}-builder |           yuezk/gpdev:${{ matrix.package }}-builder-tauri2 | ||||||
|     - name: Install ${{ matrix.package }} package in Docker |     - name: Install ${{ matrix.package }} package in Docker | ||||||
|       run: | |       run: | | ||||||
|         docker run --rm \ |         docker run --pull=always --rm \ | ||||||
|           -e GPGUI_INSTALLED=0 \ |           -e GPGUI_INSTALLED=0 \ | ||||||
|           -v $(pwd)/build-gp-${{ matrix.package }}:/${{ matrix.package }} \ |           -v $(pwd)/build-gp-${{ matrix.package }}:/${{ matrix.package }} \ | ||||||
|           yuezk/gpdev:${{ matrix.package }}-builder \ |           yuezk/gpdev:${{ matrix.package }}-builder-tauri2 \ | ||||||
|           bash install.sh |           bash install.sh | ||||||
|     - name: Upload ${{ matrix.package }} package |     - name: Upload ${{ matrix.package }} package | ||||||
|       uses: actions/upload-artifact@v3 |       uses: actions/upload-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         name: artifact-gp-${{ matrix.package }}-${{ matrix.os.arch }} |         name: artifact-gp-${{ matrix.package }}-${{ matrix.os.arch }} | ||||||
|         if-no-files-found: error |         if-no-files-found: error | ||||||
| @@ -114,20 +178,20 @@ jobs: | |||||||
|     runs-on: ${{ matrix.os.runner }} |     runs-on: ${{ matrix.os.runner }} | ||||||
|     name: build-gpgui (${{ matrix.os.arch }}) |     name: build-gpgui (${{ matrix.os.arch }}) | ||||||
|     steps: |     steps: | ||||||
|     - uses: pnpm/action-setup@v2 |     - uses: pnpm/action-setup@v4 | ||||||
|       with: |       with: | ||||||
|         version: 8 |         version: 9 | ||||||
|     - name: Prepare workspace |     - name: Prepare workspace | ||||||
|       run: rm -rf gpgui-source && mkdir gpgui-source |       run: rm -rf gpgui-source && mkdir gpgui-source | ||||||
|     - name: Checkout GlobalProtect-openconnect |     - name: Checkout GlobalProtect-openconnect | ||||||
|       uses: actions/checkout@v3 |       uses: actions/checkout@v4 | ||||||
|       with: |       with: | ||||||
|         token: ${{ secrets.GH_PAT }} |         token: ${{ secrets.GH_PAT }} | ||||||
|         repository: yuezk/GlobalProtect-openconnect |         repository: yuezk/GlobalProtect-openconnect | ||||||
|         ref: ${{ github.ref }} |         ref: ${{ github.ref }} | ||||||
|         path: gpgui-source/gp |         path: gpgui-source/gp | ||||||
|     - name: Checkout gpgui@${{ github.ref_name }} |     - name: Checkout gpgui@${{ github.ref_name }} | ||||||
|       uses: actions/checkout@v3 |       uses: actions/checkout@v4 | ||||||
|       with: |       with: | ||||||
|         token: ${{ secrets.GH_PAT }} |         token: ${{ secrets.GH_PAT }} | ||||||
|         repository: yuezk/gpgui |         repository: yuezk/gpgui | ||||||
| @@ -141,15 +205,15 @@ jobs: | |||||||
|       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin |       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin | ||||||
|     - name: Build gpgui in Docker |     - name: Build gpgui in Docker | ||||||
|       run: | |       run: | | ||||||
|         docker run --rm -v $(pwd)/gpgui-source:/gpgui yuezk/gpdev:gpgui-builder |         docker run --pull=always --rm -v $(pwd)/gpgui-source:/gpgui yuezk/gpdev:gpgui-builder-tauri2 | ||||||
|     - name: Install gpgui in Docker |     - name: Install gpgui in Docker | ||||||
|       run: | |       run: | | ||||||
|         cd gpgui-source |         cd gpgui-source | ||||||
|         tar -xJf *.bin.tar.xz |         tar -xJf *.bin.tar.xz | ||||||
|         docker run --rm -v $(pwd):/gpgui yuezk/gpdev:gpgui-builder \ |         docker run --pull=always --rm -v $(pwd):/gpgui yuezk/gpdev:gpgui-builder-tauri2 \ | ||||||
|           bash -c "cd /gpgui/gpgui_*/ && ./gpgui --version" |           bash -c "cd /gpgui/gpgui_*/ && ./gpgui --version" | ||||||
|     - name: Upload gpgui |     - name: Upload gpgui | ||||||
|       uses: actions/upload-artifact@v3 |       uses: actions/upload-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         name: artifact-gpgui-${{ matrix.os.arch }} |         name: artifact-gpgui-${{ matrix.os.arch }} | ||||||
|         if-no-files-found: error |         if-no-files-found: error | ||||||
| @@ -162,6 +226,7 @@ jobs: | |||||||
|     runs-on: ubuntu-latest |     runs-on: ubuntu-latest | ||||||
|     needs: |     needs: | ||||||
|       - tarball |       - tarball | ||||||
|  |       - tarball-offline | ||||||
|       - build-gp |       - build-gp | ||||||
|       - build-gpgui |       - build-gpgui | ||||||
|  |  | ||||||
| @@ -170,7 +235,7 @@ jobs: | |||||||
|       run: rm -rf gh-release && mkdir gh-release |       run: rm -rf gh-release && mkdir gh-release | ||||||
|  |  | ||||||
|     - name: Checkout GlobalProtect-openconnect |     - name: Checkout GlobalProtect-openconnect | ||||||
|       uses: actions/checkout@v3 |       uses: actions/checkout@v4 | ||||||
|       with: |       with: | ||||||
|         token: ${{ secrets.GH_PAT }} |         token: ${{ secrets.GH_PAT }} | ||||||
|         repository: yuezk/GlobalProtect-openconnect |         repository: yuezk/GlobalProtect-openconnect | ||||||
| @@ -178,7 +243,7 @@ jobs: | |||||||
|         path: gh-release/gp |         path: gh-release/gp | ||||||
|  |  | ||||||
|     - name: Download all artifacts |     - name: Download all artifacts | ||||||
|       uses: actions/download-artifact@v3 |       uses: actions/download-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         path: gh-release/gp/.build/artifacts |         path: gh-release/gp/.build/artifacts | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										55
									
								
								.github/workflows/publish.yaml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										55
									
								
								.github/workflows/publish.yaml
									
									
									
									
										vendored
									
									
								
							| @@ -47,43 +47,56 @@ jobs: | |||||||
|     if: ${{ inputs.ppa }} |     if: ${{ inputs.ppa }} | ||||||
|     runs-on: ubuntu-latest |     runs-on: ubuntu-latest | ||||||
|     steps: |     steps: | ||||||
|     - uses: pnpm/action-setup@v2 |     - uses: pnpm/action-setup@v4 | ||||||
|       with: |       with: | ||||||
|         version: 8 |         version: 9 | ||||||
|     - name: Prepare workspace |     - name: Prepare workspace | ||||||
|       run: rm -rf publish-ppa && mkdir publish-ppa |       run: rm -rf publish-ppa && mkdir publish-ppa | ||||||
|     - name: Download ${{ inputs.tag }} source code |     - name: Download ${{ inputs.tag }} offline source code | ||||||
|       uses: robinraju/release-downloader@v1.9 |       env: | ||||||
|       with: |         GH_TOKEN: ${{ secrets.GH_PAT }} | ||||||
|         token: ${{ secrets.GH_PAT }} |       run: | | ||||||
|         tag: ${{ inputs.tag }} |         gh -R yuezk/GlobalProtect-openconnect \ | ||||||
|         fileName: globalprotect-openconnect-*.tar.gz |           release download ${{ inputs.tag }} \ | ||||||
|         tarBall: false |           --pattern '*.offline.tar.gz' \ | ||||||
|         zipBall: false |           --dir publish-ppa | ||||||
|         out-file-path: publish-ppa |     - name: Patch the source code | ||||||
|     - name: Make the offline tarball |  | ||||||
|       run: | |       run: | | ||||||
|         cd publish-ppa |         cd publish-ppa | ||||||
|         tar -xf globalprotect-openconnect-*.tar.gz |  | ||||||
|         cd globalprotect-openconnect-*/ |  | ||||||
|  |  | ||||||
|         make tarball OFFLINE=1 |         # Rename the source tarball without the offline suffix | ||||||
|  |         mv -v *.tar.gz $(basename *.tar.gz .offline.tar.gz).tar.gz | ||||||
|  |  | ||||||
|  |         # Extract the source tarball | ||||||
|  |         tar -xzf *.tar.gz | ||||||
|  |  | ||||||
|  |         # Prepare the debian directory with custom files | ||||||
|  |         cd globalprotect-openconnect-*/ | ||||||
|  |  | ||||||
|         # Prepare the debian directory with custom files |         # Prepare the debian directory with custom files | ||||||
|         mkdir -p .build/debian |         mkdir -p .build/debian | ||||||
|         sed 's/@RUST@/rust-all(>=1.70)/g' packaging/deb/control.in > .build/debian/control |  | ||||||
|         sed 's/@OFFLINE@/1/g' packaging/deb/rules.in > .build/debian/rules |         cp -v packaging/deb/control.in .build/debian/control | ||||||
|         cp packaging/deb/postrm .build/debian/postrm |         cp -v packaging/deb/rules.in .build/debian/rules | ||||||
|  |         cp -v packaging/deb/compat .build/debian/compat | ||||||
|  |         cp -v packaging/deb/postrm .build/debian/postrm | ||||||
|  |  | ||||||
|  |         sed -i "s/@RUST@/cargo-1.80/g" .build/debian/control | ||||||
|  |         sed -i "s/@OFFLINE@/1/g" .build/debian/rules | ||||||
|  |         sed -i "s/@BUILD_GUI@/1/g" .build/debian/rules | ||||||
|  |         sed -i "s/@RUST_VERSION@/1.80/g" .build/debian/rules | ||||||
|  |  | ||||||
|     - name: Publish to PPA |     - name: Publish to PPA | ||||||
|       uses: yuezk/publish-ppa-package@v2 |       uses: yuezk/publish-ppa-package@gp | ||||||
|       with: |       with: | ||||||
|         repository: "yuezk/globalprotect-openconnect" |         repository: "yuezk/globalprotect-openconnect" | ||||||
|         gpg_private_key: ${{ secrets.PPA_GPG_PRIVATE_KEY }} |         gpg_private_key: ${{ secrets.PPA_GPG_PRIVATE_KEY }} | ||||||
|         gpg_passphrase: ${{ secrets.PPA_GPG_PASSPHRASE }} |         gpg_passphrase: ${{ secrets.PPA_GPG_PASSPHRASE }} | ||||||
|         tarball: publish-ppa/globalprotect-openconnect-*/.build/tarball/*.tar.gz |         tarball: publish-ppa/globalprotect-openconnect-*.tar.gz | ||||||
|         debian_dir: publish-ppa/globalprotect-openconnect-*/.build/debian |         debian_dir: publish-ppa/globalprotect-openconnect-*/.build/debian | ||||||
|         deb_email: "k3vinyue@gmail.com" |         deb_email: "k3vinyue@gmail.com" | ||||||
|         deb_fullname: "Kevin Yue" |         deb_fullname: "Kevin Yue" | ||||||
|         extra_ppa: "yuezk/globalprotect-openconnect liushuyu-011/rust-bpo-1.75" |         extra_ppa: "yuezk/globalprotect-openconnect liushuyu-011/rust-updates-1.80" | ||||||
|  |         # Ubuntu 18.04 and 20.04 are excluded because tauri2 no longer supports them | ||||||
|  |         excluded_series: "bionic focal" | ||||||
|         revision: ${{ inputs.revision }} |         revision: ${{ inputs.revision }} | ||||||
|   | |||||||
							
								
								
									
										29
									
								
								.github/workflows/release.yaml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								.github/workflows/release.yaml
									
									
									
									
										vendored
									
									
								
							| @@ -96,33 +96,34 @@ jobs: | |||||||
|     steps: |     steps: | ||||||
|     - name: Prepare workspace |     - name: Prepare workspace | ||||||
|       run: rm -rf build-${{ matrix.package }} && mkdir -p build-${{ matrix.package }} |       run: rm -rf build-${{ matrix.package }} && mkdir -p build-${{ matrix.package }} | ||||||
|  |  | ||||||
|     - name: Download ${{ inputs.tag }} source code |     - name: Download ${{ inputs.tag }} source code | ||||||
|       uses: robinraju/release-downloader@v1.9 |       env: | ||||||
|       with: |         GH_TOKEN: ${{ secrets.GH_PAT }} | ||||||
|         token: ${{ secrets.GH_PAT }} |       run: | | ||||||
|         tag: ${{ inputs.tag }} |         gh -R yuezk/GlobalProtect-openconnect \ | ||||||
|         fileName: globalprotect-openconnect-*.tar.gz |           release download ${{ inputs.tag }} \ | ||||||
|         tarBall: false |           --pattern '*[^offline].tar.gz' \ | ||||||
|         zipBall: false |           --dir build-${{ matrix.package }} | ||||||
|         out-file-path: build-${{ matrix.package }} |  | ||||||
|     - name: Docker Login |     - name: Docker Login | ||||||
|       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin |       run: echo ${{ secrets.DOCKER_HUB_TOKEN }} | docker login -u ${{ secrets.DOCKER_HUB_USERNAME }} --password-stdin | ||||||
|     - name: Build ${{ matrix.package }} package in Docker |     - name: Build ${{ matrix.package }} package in Docker | ||||||
|       run: | |       run: | | ||||||
|         docker run --rm \ |         docker run --pull=always --rm \ | ||||||
|           -v $(pwd)/build-${{ matrix.package }}:/${{ matrix.package }} \ |           -v $(pwd)/build-${{ matrix.package }}:/${{ matrix.package }} \ | ||||||
|           -e INCLUDE_GUI=1 \ |           -e INCLUDE_GUI=1 \ | ||||||
|           yuezk/gpdev:${{ matrix.package }}-builder |           yuezk/gpdev:${{ matrix.package }}-builder-tauri2 | ||||||
|  |  | ||||||
|     - name: Install ${{ matrix.package }} package in Docker |     - name: Install ${{ matrix.package }} package in Docker | ||||||
|       run: | |       run: | | ||||||
|         docker run --rm \ |         docker run --pull=always --rm \ | ||||||
|           -v $(pwd)/build-${{ matrix.package }}:/${{ matrix.package }} \ |           -v $(pwd)/build-${{ matrix.package }}:/${{ matrix.package }} \ | ||||||
|           yuezk/gpdev:${{ matrix.package }}-builder \ |           yuezk/gpdev:${{ matrix.package }}-builder-tauri2 \ | ||||||
|           bash install.sh |           bash install.sh | ||||||
|  |  | ||||||
|     - name: Upload ${{ matrix.package }} package |     - name: Upload ${{ matrix.package }} package | ||||||
|       uses: actions/upload-artifact@v3 |       uses: actions/upload-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         name: artifact-${{ matrix.os }}-${{ matrix.package }} |         name: artifact-${{ matrix.os }}-${{ matrix.package }} | ||||||
|         if-no-files-found: error |         if-no-files-found: error | ||||||
| @@ -138,7 +139,7 @@ jobs: | |||||||
|     - name: Prepare workspace |     - name: Prepare workspace | ||||||
|       run: rm -rf gh-release && mkdir gh-release |       run: rm -rf gh-release && mkdir gh-release | ||||||
|     - name: Download artifact |     - name: Download artifact | ||||||
|       uses: actions/download-artifact@v3 |       uses: actions/download-artifact@v4 | ||||||
|       with: |       with: | ||||||
|         path: gh-release |         path: gh-release | ||||||
|     - name: Update release |     - name: Update release | ||||||
|   | |||||||
							
								
								
									
										3
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @@ -8,3 +8,6 @@ | |||||||
| .cargo | .cargo | ||||||
| .build | .build | ||||||
| SNAPSHOT | SNAPSHOT | ||||||
|  |  | ||||||
|  | # Tauri generated files | ||||||
|  | gen | ||||||
|   | |||||||
							
								
								
									
										14
									
								
								.vscode/c_cpp_properties.json
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								.vscode/c_cpp_properties.json
									
									
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,14 @@ | |||||||
|  | { | ||||||
|  |   "configurations": [ | ||||||
|  |     { | ||||||
|  |       "name": "Mac", | ||||||
|  |       "includePath": ["/opt/homebrew/include"], | ||||||
|  |       "macFrameworkPath": ["/System/Library/Frameworks", "/Library/Frameworks"], | ||||||
|  |       "intelliSenseMode": "macos-clang-x64", | ||||||
|  |       "compilerPath": "/usr/bin/clang", | ||||||
|  |       "cStandard": "c17", | ||||||
|  |       "cppStandard": "c++17" | ||||||
|  |     } | ||||||
|  |   ], | ||||||
|  |   "version": 4 | ||||||
|  | } | ||||||
							
								
								
									
										11
									
								
								.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										11
									
								
								.vscode/settings.json
									
									
									
									
										vendored
									
									
								
							| @@ -23,8 +23,12 @@ | |||||||
|         "gpgui", |         "gpgui", | ||||||
|         "gpservice", |         "gpservice", | ||||||
|         "hidpi", |         "hidpi", | ||||||
|  |         "Ivars", | ||||||
|         "jnlp", |         "jnlp", | ||||||
|         "LOGNAME", |         "LOGNAME", | ||||||
|  |         "NSHTTPURL", | ||||||
|  |         "NSURL", | ||||||
|  |         "objc", | ||||||
|         "oneshot", |         "oneshot", | ||||||
|         "openconnect", |         "openconnect", | ||||||
|         "pkcs", |         "pkcs", | ||||||
| @@ -55,9 +59,16 @@ | |||||||
|         "Vite", |         "Vite", | ||||||
|         "vpnc", |         "vpnc", | ||||||
|         "vpninfo", |         "vpninfo", | ||||||
|  |         "webbrowser", | ||||||
|         "wmctrl", |         "wmctrl", | ||||||
|         "XAUTHORITY", |         "XAUTHORITY", | ||||||
|         "yuezk" |         "yuezk" | ||||||
|     ], |     ], | ||||||
|     "rust-analyzer.cargo.features": "all", |     "rust-analyzer.cargo.features": "all", | ||||||
|  |     "files.associations": { | ||||||
|  |         "unistd.h": "c", | ||||||
|  |         "utsname.h": "c", | ||||||
|  |         "vpn.h": "c", | ||||||
|  |         "openconnect.h": "c" | ||||||
|  |     }, | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										3607
									
								
								Cargo.lock
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										3607
									
								
								Cargo.lock
									
									
									
										generated
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										42
									
								
								Cargo.toml
									
									
									
									
									
								
							
							
						
						
									
										42
									
								
								Cargo.toml
									
									
									
									
									
								
							| @@ -1,11 +1,17 @@ | |||||||
| [workspace] | [workspace] | ||||||
| resolver = "2" | resolver = "2" | ||||||
|  |  | ||||||
| members = ["crates/*", "apps/gpclient", "apps/gpservice", "apps/gpauth", "apps/gpgui-helper/src-tauri"] | members = [ | ||||||
|  |   "crates/*", | ||||||
|  |   "apps/gpclient", | ||||||
|  |   "apps/gpservice", | ||||||
|  |   "apps/gpauth", | ||||||
|  |   "apps/gpgui-helper/src-tauri", | ||||||
|  | ] | ||||||
|  |  | ||||||
| [workspace.package] | [workspace.package] | ||||||
| rust-version = "1.70" | rust-version = "1.80" | ||||||
| version = "2.3.9" | version = "2.4.3" | ||||||
| authors = ["Kevin Yue <k3vinyue@gmail.com>"] | authors = ["Kevin Yue <k3vinyue@gmail.com>"] | ||||||
| homepage = "https://github.com/yuezk/GlobalProtect-openconnect" | homepage = "https://github.com/yuezk/GlobalProtect-openconnect" | ||||||
| edition = "2021" | edition = "2021" | ||||||
| @@ -13,46 +19,44 @@ license = "GPL-3.0" | |||||||
|  |  | ||||||
| [workspace.dependencies] | [workspace.dependencies] | ||||||
| anyhow = "1.0" | anyhow = "1.0" | ||||||
| base64 = "0.21" | base64 = "0.22" | ||||||
| clap = { version = "4.4.2", features = ["derive"] } | clap = { version = "4", features = ["derive"] } | ||||||
|  | clap-verbosity-flag = "3" | ||||||
| ctrlc = "3.4" | ctrlc = "3.4" | ||||||
| directories = "5.0" | directories = "5.0" | ||||||
| dns-lookup = "2.0.4" | dns-lookup = "2.0.4" | ||||||
| env_logger = "0.10" | env_logger = "0.11" | ||||||
| is_executable = "1.0" | is_executable = "1.0" | ||||||
| log = "0.4" | log = "0.4" | ||||||
| regex = "1" | regex = "1" | ||||||
| reqwest = { version = "0.11", features = ["native-tls-vendored", "json"] } | reqwest = { version = "0.12", features = ["native-tls", "json"] } | ||||||
| openssl = "0.10" | openssl = "0.10" | ||||||
| pem = "3" | pem = "3" | ||||||
| roxmltree = "0.18" | roxmltree = "0.20" | ||||||
| serde = { version = "1.0", features = ["derive"] } | serde = { version = "1.0", features = ["derive"] } | ||||||
| serde_json = "1.0" | serde_json = "1.0" | ||||||
| sysinfo = "0.29" | sysinfo = "0.33" | ||||||
| tempfile = "3.8" | tempfile = "3.8" | ||||||
| tokio = { version = "1", features = ["full"] } | tokio = { version = "1" } | ||||||
| tokio-util = "0.7" | tokio-util = "0.7" | ||||||
| url = "2.4" | url = "2.4" | ||||||
| urlencoding = "2.1.3" | urlencoding = "2.1.3" | ||||||
| axum = "0.7" | axum = "0.8" | ||||||
| futures = "0.3" | futures = "0.3" | ||||||
| futures-util = "0.3" | futures-util = "0.3" | ||||||
| tokio-tungstenite = "0.20.1" | uzers = "0.12" | ||||||
| uzers = "0.11" |  | ||||||
| whoami = "1" | whoami = "1" | ||||||
| thiserror = "1" | thiserror = "2" | ||||||
| redact-engine = "0.1" | redact-engine = "0.1" | ||||||
| compile-time = "0.2" | compile-time = "0.2" | ||||||
| serde_urlencoded = "0.7" | serde_urlencoded = "0.7" | ||||||
| md5 = "0.7" | md5 = "0.7" | ||||||
| sha256 = "1" | sha256 = "1" | ||||||
| which="6" | which = "7" | ||||||
|  |  | ||||||
| # Tauri dependencies | # Tauri dependencies | ||||||
| tauri = { version = "1.5" } | tauri = { version = "2" } | ||||||
| specta = "=2.0.0-rc.1" | specta = "=2.0.0-rc.20" | ||||||
| specta-macros = "=2.0.0-rc.1" |  | ||||||
| rspc = { version = "1.0.0-rc.5", features = ["tauri"] } |  | ||||||
|  |  | ||||||
| [profile.release] | [profile.release] | ||||||
| opt-level = 'z'   # Optimize for size | opt-level = 'z'   # Optimize for size | ||||||
|   | |||||||
							
								
								
									
										53
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										53
									
								
								Makefile
									
									
									
									
									
								
							| @@ -4,15 +4,21 @@ OFFLINE ?= 0 | |||||||
| BUILD_FE ?= 1 | BUILD_FE ?= 1 | ||||||
| INCLUDE_GUI ?= 0 | INCLUDE_GUI ?= 0 | ||||||
| CARGO ?= cargo | CARGO ?= cargo | ||||||
|  | RUST_VERSION = 1.80 | ||||||
|  |  | ||||||
| VERSION = $(shell $(CARGO) metadata --no-deps --format-version 1 | jq -r '.packages[0].version') | VERSION = $(shell $(CARGO) metadata --no-deps --format-version 1 | jq -r '.packages[0].version') | ||||||
| REVISION ?= 1 | REVISION ?= 1 | ||||||
|  | RPM_SOURCE ?= %{name}.tar.gz | ||||||
|  |  | ||||||
| PPA_REVISION ?= 1 | PPA_REVISION ?= 1 | ||||||
| PKG_NAME = globalprotect-openconnect | PKG_NAME = globalprotect-openconnect | ||||||
| PKG = $(PKG_NAME)-$(VERSION) | PKG = $(PKG_NAME)-$(VERSION) | ||||||
| SERIES ?= $(shell lsb_release -cs) | SERIES ?= $(shell lsb_release -cs) | ||||||
| PUBLISH ?= 0 | PUBLISH ?= 0 | ||||||
|  |  | ||||||
|  | # Indicates whether to build the GUI components | ||||||
|  | BUILD_GUI ?= 1 | ||||||
|  |  | ||||||
| export DEBEMAIL = k3vinyue@gmail.com | export DEBEMAIL = k3vinyue@gmail.com | ||||||
| export DEBFULLNAME = Kevin Yue | export DEBFULLNAME = Kevin Yue | ||||||
| export SNAPSHOT = $(shell test -f SNAPSHOT && echo "true" || echo "false") | export SNAPSHOT = $(shell test -f SNAPSHOT && echo "true" || echo "false") | ||||||
| @@ -42,7 +48,7 @@ clean-tarball: | |||||||
|  |  | ||||||
| # Create a tarball, include the cargo dependencies if OFFLINE is set to 1 | # Create a tarball, include the cargo dependencies if OFFLINE is set to 1 | ||||||
| tarball: clean-tarball | tarball: clean-tarball | ||||||
| 	if [ $(BUILD_FE) -eq 1 ]; then \ | 	if [ $(BUILD_GUI) -eq 1 ] && [ $(BUILD_FE) -eq 1 ]; then \ | ||||||
| 		echo "Building frontend..."; \ | 		echo "Building frontend..."; \ | ||||||
| 		cd apps/gpgui-helper && pnpm install && pnpm build; \ | 		cd apps/gpgui-helper && pnpm install && pnpm build; \ | ||||||
| 	fi | 	fi | ||||||
| @@ -80,13 +86,13 @@ build: download-gui build-fe build-rs | |||||||
| # Install and build the frontend | # Install and build the frontend | ||||||
| # If OFFLINE is set to 1, skip it | # If OFFLINE is set to 1, skip it | ||||||
| build-fe: | build-fe: | ||||||
| 	if [ $(OFFLINE) -eq 1 ] || [ $(BUILD_FE) -eq 0 ]; then \ | 	if [ $(BUILD_GUI) -eq 0 ] || [ $(OFFLINE) -eq 1 ] || [ $(BUILD_FE) -eq 0 ]; then \ | ||||||
| 		echo "Skipping frontend build (OFFLINE=1 or BUILD_FE=0)"; \ | 		echo "Skipping frontend build (BUILD_GUI=0 or OFFLINE=1 or BUILD_FE=0)"; \ | ||||||
| 	else \ | 	else \ | ||||||
| 		cd apps/gpgui-helper && pnpm install && pnpm build; \ | 		cd apps/gpgui-helper && pnpm install && pnpm build; \ | ||||||
| 	fi | 	fi | ||||||
|  |  | ||||||
| 	if [ ! -d apps/gpgui-helper/dist ]; then \ | 	if [ $(BUILD_GUI) -eq 1 ] && [ ! -d apps/gpgui-helper/dist ]; then \ | ||||||
| 		echo "Error: frontend build failed"; \ | 		echo "Error: frontend build failed"; \ | ||||||
| 		exit 1; \ | 		exit 1; \ | ||||||
| 	fi | 	fi | ||||||
| @@ -96,8 +102,13 @@ build-rs: | |||||||
| 		tar -xJf vendor.tar.xz; \ | 		tar -xJf vendor.tar.xz; \ | ||||||
| 	fi | 	fi | ||||||
|  |  | ||||||
| 	$(CARGO) build $(CARGO_BUILD_ARGS) -p gpclient -p gpservice -p gpauth | 	# Only build the GUI components if BUILD_GUI is set to 1 | ||||||
| 	$(CARGO) build $(CARGO_BUILD_ARGS) -p gpgui-helper --features "tauri/custom-protocol" | 	if [ $(BUILD_GUI) -eq 1 ]; then \ | ||||||
|  | 		$(CARGO) build $(CARGO_BUILD_ARGS) -p gpclient -p gpservice -p gpauth; \ | ||||||
|  | 		$(CARGO) build $(CARGO_BUILD_ARGS) -p gpgui-helper --features "tauri/custom-protocol"; \ | ||||||
|  | 	else \ | ||||||
|  | 		$(CARGO) build $(CARGO_BUILD_ARGS) -p gpclient -p gpservice -p gpauth --no-default-features; \ | ||||||
|  | 	fi | ||||||
|  |  | ||||||
| clean: | clean: | ||||||
| 	$(CARGO) clean | 	$(CARGO) clean | ||||||
| @@ -111,12 +122,20 @@ install: | |||||||
| 	install -Dm755 target/release/gpclient $(DESTDIR)/usr/bin/gpclient | 	install -Dm755 target/release/gpclient $(DESTDIR)/usr/bin/gpclient | ||||||
| 	install -Dm755 target/release/gpauth $(DESTDIR)/usr/bin/gpauth | 	install -Dm755 target/release/gpauth $(DESTDIR)/usr/bin/gpauth | ||||||
| 	install -Dm755 target/release/gpservice $(DESTDIR)/usr/bin/gpservice | 	install -Dm755 target/release/gpservice $(DESTDIR)/usr/bin/gpservice | ||||||
| 	install -Dm755 target/release/gpgui-helper $(DESTDIR)/usr/bin/gpgui-helper |  | ||||||
|  | 	# Install the GUI components if BUILD_GUI is set to 1 | ||||||
|  | 	if [ $(BUILD_GUI) -eq 1 ]; then \ | ||||||
|  | 		install -Dm755 target/release/gpgui-helper $(DESTDIR)/usr/bin/gpgui-helper; \ | ||||||
|  | 	fi | ||||||
|  |  | ||||||
| 	if [ -f .build/gpgui/gpgui_*/gpgui ]; then \ | 	if [ -f .build/gpgui/gpgui_*/gpgui ]; then \ | ||||||
| 		install -Dm755 .build/gpgui/gpgui_*/gpgui $(DESTDIR)/usr/bin/gpgui; \ | 		install -Dm755 .build/gpgui/gpgui_*/gpgui $(DESTDIR)/usr/bin/gpgui; \ | ||||||
| 	fi | 	fi | ||||||
|  |  | ||||||
|  | 	# Install the disconnect hooks | ||||||
|  | 	install -Dm755 packaging/files/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down | ||||||
|  | 	install -Dm755 packaging/files/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook | ||||||
|  |  | ||||||
| 	install -Dm644 packaging/files/usr/share/applications/gpgui.desktop $(DESTDIR)/usr/share/applications/gpgui.desktop | 	install -Dm644 packaging/files/usr/share/applications/gpgui.desktop $(DESTDIR)/usr/share/applications/gpgui.desktop | ||||||
| 	install -Dm644 packaging/files/usr/share/icons/hicolor/scalable/apps/gpgui.svg $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | 	install -Dm644 packaging/files/usr/share/icons/hicolor/scalable/apps/gpgui.svg $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | ||||||
| 	install -Dm644 packaging/files/usr/share/icons/hicolor/32x32/apps/gpgui.png $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | 	install -Dm644 packaging/files/usr/share/icons/hicolor/32x32/apps/gpgui.png $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | ||||||
| @@ -133,6 +152,9 @@ uninstall: | |||||||
| 	rm -f $(DESTDIR)/usr/bin/gpgui-helper | 	rm -f $(DESTDIR)/usr/bin/gpgui-helper | ||||||
| 	rm -f $(DESTDIR)/usr/bin/gpgui | 	rm -f $(DESTDIR)/usr/bin/gpgui | ||||||
|  |  | ||||||
|  | 	rm -f $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down | ||||||
|  | 	rm -f $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook | ||||||
|  |  | ||||||
| 	rm -f $(DESTDIR)/usr/share/applications/gpgui.desktop | 	rm -f $(DESTDIR)/usr/share/applications/gpgui.desktop | ||||||
| 	rm -f $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | 	rm -f $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | ||||||
| 	rm -f $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | 	rm -f $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | ||||||
| @@ -154,13 +176,25 @@ init-debian: clean-debian tarball | |||||||
| 	cp -f packaging/deb/control.in .build/deb/$(PKG)/debian/control | 	cp -f packaging/deb/control.in .build/deb/$(PKG)/debian/control | ||||||
| 	cp -f packaging/deb/rules.in .build/deb/$(PKG)/debian/rules | 	cp -f packaging/deb/rules.in .build/deb/$(PKG)/debian/rules | ||||||
| 	cp -f packaging/deb/postrm .build/deb/$(PKG)/debian/postrm | 	cp -f packaging/deb/postrm .build/deb/$(PKG)/debian/postrm | ||||||
|  | 	cp -f packaging/deb/compat .build/deb/$(PKG)/debian/compat | ||||||
|  |  | ||||||
| 	sed -i "s/@OFFLINE@/$(OFFLINE)/g" .build/deb/$(PKG)/debian/rules | 	sed -i "s/@OFFLINE@/$(OFFLINE)/g" .build/deb/$(PKG)/debian/rules | ||||||
|  | 	sed -i "s/@BUILD_GUI@/$(BUILD_GUI)/g" .build/deb/$(PKG)/debian/rules | ||||||
|  | 	sed -i "s/@RUST_VERSION@/$(RUST_VERSION)/g" .build/deb/$(PKG)/debian/rules | ||||||
|  |  | ||||||
|  | 	# Remove the GUI dependencies if BUILD_GUI is set to 0 | ||||||
|  | 	if [ $(BUILD_GUI) -eq 0 ]; then \ | ||||||
|  | 		sed -i "/libxml2/d" .build/deb/$(PKG)/debian/control; \ | ||||||
|  | 		sed -i "/libsecret-1-0/d" .build/deb/$(PKG)/debian/control; \ | ||||||
|  | 		sed -i "/libayatana-appindicator3-1/d" .build/deb/$(PKG)/debian/control; \ | ||||||
|  | 		sed -i "/gnome-keyring/d" .build/deb/$(PKG)/debian/control; \ | ||||||
|  | 		sed -i "/libwebkit2gtk-4.1-dev/d" .build/deb/$(PKG)/debian/control; \ | ||||||
|  | 	fi | ||||||
|  |  | ||||||
| 	rm -f .build/deb/$(PKG)/debian/changelog | 	rm -f .build/deb/$(PKG)/debian/changelog | ||||||
|  |  | ||||||
| deb: init-debian | deb: init-debian | ||||||
| 	# Remove the rust build depdency from the control file | 	# Remove the rust build dependency from the control file | ||||||
| 	sed -i "s/@RUST@//g" .build/deb/$(PKG)/debian/control | 	sed -i "s/@RUST@//g" .build/deb/$(PKG)/debian/control | ||||||
|  |  | ||||||
| 	cd .build/deb/$(PKG) && dch --create --distribution unstable --package $(PKG_NAME) --newversion $(VERSION)-$(REVISION) "Bugfix and improvements." | 	cd .build/deb/$(PKG) && dch --create --distribution unstable --package $(PKG_NAME) --newversion $(VERSION)-$(REVISION) "Bugfix and improvements." | ||||||
| @@ -174,7 +208,7 @@ check-ppa: | |||||||
|  |  | ||||||
| # Usage: make ppa SERIES=focal OFFLINE=1 PUBLISH=1 | # Usage: make ppa SERIES=focal OFFLINE=1 PUBLISH=1 | ||||||
| ppa: check-ppa init-debian | ppa: check-ppa init-debian | ||||||
| 	sed -i "s/@RUST@/rust-all(>=1.70)/g" .build/deb/$(PKG)/debian/control | 	sed -i "s/@RUST@/cargo-1.80/g" .build/deb/$(PKG)/debian/control | ||||||
|  |  | ||||||
| 	$(eval SERIES_VER = $(shell distro-info --series $(SERIES) -r | cut -d' ' -f1)) | 	$(eval SERIES_VER = $(shell distro-info --series $(SERIES) -r | cut -d' ' -f1)) | ||||||
| 	@echo "Building for $(SERIES) $(SERIES_VER)" | 	@echo "Building for $(SERIES) $(SERIES_VER)" | ||||||
| @@ -202,6 +236,7 @@ init-rpm: clean-rpm | |||||||
|  |  | ||||||
| 	sed -i "s/@VERSION@/$(VERSION)/g" .build/rpm/globalprotect-openconnect.spec | 	sed -i "s/@VERSION@/$(VERSION)/g" .build/rpm/globalprotect-openconnect.spec | ||||||
| 	sed -i "s/@REVISION@/$(REVISION)/g" .build/rpm/globalprotect-openconnect.spec | 	sed -i "s/@REVISION@/$(REVISION)/g" .build/rpm/globalprotect-openconnect.spec | ||||||
|  | 	sed -i "s|@SOURCE@|$(RPM_SOURCE)|g" .build/rpm/globalprotect-openconnect.spec | ||||||
| 	sed -i "s/@OFFLINE@/$(OFFLINE)/g" .build/rpm/globalprotect-openconnect.spec | 	sed -i "s/@OFFLINE@/$(OFFLINE)/g" .build/rpm/globalprotect-openconnect.spec | ||||||
| 	sed -i "s/@DATE@/$(shell LC_ALL=en.US date "+%a %b %d %Y")/g" .build/rpm/globalprotect-openconnect.spec | 	sed -i "s/@DATE@/$(shell LC_ALL=en.US date "+%a %b %d %Y")/g" .build/rpm/globalprotect-openconnect.spec | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										22
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										22
									
								
								README.md
									
									
									
									
									
								
							| @@ -70,12 +70,10 @@ The GUI version is also available after you installed it. You can launch it from | |||||||
|  |  | ||||||
| ### Debian/Ubuntu based distributions | ### Debian/Ubuntu based distributions | ||||||
|  |  | ||||||
| #### Install from PPA (Ubuntu 18.04 and later, except 24.04) | #### Install from PPA | ||||||
|  |  | ||||||
| ``` | ``` | ||||||
| sudo apt-get install gir1.2-gtk-3.0 gir1.2-webkit2-4.0 |  | ||||||
| sudo add-apt-repository ppa:yuezk/globalprotect-openconnect | sudo add-apt-repository ppa:yuezk/globalprotect-openconnect | ||||||
| sudo apt-get update |  | ||||||
| sudo apt-get install globalprotect-openconnect | sudo apt-get install globalprotect-openconnect | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| @@ -83,19 +81,6 @@ sudo apt-get install globalprotect-openconnect | |||||||
| > | > | ||||||
| > For Linux Mint, you might need to import the GPG key with: `sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 7937C393082992E5D6E4A60453FC26B43838D761` if you encountered an error `gpg: keyserver receive failed: General error`. | > For Linux Mint, you might need to import the GPG key with: `sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 7937C393082992E5D6E4A60453FC26B43838D761` if you encountered an error `gpg: keyserver receive failed: General error`. | ||||||
|  |  | ||||||
| #### **Ubuntu 24.04 and later** |  | ||||||
|  |  | ||||||
| The `libwebkit2gtk-4.0-37` package was [removed](https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/2061914) from its repo. You can use the [`deb-install.sh`](./scripts/deb-install.sh) script to install the package: |  | ||||||
|  |  | ||||||
| ```bash |  | ||||||
| curl -o- https://raw.githubusercontent.com/yuezk/GlobalProtect-openconnect/main/scripts/deb-install.sh \ |  | ||||||
|   | bash -s -- 2.3.9 |  | ||||||
| ``` |  | ||||||
|  |  | ||||||
| #### **Ubuntu 18.04** |  | ||||||
|  |  | ||||||
| The latest package is not available in the PPA either, but you still needs to add the `ppa:yuezk/globalprotect-openconnect` repo beforehand to use the required `openconnect` package. Then you can follow the [Install from deb package](#install-from-deb-package) section to install the latest package. |  | ||||||
|  |  | ||||||
| #### Install from deb package | #### Install from deb package | ||||||
|  |  | ||||||
| Download the latest deb package from [releases](https://github.com/yuezk/GlobalProtect-openconnect/releases) page. Then install it with `apt`: | Download the latest deb package from [releases](https://github.com/yuezk/GlobalProtect-openconnect/releases) page. Then install it with `apt`: | ||||||
| @@ -172,8 +157,8 @@ You can also build the client from source, steps are as follows: | |||||||
|  |  | ||||||
| ### Prerequisites | ### Prerequisites | ||||||
|  |  | ||||||
| - [Install Rust 1.75 or later](https://www.rust-lang.org/tools/install) | - [Install Rust 1.80 or later](https://www.rust-lang.org/tools/install) | ||||||
| - Install Tauri dependencies: https://tauri.app/v1/guides/getting-started/prerequisites/#setting-up-linux | - Install Tauri dependencies: https://tauri.app/start/prerequisites/ | ||||||
| - Install `perl` and `jq` | - Install `perl` and `jq` | ||||||
| - Install `openconnect >= 8.20` and `libopenconnect-dev` (or `openconnect-devel` on RPM-based distributions) | - Install `openconnect >= 8.20` and `libopenconnect-dev` (or `openconnect-devel` on RPM-based distributions) | ||||||
| - Install `pkexec`, `gnome-keyring` (or `pam_kwallet` on KDE) | - Install `pkexec`, `gnome-keyring` (or `pam_kwallet` on KDE) | ||||||
| @@ -210,6 +195,7 @@ The CLI version is always free, while the GUI version is paid. There are two tri | |||||||
| - crate [gpapi](./crates/gpapi): [MIT](./crates/gpapi/LICENSE) | - crate [gpapi](./crates/gpapi): [MIT](./crates/gpapi/LICENSE) | ||||||
| - crate [openconnect](./crates/openconnect): [GPL-3.0](./crates/openconnect/LICENSE) | - crate [openconnect](./crates/openconnect): [GPL-3.0](./crates/openconnect/LICENSE) | ||||||
| - crate [common](./crates/common): [GPL-3.0](./crates/common/LICENSE) | - crate [common](./crates/common): [GPL-3.0](./crates/common/LICENSE) | ||||||
|  | - crate [auth](./crates/auth): [GPL-3.0](./crates/auth/LICENSE) | ||||||
| - app [gpservice](./apps/gpservice): [GPL-3.0](./apps/gpservice/LICENSE) | - app [gpservice](./apps/gpservice): [GPL-3.0](./apps/gpservice/LICENSE) | ||||||
| - app [gpclient](./apps/gpclient): [GPL-3.0](./apps/gpclient/LICENSE) | - app [gpclient](./apps/gpclient): [GPL-3.0](./apps/gpclient/LICENSE) | ||||||
| - app [gpauth](./apps/gpauth): [GPL-3.0](./apps/gpauth/LICENSE) | - app [gpauth](./apps/gpauth): [GPL-3.0](./apps/gpauth/LICENSE) | ||||||
|   | |||||||
| @@ -1,29 +1,35 @@ | |||||||
| [package] | [package] | ||||||
| name = "gpauth" | name = "gpauth" | ||||||
|  | rust-version.workspace = true | ||||||
| authors.workspace = true | authors.workspace = true | ||||||
| version.workspace = true | version.workspace = true | ||||||
| edition.workspace = true | edition.workspace = true | ||||||
| license.workspace = true | license.workspace = true | ||||||
|  |  | ||||||
| [build-dependencies] | [build-dependencies] | ||||||
| tauri-build = { version = "1.5", features = [] } | tauri-build = { version = "2", features = [], optional = true } | ||||||
|  |  | ||||||
| [dependencies] | [dependencies] | ||||||
| gpapi = { path = "../../crates/gpapi", features = [ | gpapi = { path = "../../crates/gpapi", features = ["clap"] } | ||||||
|   "tauri", |  | ||||||
|   "clap", | auth = { path = "../../crates/auth", features = ["browser-auth"] } | ||||||
|   "browser-auth", |  | ||||||
| ] } | # Shared dependencies | ||||||
| anyhow.workspace = true | anyhow.workspace = true | ||||||
| clap.workspace = true | clap.workspace = true | ||||||
| env_logger.workspace = true | env_logger.workspace = true | ||||||
| log.workspace = true | log.workspace = true | ||||||
| regex.workspace = true |  | ||||||
| serde_json.workspace = true | serde_json.workspace = true | ||||||
| tokio.workspace = true | tokio.workspace = true | ||||||
| tokio-util.workspace = true |  | ||||||
| tempfile.workspace = true | tempfile.workspace = true | ||||||
| html-escape = "0.2.13" |  | ||||||
| webkit2gtk = "0.18.2" |  | ||||||
| tauri = { workspace = true, features = ["http-all"] } |  | ||||||
| compile-time.workspace = true | compile-time.workspace = true | ||||||
|  |  | ||||||
|  | # Pin the version of home because the latest version requires Rust 1.81 | ||||||
|  | home = "=0.5.9" | ||||||
|  |  | ||||||
|  | # webview auth dependencies | ||||||
|  | tauri = { workspace = true, optional = true } | ||||||
|  |  | ||||||
|  | [features] | ||||||
|  | default = ["webview-auth"] | ||||||
|  | webview-auth = ["auth/webview-auth", "dep:tauri", "dep:tauri-build"] | ||||||
|   | |||||||
| @@ -1,3 +1,4 @@ | |||||||
| fn main() { | fn main() { | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   tauri_build::build() |   tauri_build::build() | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,523 +0,0 @@ | |||||||
| use std::{ |  | ||||||
|   rc::Rc, |  | ||||||
|   sync::Arc, |  | ||||||
|   time::{Duration, Instant}, |  | ||||||
| }; |  | ||||||
|  |  | ||||||
| use anyhow::bail; |  | ||||||
| use gpapi::{ |  | ||||||
|   auth::SamlAuthData, |  | ||||||
|   error::AuthDataParseError, |  | ||||||
|   gp_params::GpParams, |  | ||||||
|   portal::{prelogin, Prelogin}, |  | ||||||
|   utils::{redact::redact_uri, window::WindowExt}, |  | ||||||
| }; |  | ||||||
| use log::{info, warn}; |  | ||||||
| use regex::Regex; |  | ||||||
| use tauri::{AppHandle, Window, WindowEvent, WindowUrl}; |  | ||||||
| use tokio::sync::{mpsc, oneshot, RwLock}; |  | ||||||
| use tokio_util::sync::CancellationToken; |  | ||||||
| use webkit2gtk::{ |  | ||||||
|   gio::Cancellable, |  | ||||||
|   glib::{GString, TimeSpan}, |  | ||||||
|   LoadEvent, SettingsExt, TLSErrorsPolicy, URIResponse, URIResponseExt, WebContextExt, WebResource, WebResourceExt, |  | ||||||
|   WebView, WebViewExt, WebsiteDataManagerExtManual, WebsiteDataTypes, |  | ||||||
| }; |  | ||||||
|  |  | ||||||
| enum AuthDataError { |  | ||||||
|   /// Failed to load page due to TLS error |  | ||||||
|   TlsError, |  | ||||||
|   /// 1. Found auth data in headers/body but it's invalid |  | ||||||
|   /// 2. Loaded an empty page, failed to load page. etc. |  | ||||||
|   Invalid, |  | ||||||
|   /// No auth data found in headers/body |  | ||||||
|   NotFound, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| type AuthResult = Result<SamlAuthData, AuthDataError>; |  | ||||||
|  |  | ||||||
| pub(crate) struct AuthWindow<'a> { |  | ||||||
|   app_handle: AppHandle, |  | ||||||
|   server: &'a str, |  | ||||||
|   saml_request: &'a str, |  | ||||||
|   user_agent: &'a str, |  | ||||||
|   gp_params: Option<GpParams>, |  | ||||||
|   clean: bool, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| impl<'a> AuthWindow<'a> { |  | ||||||
|   pub fn new(app_handle: AppHandle) -> Self { |  | ||||||
|     Self { |  | ||||||
|       app_handle, |  | ||||||
|       server: "", |  | ||||||
|       saml_request: "", |  | ||||||
|       user_agent: "", |  | ||||||
|       gp_params: None, |  | ||||||
|       clean: false, |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn server(mut self, server: &'a str) -> Self { |  | ||||||
|     self.server = server; |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn saml_request(mut self, saml_request: &'a str) -> Self { |  | ||||||
|     self.saml_request = saml_request; |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn user_agent(mut self, user_agent: &'a str) -> Self { |  | ||||||
|     self.user_agent = user_agent; |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn gp_params(mut self, gp_params: GpParams) -> Self { |  | ||||||
|     self.gp_params.replace(gp_params); |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn clean(mut self, clean: bool) -> Self { |  | ||||||
|     self.clean = clean; |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub async fn open(&self) -> anyhow::Result<SamlAuthData> { |  | ||||||
|     info!("Open auth window, user_agent: {}", self.user_agent); |  | ||||||
|  |  | ||||||
|     let window = Window::builder(&self.app_handle, "auth_window", WindowUrl::default()) |  | ||||||
|       .title("GlobalProtect Login") |  | ||||||
|       // .user_agent(self.user_agent) |  | ||||||
|       .focused(true) |  | ||||||
|       .visible(false) |  | ||||||
|       .center() |  | ||||||
|       .build()?; |  | ||||||
|  |  | ||||||
|     let window = Arc::new(window); |  | ||||||
|  |  | ||||||
|     let cancel_token = CancellationToken::new(); |  | ||||||
|     let cancel_token_clone = cancel_token.clone(); |  | ||||||
|  |  | ||||||
|     window.on_window_event(move |event| { |  | ||||||
|       if let WindowEvent::CloseRequested { .. } = event { |  | ||||||
|         cancel_token_clone.cancel(); |  | ||||||
|       } |  | ||||||
|     }); |  | ||||||
|  |  | ||||||
|     let window_clone = Arc::clone(&window); |  | ||||||
|     let timeout_secs = 15; |  | ||||||
|     tokio::spawn(async move { |  | ||||||
|       tokio::time::sleep(Duration::from_secs(timeout_secs)).await; |  | ||||||
|       let visible = window_clone.is_visible().unwrap_or(false); |  | ||||||
|       if !visible { |  | ||||||
|         info!("Try to raise auth window after {} seconds", timeout_secs); |  | ||||||
|         raise_window(&window_clone); |  | ||||||
|       } |  | ||||||
|     }); |  | ||||||
|  |  | ||||||
|     tokio::select! { |  | ||||||
|       _ = cancel_token.cancelled() => { |  | ||||||
|         bail!("Auth cancelled"); |  | ||||||
|       } |  | ||||||
|       saml_result = self.auth_loop(&window) => { |  | ||||||
|         window.close()?; |  | ||||||
|         saml_result |  | ||||||
|       } |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   async fn auth_loop(&self, window: &Arc<Window>) -> anyhow::Result<SamlAuthData> { |  | ||||||
|     let saml_request = self.saml_request.to_string(); |  | ||||||
|     let (auth_result_tx, mut auth_result_rx) = mpsc::unbounded_channel::<AuthResult>(); |  | ||||||
|     let raise_window_cancel_token: Arc<RwLock<Option<CancellationToken>>> = Default::default(); |  | ||||||
|     let gp_params = self.gp_params.as_ref().unwrap(); |  | ||||||
|     let tls_err_policy = if gp_params.ignore_tls_errors() { |  | ||||||
|       TLSErrorsPolicy::Ignore |  | ||||||
|     } else { |  | ||||||
|       TLSErrorsPolicy::Fail |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     if self.clean { |  | ||||||
|       clear_webview_cookies(window).await?; |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     let raise_window_cancel_token_clone = Arc::clone(&raise_window_cancel_token); |  | ||||||
|     window.with_webview(move |wv| { |  | ||||||
|       let wv = wv.inner(); |  | ||||||
|  |  | ||||||
|       if let Some(context) = wv.context() { |  | ||||||
|         context.set_tls_errors_policy(tls_err_policy); |  | ||||||
|       } |  | ||||||
|  |  | ||||||
|       if let Some(settings) = wv.settings() { |  | ||||||
|         let ua = settings.user_agent().unwrap_or("".into()); |  | ||||||
|         info!("Auth window user agent: {}", ua); |  | ||||||
|       } |  | ||||||
|  |  | ||||||
|       // Load the initial SAML request |  | ||||||
|       load_saml_request(&wv, &saml_request); |  | ||||||
|  |  | ||||||
|       let auth_result_tx_clone = auth_result_tx.clone(); |  | ||||||
|       wv.connect_load_changed(move |wv, event| { |  | ||||||
|         if event == LoadEvent::Started { |  | ||||||
|           let Ok(mut cancel_token) = raise_window_cancel_token_clone.try_write() else { |  | ||||||
|             return; |  | ||||||
|           }; |  | ||||||
|  |  | ||||||
|           // Cancel the raise window task |  | ||||||
|           if let Some(cancel_token) = cancel_token.take() { |  | ||||||
|             cancel_token.cancel(); |  | ||||||
|           } |  | ||||||
|           return; |  | ||||||
|         } |  | ||||||
|  |  | ||||||
|         if event != LoadEvent::Finished { |  | ||||||
|           return; |  | ||||||
|         } |  | ||||||
|  |  | ||||||
|         if let Some(main_resource) = wv.main_resource() { |  | ||||||
|           let uri = main_resource.uri().unwrap_or("".into()); |  | ||||||
|  |  | ||||||
|           if uri.is_empty() { |  | ||||||
|             warn!("Loaded an empty uri"); |  | ||||||
|             send_auth_result(&auth_result_tx_clone, Err(AuthDataError::Invalid)); |  | ||||||
|             return; |  | ||||||
|           } |  | ||||||
|  |  | ||||||
|           info!("Loaded uri: {}", redact_uri(&uri)); |  | ||||||
|           if uri.starts_with("globalprotectcallback:") { |  | ||||||
|             return; |  | ||||||
|           } |  | ||||||
|  |  | ||||||
|           read_auth_data(&main_resource, auth_result_tx_clone.clone()); |  | ||||||
|         } |  | ||||||
|       }); |  | ||||||
|  |  | ||||||
|       let auth_result_tx_clone = auth_result_tx.clone(); |  | ||||||
|       wv.connect_load_failed_with_tls_errors(move |_wv, uri, cert, err| { |  | ||||||
|         let redacted_uri = redact_uri(uri); |  | ||||||
|         warn!( |  | ||||||
|           "Failed to load uri: {} with error: {}, cert: {}", |  | ||||||
|           redacted_uri, err, cert |  | ||||||
|         ); |  | ||||||
|  |  | ||||||
|         send_auth_result(&auth_result_tx_clone, Err(AuthDataError::TlsError)); |  | ||||||
|         true |  | ||||||
|       }); |  | ||||||
|  |  | ||||||
|       wv.connect_load_failed(move |_wv, _event, uri, err| { |  | ||||||
|         let redacted_uri = redact_uri(uri); |  | ||||||
|         if !uri.starts_with("globalprotectcallback:") { |  | ||||||
|           warn!("Failed to load uri: {} with error: {}", redacted_uri, err); |  | ||||||
|         } |  | ||||||
|         // NOTE: Don't send error here, since load_changed event will be triggered after this |  | ||||||
|         // send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid)); |  | ||||||
|         // true to stop other handlers from being invoked for the event. false to propagate the event further. |  | ||||||
|         true |  | ||||||
|       }); |  | ||||||
|     })?; |  | ||||||
|  |  | ||||||
|     let portal = self.server.to_string(); |  | ||||||
|  |  | ||||||
|     loop { |  | ||||||
|       if let Some(auth_result) = auth_result_rx.recv().await { |  | ||||||
|         match auth_result { |  | ||||||
|           Ok(auth_data) => return Ok(auth_data), |  | ||||||
|           Err(AuthDataError::TlsError) => bail!("TLS error: certificate verify failed"), |  | ||||||
|           Err(AuthDataError::NotFound) => { |  | ||||||
|             info!("No auth data found, it may not be the /SAML20/SP/ACS endpoint"); |  | ||||||
|  |  | ||||||
|             // The user may need to interact with the auth window, raise it in 3 seconds |  | ||||||
|             if !window.is_visible().unwrap_or(false) { |  | ||||||
|               let window = Arc::clone(window); |  | ||||||
|               let cancel_token = CancellationToken::new(); |  | ||||||
|  |  | ||||||
|               raise_window_cancel_token.write().await.replace(cancel_token.clone()); |  | ||||||
|  |  | ||||||
|               tokio::spawn(async move { |  | ||||||
|                 let delay_secs = 1; |  | ||||||
|  |  | ||||||
|                 info!("Raise window in {} second(s)", delay_secs); |  | ||||||
|                 tokio::select! { |  | ||||||
|                   _ = tokio::time::sleep(Duration::from_secs(delay_secs)) => { |  | ||||||
|                     raise_window(&window); |  | ||||||
|                   } |  | ||||||
|                   _ = cancel_token.cancelled() => { |  | ||||||
|                     info!("Raise window cancelled"); |  | ||||||
|                   } |  | ||||||
|                 } |  | ||||||
|               }); |  | ||||||
|             } |  | ||||||
|           } |  | ||||||
|           Err(AuthDataError::Invalid) => { |  | ||||||
|             info!("Got invalid auth data, retrying..."); |  | ||||||
|  |  | ||||||
|             window.with_webview(|wv| { |  | ||||||
|               let wv = wv.inner(); |  | ||||||
|               wv.run_javascript(r#" |  | ||||||
|                   var loading = document.createElement("div"); |  | ||||||
|                   loading.innerHTML = '<div style="position: absolute; width: 100%; text-align: center; font-size: 20px; font-weight: bold; top: 50%; left: 50%; transform: translate(-50%, -50%);">Got invalid token, retrying...</div>'; |  | ||||||
|                   loading.style = "position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(255, 255, 255, 0.85); z-index: 99999;"; |  | ||||||
|                   document.body.appendChild(loading); |  | ||||||
|               "#, |  | ||||||
|                   Cancellable::NONE, |  | ||||||
|                   |_| info!("Injected loading element successfully"), |  | ||||||
|               ); |  | ||||||
|             })?; |  | ||||||
|  |  | ||||||
|             let saml_request = portal_prelogin(&portal, gp_params).await?; |  | ||||||
|             window.with_webview(move |wv| { |  | ||||||
|               let wv = wv.inner(); |  | ||||||
|               load_saml_request(&wv, &saml_request); |  | ||||||
|             })?; |  | ||||||
|           } |  | ||||||
|         } |  | ||||||
|       } |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn raise_window(window: &Arc<Window>) { |  | ||||||
|   let visible = window.is_visible().unwrap_or(false); |  | ||||||
|   if !visible { |  | ||||||
|     if let Err(err) = window.raise() { |  | ||||||
|       warn!("Failed to raise window: {}", err); |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| pub async fn portal_prelogin(portal: &str, gp_params: &GpParams) -> anyhow::Result<String> { |  | ||||||
|   match prelogin(portal, gp_params).await? { |  | ||||||
|     Prelogin::Saml(prelogin) => Ok(prelogin.saml_request().to_string()), |  | ||||||
|     Prelogin::Standard(_) => bail!("Received non-SAML prelogin response"), |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn send_auth_result(auth_result_tx: &mpsc::UnboundedSender<AuthResult>, auth_result: AuthResult) { |  | ||||||
|   if let Err(err) = auth_result_tx.send(auth_result) { |  | ||||||
|     warn!("Failed to send auth event: {}", err); |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn load_saml_request(wv: &Rc<WebView>, saml_request: &str) { |  | ||||||
|   if saml_request.starts_with("http") { |  | ||||||
|     info!("Load the SAML request as URI..."); |  | ||||||
|     wv.load_uri(saml_request); |  | ||||||
|   } else { |  | ||||||
|     info!("Load the SAML request as HTML..."); |  | ||||||
|     wv.load_html(saml_request, None); |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn read_auth_data_from_headers(response: &URIResponse) -> AuthResult { |  | ||||||
|   response.http_headers().map_or_else( |  | ||||||
|     || { |  | ||||||
|       info!("No headers found in response"); |  | ||||||
|       Err(AuthDataError::NotFound) |  | ||||||
|     }, |  | ||||||
|     |mut headers| match headers.get("saml-auth-status") { |  | ||||||
|       Some(status) if status == "1" => { |  | ||||||
|         let username = headers.get("saml-username").map(GString::into); |  | ||||||
|         let prelogin_cookie = headers.get("prelogin-cookie").map(GString::into); |  | ||||||
|         let portal_userauthcookie = headers.get("portal-userauthcookie").map(GString::into); |  | ||||||
|  |  | ||||||
|         if SamlAuthData::check(&username, &prelogin_cookie, &portal_userauthcookie) { |  | ||||||
|           return Ok(SamlAuthData::new( |  | ||||||
|             username.unwrap(), |  | ||||||
|             prelogin_cookie, |  | ||||||
|             portal_userauthcookie, |  | ||||||
|           )); |  | ||||||
|         } |  | ||||||
|  |  | ||||||
|         info!("Found invalid auth data in headers"); |  | ||||||
|         Err(AuthDataError::Invalid) |  | ||||||
|       } |  | ||||||
|       Some(status) => { |  | ||||||
|         info!("Found invalid SAML status: {} in headers", status); |  | ||||||
|         Err(AuthDataError::Invalid) |  | ||||||
|       } |  | ||||||
|       None => { |  | ||||||
|         info!("No saml-auth-status header found"); |  | ||||||
|         Err(AuthDataError::NotFound) |  | ||||||
|       } |  | ||||||
|     }, |  | ||||||
|   ) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn read_auth_data_from_body<F>(main_resource: &WebResource, callback: F) |  | ||||||
| where |  | ||||||
|   F: FnOnce(Result<SamlAuthData, AuthDataParseError>) + Send + 'static, |  | ||||||
| { |  | ||||||
|   main_resource.data(Cancellable::NONE, |data| match data { |  | ||||||
|     Ok(data) => { |  | ||||||
|       let html = String::from_utf8_lossy(&data); |  | ||||||
|       callback(read_auth_data_from_html(&html)); |  | ||||||
|     } |  | ||||||
|     Err(err) => { |  | ||||||
|       info!("Failed to read response body: {}", err); |  | ||||||
|       callback(Err(AuthDataParseError::Invalid)) |  | ||||||
|     } |  | ||||||
|   }); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn read_auth_data_from_html(html: &str) -> Result<SamlAuthData, AuthDataParseError> { |  | ||||||
|   if html.contains("Temporarily Unavailable") { |  | ||||||
|     info!("Found 'Temporarily Unavailable' in HTML, auth failed"); |  | ||||||
|     return Err(AuthDataParseError::Invalid); |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   SamlAuthData::from_html(html).or_else(|err| { |  | ||||||
|     if let Some(gpcallback) = extract_gpcallback(html) { |  | ||||||
|       info!("Found gpcallback from html..."); |  | ||||||
|       SamlAuthData::from_gpcallback(&gpcallback) |  | ||||||
|     } else { |  | ||||||
|       Err(err) |  | ||||||
|     } |  | ||||||
|   }) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn extract_gpcallback(html: &str) -> Option<String> { |  | ||||||
|   let re = Regex::new(r#"globalprotectcallback:[^"]+"#).unwrap(); |  | ||||||
|   re.captures(html) |  | ||||||
|     .and_then(|captures| captures.get(0)) |  | ||||||
|     .map(|m| html_escape::decode_html_entities(m.as_str()).to_string()) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn read_auth_data(main_resource: &WebResource, auth_result_tx: mpsc::UnboundedSender<AuthResult>) { |  | ||||||
|   let Some(response) = main_resource.response() else { |  | ||||||
|     info!("No response found in main resource"); |  | ||||||
|     send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid)); |  | ||||||
|     return; |  | ||||||
|   }; |  | ||||||
|  |  | ||||||
|   info!("Trying to read auth data from response headers..."); |  | ||||||
|  |  | ||||||
|   match read_auth_data_from_headers(&response) { |  | ||||||
|     Ok(auth_data) => { |  | ||||||
|       info!("Got auth data from headers"); |  | ||||||
|       send_auth_result(&auth_result_tx, Ok(auth_data)); |  | ||||||
|     } |  | ||||||
|     Err(AuthDataError::Invalid) => { |  | ||||||
|       info!("Found invalid auth data in headers, trying to read from body..."); |  | ||||||
|       read_auth_data_from_body(main_resource, move |auth_result| { |  | ||||||
|         // Since we have already found invalid auth data in headers, which means this could be the `/SAML20/SP/ACS` endpoint |  | ||||||
|         // any error result from body should be considered as invalid, and trigger a retry |  | ||||||
|         let auth_result = auth_result.map_err(|err| { |  | ||||||
|           info!("Failed to read auth data from body: {}", err); |  | ||||||
|           AuthDataError::Invalid |  | ||||||
|         }); |  | ||||||
|         send_auth_result(&auth_result_tx, auth_result); |  | ||||||
|       }); |  | ||||||
|     } |  | ||||||
|     Err(AuthDataError::NotFound) => { |  | ||||||
|       info!("No auth data found in headers, trying to read from body..."); |  | ||||||
|  |  | ||||||
|       let is_acs_endpoint = main_resource.uri().map_or(false, |uri| uri.contains("/SAML20/SP/ACS")); |  | ||||||
|  |  | ||||||
|       read_auth_data_from_body(main_resource, move |auth_result| { |  | ||||||
|         // If the endpoint is `/SAML20/SP/ACS` and no auth data found in body, it should be considered as invalid |  | ||||||
|         let auth_result = auth_result.map_err(|err| { |  | ||||||
|           info!("Failed to read auth data from body: {}", err); |  | ||||||
|  |  | ||||||
|           if !is_acs_endpoint && matches!(err, AuthDataParseError::NotFound) { |  | ||||||
|             AuthDataError::NotFound |  | ||||||
|           } else { |  | ||||||
|             AuthDataError::Invalid |  | ||||||
|           } |  | ||||||
|         }); |  | ||||||
|  |  | ||||||
|         send_auth_result(&auth_result_tx, auth_result) |  | ||||||
|       }); |  | ||||||
|     } |  | ||||||
|     Err(AuthDataError::TlsError) => { |  | ||||||
|       // NOTE: This is unreachable |  | ||||||
|       info!("TLS error found in headers, trying to read from body..."); |  | ||||||
|       send_auth_result(&auth_result_tx, Err(AuthDataError::TlsError)); |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| pub(crate) async fn clear_webview_cookies(window: &Window) -> anyhow::Result<()> { |  | ||||||
|   let (tx, rx) = oneshot::channel::<Result<(), String>>(); |  | ||||||
|  |  | ||||||
|   window.with_webview(|wv| { |  | ||||||
|     let send_result = move |result: Result<(), String>| { |  | ||||||
|       if let Err(err) = tx.send(result) { |  | ||||||
|         info!("Failed to send result: {:?}", err); |  | ||||||
|       } |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     let wv = wv.inner(); |  | ||||||
|     let context = match wv.context() { |  | ||||||
|       Some(context) => context, |  | ||||||
|       None => { |  | ||||||
|         send_result(Err("No webview context found".into())); |  | ||||||
|         return; |  | ||||||
|       } |  | ||||||
|     }; |  | ||||||
|     let data_manager = match context.website_data_manager() { |  | ||||||
|       Some(manager) => manager, |  | ||||||
|       None => { |  | ||||||
|         send_result(Err("No data manager found".into())); |  | ||||||
|         return; |  | ||||||
|       } |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     let now = Instant::now(); |  | ||||||
|     data_manager.clear( |  | ||||||
|       WebsiteDataTypes::COOKIES, |  | ||||||
|       TimeSpan(0), |  | ||||||
|       Cancellable::NONE, |  | ||||||
|       move |result| match result { |  | ||||||
|         Err(err) => { |  | ||||||
|           send_result(Err(err.to_string())); |  | ||||||
|         } |  | ||||||
|         Ok(_) => { |  | ||||||
|           info!("Cookies cleared in {} ms", now.elapsed().as_millis()); |  | ||||||
|           send_result(Ok(())); |  | ||||||
|         } |  | ||||||
|       }, |  | ||||||
|     ); |  | ||||||
|   })?; |  | ||||||
|  |  | ||||||
|   rx.await?.map_err(|err| anyhow::anyhow!(err)) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| #[cfg(test)] |  | ||||||
| mod tests { |  | ||||||
|   use super::*; |  | ||||||
|  |  | ||||||
|   #[test] |  | ||||||
|   fn extract_gpcallback_some() { |  | ||||||
|     let html = r#" |  | ||||||
|       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c"> |  | ||||||
|       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c"> |  | ||||||
|     "#; |  | ||||||
|  |  | ||||||
|     assert_eq!( |  | ||||||
|       extract_gpcallback(html).as_deref(), |  | ||||||
|       Some("globalprotectcallback:PGh0bWw+PCEtLSA8c") |  | ||||||
|     ); |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   #[test] |  | ||||||
|   fn extract_gpcallback_cas() { |  | ||||||
|     let html = r#" |  | ||||||
|       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string"> |  | ||||||
|     "#; |  | ||||||
|  |  | ||||||
|     assert_eq!( |  | ||||||
|       extract_gpcallback(html).as_deref(), |  | ||||||
|       Some("globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string") |  | ||||||
|     ); |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   #[test] |  | ||||||
|   fn extract_gpcallback_none() { |  | ||||||
|     let html = r#" |  | ||||||
|       <meta http-equiv="refresh" content="0; URL=PGh0bWw+PCEtLSA8c"> |  | ||||||
|     "#; |  | ||||||
|  |  | ||||||
|     assert_eq!(extract_gpcallback(html), None); |  | ||||||
|   } |  | ||||||
| } |  | ||||||
| @@ -1,25 +1,19 @@ | |||||||
| use std::{env::temp_dir, fs, os::unix::fs::PermissionsExt}; | use auth::{auth_prelogin, BrowserAuthenticator}; | ||||||
|  |  | ||||||
| use clap::Parser; | use clap::Parser; | ||||||
| use gpapi::{ | use gpapi::{ | ||||||
|   auth::{SamlAuthData, SamlAuthResult}, |   auth::{SamlAuthData, SamlAuthResult}, | ||||||
|   clap::args::Os, |   clap::{args::Os, handle_error, Args, InfoLevelVerbosity}, | ||||||
|   gp_params::{ClientOs, GpParams}, |   gp_params::{ClientOs, GpParams}, | ||||||
|   process::browser_authenticator::BrowserAuthenticator, |  | ||||||
|   utils::{normalize_server, openssl}, |   utils::{normalize_server, openssl}, | ||||||
|   GP_USER_AGENT, |   GP_USER_AGENT, | ||||||
| }; | }; | ||||||
| use log::{info, LevelFilter}; | use log::info; | ||||||
| use serde_json::json; | use serde_json::json; | ||||||
| use tauri::{App, AppHandle, RunEvent}; |  | ||||||
| use tempfile::NamedTempFile; | use tempfile::NamedTempFile; | ||||||
| use tokio::{io::AsyncReadExt, net::TcpListener}; |  | ||||||
|  |  | ||||||
| use crate::auth_window::{portal_prelogin, AuthWindow}; |  | ||||||
|  |  | ||||||
| const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")"); | const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")"); | ||||||
|  |  | ||||||
| #[derive(Parser, Clone)] | #[derive(Parser)] | ||||||
| #[command( | #[command( | ||||||
|   version = VERSION, |   version = VERSION, | ||||||
|   author, |   author, | ||||||
| @@ -56,18 +50,13 @@ struct Cli { | |||||||
|   #[arg(long)] |   #[arg(long)] | ||||||
|   os_version: Option<String>, |   os_version: Option<String>, | ||||||
|  |  | ||||||
|   #[arg(long, help = "The HiDPI mode, useful for high-resolution screens")] |  | ||||||
|   hidpi: bool, |  | ||||||
|  |  | ||||||
|   #[arg(long, help = "Get around the OpenSSL `unsafe legacy renegotiation` error")] |   #[arg(long, help = "Get around the OpenSSL `unsafe legacy renegotiation` error")] | ||||||
|   fix_openssl: bool, |   fix_openssl: bool, | ||||||
|  |  | ||||||
|   #[arg(long, help = "Ignore TLS errors")] |   #[arg(long, help = "Ignore TLS errors")] | ||||||
|   ignore_tls_errors: bool, |   ignore_tls_errors: bool, | ||||||
|  |  | ||||||
|   #[arg(long, help = "Clean the cache of the embedded browser")] |   #[cfg(feature = "webview-auth")] | ||||||
|   clean: bool, |  | ||||||
|  |  | ||||||
|   #[arg(long, help = "Use the default browser for authentication")] |   #[arg(long, help = "Use the default browser for authentication")] | ||||||
|   default_browser: bool, |   default_browser: bool, | ||||||
|  |  | ||||||
| @@ -76,76 +65,33 @@ struct Cli { | |||||||
|     help = "The browser to use for authentication, e.g., `default`, `firefox`, `chrome`, `chromium`, or the path to the browser executable" |     help = "The browser to use for authentication, e.g., `default`, `firefox`, `chrome`, `chromium`, or the path to the browser executable" | ||||||
|   )] |   )] | ||||||
|   browser: Option<String>, |   browser: Option<String>, | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|  |   #[arg(long, help = "The HiDPI mode, useful for high-resolution screens")] | ||||||
|  |   hidpi: bool, | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|  |   #[arg(long, help = "Clean the cache of the embedded browser")] | ||||||
|  |   pub clean: bool, | ||||||
|  |  | ||||||
|  |   #[command(flatten)] | ||||||
|  |   verbose: InfoLevelVerbosity, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl Args for Cli { | ||||||
|  |   fn fix_openssl(&self) -> bool { | ||||||
|  |     self.fix_openssl | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn ignore_tls_errors(&self) -> bool { | ||||||
|  |     self.ignore_tls_errors | ||||||
|  |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Cli { | impl Cli { | ||||||
|   async fn run(&mut self) -> anyhow::Result<()> { |  | ||||||
|     if self.ignore_tls_errors { |  | ||||||
|       info!("TLS errors will be ignored"); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     let mut openssl_conf = self.prepare_env()?; |  | ||||||
|  |  | ||||||
|     self.server = normalize_server(&self.server)?; |  | ||||||
|     let gp_params = self.build_gp_params(); |  | ||||||
|  |  | ||||||
|     // Get the initial SAML request |  | ||||||
|     let saml_request = match self.saml_request { |  | ||||||
|       Some(ref saml_request) => saml_request.clone(), |  | ||||||
|       None => portal_prelogin(&self.server, &gp_params).await?, |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     let browser_auth = if let Some(browser) = &self.browser { |  | ||||||
|       Some(BrowserAuthenticator::new_with_browser(&saml_request, browser)) |  | ||||||
|     } else if self.default_browser { |  | ||||||
|       Some(BrowserAuthenticator::new(&saml_request)) |  | ||||||
|     } else { |  | ||||||
|       None |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     if let Some(browser_auth) = browser_auth { |  | ||||||
|       browser_auth.authenticate()?; |  | ||||||
|  |  | ||||||
|       info!("Please continue the authentication process in the default browser"); |  | ||||||
|  |  | ||||||
|       let auth_result = match wait_auth_data().await { |  | ||||||
|         Ok(auth_data) => SamlAuthResult::Success(auth_data), |  | ||||||
|         Err(err) => SamlAuthResult::Failure(format!("{}", err)), |  | ||||||
|       }; |  | ||||||
|  |  | ||||||
|       info!("Authentication completed"); |  | ||||||
|  |  | ||||||
|       println!("{}", json!(auth_result)); |  | ||||||
|  |  | ||||||
|       return Ok(()); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     self.saml_request.replace(saml_request); |  | ||||||
|  |  | ||||||
|     let app = create_app(self.clone())?; |  | ||||||
|  |  | ||||||
|     app.run(move |_app_handle, event| { |  | ||||||
|       if let RunEvent::Exit = event { |  | ||||||
|         if let Some(file) = openssl_conf.take() { |  | ||||||
|           if let Err(err) = file.close() { |  | ||||||
|             info!("Error closing OpenSSL config file: {}", err); |  | ||||||
|           } |  | ||||||
|         } |  | ||||||
|       } |  | ||||||
|     }); |  | ||||||
|  |  | ||||||
|     Ok(()) |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   fn prepare_env(&self) -> anyhow::Result<Option<NamedTempFile>> { |   fn prepare_env(&self) -> anyhow::Result<Option<NamedTempFile>> { | ||||||
|     std::env::set_var("WEBKIT_DISABLE_COMPOSITING_MODE", "1"); |     #[cfg(feature = "webview-auth")] | ||||||
|  |     gpapi::utils::env_utils::patch_gui_runtime_env(self.hidpi); | ||||||
|     if self.hidpi { |  | ||||||
|       info!("Setting GDK_SCALE=2 and GDK_DPI_SCALE=0.5"); |  | ||||||
|  |  | ||||||
|       std::env::set_var("GDK_SCALE", "2"); |  | ||||||
|       std::env::set_var("GDK_DPI_SCALE", "0.5"); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     if self.fix_openssl { |     if self.fix_openssl { | ||||||
|       info!("Fixing OpenSSL environment"); |       info!("Fixing OpenSSL environment"); | ||||||
| @@ -157,6 +103,47 @@ impl Cli { | |||||||
|     Ok(None) |     Ok(None) | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   async fn run(&self) -> anyhow::Result<()> { | ||||||
|  |     if self.ignore_tls_errors { | ||||||
|  |       info!("TLS errors will be ignored"); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     let openssl_conf = self.prepare_env()?; | ||||||
|  |  | ||||||
|  |     let server = normalize_server(&self.server)?; | ||||||
|  |     let gp_params = self.build_gp_params(); | ||||||
|  |  | ||||||
|  |     let auth_request = match self.saml_request.as_deref() { | ||||||
|  |       Some(auth_request) => auth_request.to_string(), | ||||||
|  |       None => auth_prelogin(&server, &gp_params).await?, | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     #[cfg(feature = "webview-auth")] | ||||||
|  |     let browser = self | ||||||
|  |       .browser | ||||||
|  |       .as_deref() | ||||||
|  |       .or_else(|| self.default_browser.then(|| "default")); | ||||||
|  |  | ||||||
|  |     #[cfg(not(feature = "webview-auth"))] | ||||||
|  |     let browser = self.browser.as_deref().or(Some("default")); | ||||||
|  |  | ||||||
|  |     if let Some(browser) = browser { | ||||||
|  |       let authenticator = BrowserAuthenticator::new(&auth_request, browser); | ||||||
|  |       let auth_result = authenticator.authenticate().await; | ||||||
|  |  | ||||||
|  |       print_auth_result(auth_result); | ||||||
|  |  | ||||||
|  |       // explicitly drop openssl_conf to avoid the unused variable warning | ||||||
|  |       drop(openssl_conf); | ||||||
|  |       return Ok(()); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     #[cfg(feature = "webview-auth")] | ||||||
|  |     crate::webview_auth::authenticate(server, gp_params, auth_request, self.clean, openssl_conf).await?; | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|   fn build_gp_params(&self) -> GpParams { |   fn build_gp_params(&self) -> GpParams { | ||||||
|     let gp_params = GpParams::builder() |     let gp_params = GpParams::builder() | ||||||
|       .user_agent(&self.user_agent) |       .user_agent(&self.user_agent) | ||||||
| @@ -168,91 +155,31 @@ impl Cli { | |||||||
|  |  | ||||||
|     gp_params |     gp_params | ||||||
|   } |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|   async fn saml_auth(&self, app_handle: AppHandle) -> anyhow::Result<SamlAuthData> { | fn init_logger(cli: &Cli) { | ||||||
|     let auth_window = AuthWindow::new(app_handle) |   env_logger::builder() | ||||||
|       .server(&self.server) |     .filter_level(cli.verbose.log_level_filter()) | ||||||
|       .user_agent(&self.user_agent) |     .init(); | ||||||
|       .gp_params(self.build_gp_params()) | } | ||||||
|       .saml_request(self.saml_request.as_ref().unwrap()) |  | ||||||
|       .clean(self.clean); |  | ||||||
|  |  | ||||||
|     auth_window.open().await | pub async fn run() { | ||||||
|  |   let cli = Cli::parse(); | ||||||
|  |  | ||||||
|  |   init_logger(&cli); | ||||||
|  |   info!("gpauth started: {}", VERSION); | ||||||
|  |  | ||||||
|  |   if let Err(err) = cli.run().await { | ||||||
|  |     handle_error(err, &cli); | ||||||
|  |     std::process::exit(1); | ||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| fn create_app(cli: Cli) -> anyhow::Result<App> { | pub fn print_auth_result(auth_result: anyhow::Result<SamlAuthData>) { | ||||||
|   let app = tauri::Builder::default() |   let auth_result = match auth_result { | ||||||
|     .setup(|app| { |  | ||||||
|       let app_handle = app.handle(); |  | ||||||
|  |  | ||||||
|       tauri::async_runtime::spawn(async move { |  | ||||||
|         let auth_result = match cli.saml_auth(app_handle.clone()).await { |  | ||||||
|     Ok(auth_data) => SamlAuthResult::Success(auth_data), |     Ok(auth_data) => SamlAuthResult::Success(auth_data), | ||||||
|     Err(err) => SamlAuthResult::Failure(format!("{}", err)), |     Err(err) => SamlAuthResult::Failure(format!("{}", err)), | ||||||
|   }; |   }; | ||||||
|  |  | ||||||
|   println!("{}", json!(auth_result)); |   println!("{}", json!(auth_result)); | ||||||
|       }); |  | ||||||
|       Ok(()) |  | ||||||
|     }) |  | ||||||
|     .build(tauri::generate_context!())?; |  | ||||||
|  |  | ||||||
|   Ok(app) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn init_logger() { |  | ||||||
|   env_logger::builder().filter_level(LevelFilter::Info).init(); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| pub async fn run() { |  | ||||||
|   let mut cli = Cli::parse(); |  | ||||||
|  |  | ||||||
|   init_logger(); |  | ||||||
|   info!("gpauth started: {}", VERSION); |  | ||||||
|  |  | ||||||
|   if let Err(err) = cli.run().await { |  | ||||||
|     eprintln!("\nError: {}", err); |  | ||||||
|  |  | ||||||
|     if err.to_string().contains("unsafe legacy renegotiation") && !cli.fix_openssl { |  | ||||||
|       eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n"); |  | ||||||
|       // Print the command |  | ||||||
|       let args = std::env::args().collect::<Vec<_>>(); |  | ||||||
|       eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" ")); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     std::process::exit(1); |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| async fn wait_auth_data() -> anyhow::Result<SamlAuthData> { |  | ||||||
|   // Start a local server to receive the browser authentication data |  | ||||||
|   let listener = TcpListener::bind("127.0.0.1:0").await?; |  | ||||||
|   let port = listener.local_addr()?.port(); |  | ||||||
|   let port_file = temp_dir().join("gpcallback.port"); |  | ||||||
|  |  | ||||||
|   // Write the port to a file |  | ||||||
|   fs::write(&port_file, port.to_string())?; |  | ||||||
|   fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?; |  | ||||||
|  |  | ||||||
|   // Remove the previous log file |  | ||||||
|   let callback_log = temp_dir().join("gpcallback.log"); |  | ||||||
|   let _ = fs::remove_file(&callback_log); |  | ||||||
|  |  | ||||||
|   info!("Listening authentication data on port {}", port); |  | ||||||
|   info!( |  | ||||||
|     "If it hangs, please check the logs at `{}` for more information", |  | ||||||
|     callback_log.display() |  | ||||||
|   ); |  | ||||||
|   let (mut socket, _) = listener.accept().await?; |  | ||||||
|  |  | ||||||
|   info!("Received the browser authentication data from the socket"); |  | ||||||
|   let mut data = String::new(); |  | ||||||
|   socket.read_to_string(&mut data).await?; |  | ||||||
|  |  | ||||||
|   // Remove the port file |  | ||||||
|   fs::remove_file(&port_file)?; |  | ||||||
|  |  | ||||||
|   let auth_data = SamlAuthData::from_gpcallback(&data)?; |  | ||||||
|   Ok(auth_data) |  | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,8 +1,10 @@ | |||||||
| #![cfg_attr(not(debug_assertions), windows_subsystem = "windows")] | #![cfg_attr(not(debug_assertions), windows_subsystem = "windows")] | ||||||
|  |  | ||||||
| mod auth_window; |  | ||||||
| mod cli; | mod cli; | ||||||
|  |  | ||||||
|  | #[cfg(feature = "webview-auth")] | ||||||
|  | mod webview_auth; | ||||||
|  |  | ||||||
| #[tokio::main] | #[tokio::main] | ||||||
| async fn main() { | async fn main() { | ||||||
|   cli::run().await; |   cli::run().await; | ||||||
|   | |||||||
							
								
								
									
										46
									
								
								apps/gpauth/src/webview_auth.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										46
									
								
								apps/gpauth/src/webview_auth.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,46 @@ | |||||||
|  | use auth::WebviewAuthenticator; | ||||||
|  | use gpapi::gp_params::GpParams; | ||||||
|  | use log::info; | ||||||
|  | use tauri::RunEvent; | ||||||
|  | use tempfile::NamedTempFile; | ||||||
|  |  | ||||||
|  | use crate::cli::print_auth_result; | ||||||
|  |  | ||||||
|  | pub async fn authenticate( | ||||||
|  |   server: String, | ||||||
|  |   gp_params: GpParams, | ||||||
|  |   auth_request: String, | ||||||
|  |   clean: bool, | ||||||
|  |   mut openssl_conf: Option<NamedTempFile>, | ||||||
|  | ) -> anyhow::Result<()> { | ||||||
|  |   tauri::Builder::default() | ||||||
|  |     .setup(move |app| { | ||||||
|  |       let app_handle = app.handle().clone(); | ||||||
|  |  | ||||||
|  |       tauri::async_runtime::spawn(async move { | ||||||
|  |         let authenticator = WebviewAuthenticator::new(&server, &gp_params) | ||||||
|  |           .with_auth_request(&auth_request) | ||||||
|  |           .with_clean(clean); | ||||||
|  |  | ||||||
|  |         let auth_result = authenticator.authenticate(&app_handle).await; | ||||||
|  |         print_auth_result(auth_result); | ||||||
|  |  | ||||||
|  |         // Ensure the app exits after the authentication process | ||||||
|  |         app_handle.exit(0); | ||||||
|  |       }); | ||||||
|  |  | ||||||
|  |       Ok(()) | ||||||
|  |     }) | ||||||
|  |     .build(tauri::generate_context!())? | ||||||
|  |     .run(move |_app_handle, event| { | ||||||
|  |       if let RunEvent::Exit = event { | ||||||
|  |         if let Some(file) = openssl_conf.take() { | ||||||
|  |           if let Err(err) = file.close() { | ||||||
|  |             info!("Error closing OpenSSL config file: {}", err); | ||||||
|  |           } | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |   Ok(()) | ||||||
|  | } | ||||||
| @@ -1,47 +1,16 @@ | |||||||
| { | { | ||||||
|   "$schema": "https://cdn.jsdelivr.net/gh/tauri-apps/tauri@tauri-v1.5.0/tooling/cli/schema.json", |   "$schema": "https://cdn.jsdelivr.net/gh/tauri-apps/tauri@tauri-v2.1.1/crates/tauri-cli/config.schema.json", | ||||||
|   "build": { |   "build": { | ||||||
|     "distDir": [ |     "frontendDist": ["index.html"], | ||||||
|       "index.html" |  | ||||||
|     ], |  | ||||||
|     "devPath": [ |  | ||||||
|       "index.html" |  | ||||||
|     ], |  | ||||||
|     "beforeDevCommand": "", |     "beforeDevCommand": "", | ||||||
|     "beforeBuildCommand": "", |     "beforeBuildCommand": "" | ||||||
|     "withGlobalTauri": false |  | ||||||
|   }, |   }, | ||||||
|   "package": { |  | ||||||
|     "productName": "gpauth", |  | ||||||
|     "version": "0.0.0" |  | ||||||
|   }, |  | ||||||
|   "tauri": { |  | ||||||
|     "allowlist": { |  | ||||||
|       "all": false, |  | ||||||
|       "http": { |  | ||||||
|         "all": true, |  | ||||||
|         "request": true, |  | ||||||
|         "scope": [ |  | ||||||
|           "http://*", |  | ||||||
|           "https://*" |  | ||||||
|         ] |  | ||||||
|       } |  | ||||||
|     }, |  | ||||||
|     "bundle": { |  | ||||||
|       "active": true, |  | ||||||
|       "targets": "deb", |  | ||||||
|   "identifier": "com.yuezk.gpauth", |   "identifier": "com.yuezk.gpauth", | ||||||
|       "icon": [ |   "productName": "gpauth", | ||||||
|         "icons/32x32.png", |   "app": { | ||||||
|         "icons/128x128.png", |     "withGlobalTauri": false, | ||||||
|         "icons/128x128@2x.png", |  | ||||||
|         "icons/icon.icns", |  | ||||||
|         "icons/icon.ico" |  | ||||||
|       ] |  | ||||||
|     }, |  | ||||||
|     "security": { |     "security": { | ||||||
|       "csp": null |       "csp": null | ||||||
|     }, |     } | ||||||
|     "windows": [] |  | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| [package] | [package] | ||||||
| name = "gpclient" | name = "gpclient" | ||||||
|  | rust-version.workspace = true | ||||||
| authors.workspace = true | authors.workspace = true | ||||||
| version.workspace = true | version.workspace = true | ||||||
| edition.workspace = true | edition.workspace = true | ||||||
| @@ -9,16 +10,21 @@ license.workspace = true | |||||||
| common = { path = "../../crates/common" } | common = { path = "../../crates/common" } | ||||||
| gpapi = { path = "../../crates/gpapi", features = ["clap"] } | gpapi = { path = "../../crates/gpapi", features = ["clap"] } | ||||||
| openconnect = { path = "../../crates/openconnect" } | openconnect = { path = "../../crates/openconnect" } | ||||||
|  |  | ||||||
| anyhow.workspace = true | anyhow.workspace = true | ||||||
| clap.workspace = true | clap.workspace = true | ||||||
| env_logger.workspace = true | env_logger.workspace = true | ||||||
| inquire = "0.6.2" | inquire = "0.7" | ||||||
| log.workspace = true | log.workspace = true | ||||||
| tokio.workspace = true | tokio = { workspace = true, features = ["rt-multi-thread"] } | ||||||
| sysinfo.workspace = true | sysinfo.workspace = true | ||||||
| serde_json.workspace = true | serde_json.workspace = true | ||||||
| whoami.workspace = true | whoami.workspace = true | ||||||
| tempfile.workspace = true | tempfile.workspace = true | ||||||
| reqwest.workspace = true | reqwest.workspace = true | ||||||
| directories = "5.0" | directories.workspace = true | ||||||
| compile-time.workspace = true | compile-time.workspace = true | ||||||
|  |  | ||||||
|  | [features] | ||||||
|  | default = ["webview-auth"] | ||||||
|  | webview-auth = ["gpapi/webview-auth"] | ||||||
|   | |||||||
| @@ -1,21 +1,29 @@ | |||||||
| use std::{env::temp_dir, fs::File}; | use std::{env::temp_dir, fs::File, str::FromStr}; | ||||||
|  |  | ||||||
|  | use anyhow::bail; | ||||||
| use clap::{Parser, Subcommand}; | use clap::{Parser, Subcommand}; | ||||||
| use gpapi::utils::openssl; | use gpapi::{ | ||||||
| use log::{info, LevelFilter}; |   clap::{handle_error, Args, InfoLevelVerbosity}, | ||||||
|  |   utils::openssl, | ||||||
|  | }; | ||||||
|  | use log::info; | ||||||
|  | use sysinfo::{Pid, System}; | ||||||
| use tempfile::NamedTempFile; | use tempfile::NamedTempFile; | ||||||
|  | use tokio::fs; | ||||||
|  |  | ||||||
| use crate::{ | use crate::{ | ||||||
|   connect::{ConnectArgs, ConnectHandler}, |   connect::{ConnectArgs, ConnectHandler}, | ||||||
|   disconnect::DisconnectHandler, |   disconnect::{DisconnectArgs, DisconnectHandler}, | ||||||
|   launch_gui::{LaunchGuiArgs, LaunchGuiHandler}, |   launch_gui::{LaunchGuiArgs, LaunchGuiHandler}, | ||||||
|  |   GP_CLIENT_LOCK_FILE, | ||||||
| }; | }; | ||||||
|  |  | ||||||
| const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")"); | const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")"); | ||||||
|  |  | ||||||
| pub(crate) struct SharedArgs { | pub(crate) struct SharedArgs<'a> { | ||||||
|   pub(crate) fix_openssl: bool, |   pub(crate) fix_openssl: bool, | ||||||
|   pub(crate) ignore_tls_errors: bool, |   pub(crate) ignore_tls_errors: bool, | ||||||
|  |   pub(crate) verbose: &'a InfoLevelVerbosity, | ||||||
| } | } | ||||||
|  |  | ||||||
| #[derive(Subcommand)] | #[derive(Subcommand)] | ||||||
| @@ -23,7 +31,7 @@ enum CliCommand { | |||||||
|   #[command(about = "Connect to a portal server")] |   #[command(about = "Connect to a portal server")] | ||||||
|   Connect(Box<ConnectArgs>), |   Connect(Box<ConnectArgs>), | ||||||
|   #[command(about = "Disconnect from the server")] |   #[command(about = "Disconnect from the server")] | ||||||
|   Disconnect, |   Disconnect(DisconnectArgs), | ||||||
|   #[command(about = "Launch the GUI")] |   #[command(about = "Launch the GUI")] | ||||||
|   LaunchGui(LaunchGuiArgs), |   LaunchGui(LaunchGuiArgs), | ||||||
| } | } | ||||||
| @@ -50,13 +58,48 @@ struct Cli { | |||||||
|   #[command(subcommand)] |   #[command(subcommand)] | ||||||
|   command: CliCommand, |   command: CliCommand, | ||||||
|  |  | ||||||
|   #[arg(long, help = "Uses extended compatibility mode for OpenSSL operations to support a broader range of systems and formats.")] |   #[arg( | ||||||
|  |     long, | ||||||
|  |     help = "Uses extended compatibility mode for OpenSSL operations to support a broader range of systems and formats." | ||||||
|  |   )] | ||||||
|   fix_openssl: bool, |   fix_openssl: bool, | ||||||
|   #[arg(long, help = "Ignore the TLS errors")] |   #[arg(long, help = "Ignore the TLS errors")] | ||||||
|   ignore_tls_errors: bool, |   ignore_tls_errors: bool, | ||||||
|  |  | ||||||
|  |   #[command(flatten)] | ||||||
|  |   verbose: InfoLevelVerbosity, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl Args for Cli { | ||||||
|  |   fn fix_openssl(&self) -> bool { | ||||||
|  |     self.fix_openssl | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn ignore_tls_errors(&self) -> bool { | ||||||
|  |     self.ignore_tls_errors | ||||||
|  |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Cli { | impl Cli { | ||||||
|  |   async fn is_running(&self) -> bool { | ||||||
|  |     let Ok(c) = fs::read_to_string(GP_CLIENT_LOCK_FILE).await else { | ||||||
|  |       return false; | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     let Ok(pid) = Pid::from_str(c.trim()) else { | ||||||
|  |       return false; | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     let s = System::new_all(); | ||||||
|  |     let Some(p) = s.process(pid) else { | ||||||
|  |       return false; | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     p.exe() | ||||||
|  |       .map(|exe| exe.to_string_lossy().contains("gpclient")) | ||||||
|  |       .unwrap_or(false) | ||||||
|  |   } | ||||||
|  |  | ||||||
|   fn fix_openssl(&self) -> anyhow::Result<Option<NamedTempFile>> { |   fn fix_openssl(&self) -> anyhow::Result<Option<NamedTempFile>> { | ||||||
|     if self.fix_openssl { |     if self.fix_openssl { | ||||||
|       let file = openssl::fix_openssl_env()?; |       let file = openssl::fix_openssl_env()?; | ||||||
| @@ -67,12 +110,18 @@ impl Cli { | |||||||
|   } |   } | ||||||
|  |  | ||||||
|   async fn run(&self) -> anyhow::Result<()> { |   async fn run(&self) -> anyhow::Result<()> { | ||||||
|  |     // check if an instance is running | ||||||
|  |     if self.is_running().await { | ||||||
|  |       bail!("Another instance of the client is already running"); | ||||||
|  |     } | ||||||
|  |  | ||||||
|     // The temp file will be dropped automatically when the file handle is dropped |     // The temp file will be dropped automatically when the file handle is dropped | ||||||
|     // So, declare it here to ensure it's not dropped |     // So, declare it here to ensure it's not dropped | ||||||
|     let _file = self.fix_openssl()?; |     let _file = self.fix_openssl()?; | ||||||
|     let shared_args = SharedArgs { |     let shared_args = SharedArgs { | ||||||
|       fix_openssl: self.fix_openssl, |       fix_openssl: self.fix_openssl, | ||||||
|       ignore_tls_errors: self.ignore_tls_errors, |       ignore_tls_errors: self.ignore_tls_errors, | ||||||
|  |       verbose: &self.verbose, | ||||||
|     }; |     }; | ||||||
|  |  | ||||||
|     if self.ignore_tls_errors { |     if self.ignore_tls_errors { | ||||||
| @@ -81,18 +130,18 @@ impl Cli { | |||||||
|  |  | ||||||
|     match &self.command { |     match &self.command { | ||||||
|       CliCommand::Connect(args) => ConnectHandler::new(args, &shared_args).handle().await, |       CliCommand::Connect(args) => ConnectHandler::new(args, &shared_args).handle().await, | ||||||
|       CliCommand::Disconnect => DisconnectHandler::new().handle(), |       CliCommand::Disconnect(args) => DisconnectHandler::new(args).handle().await, | ||||||
|       CliCommand::LaunchGui(args) => LaunchGuiHandler::new(args).handle().await, |       CliCommand::LaunchGui(args) => LaunchGuiHandler::new(args).handle().await, | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| fn init_logger(command: &CliCommand) { | fn init_logger(cli: &Cli) { | ||||||
|   let mut builder = env_logger::builder(); |   let mut builder = env_logger::builder(); | ||||||
|   builder.filter_level(LevelFilter::Info); |   builder.filter_level(cli.verbose.log_level_filter()); | ||||||
|  |  | ||||||
|   // Output the log messages to a file if the command is the auth callback |   // Output the log messages to a file if the command is the auth callback | ||||||
|   if let CliCommand::LaunchGui(args) = command { |   if let CliCommand::LaunchGui(args) = &cli.command { | ||||||
|     let auth_data = args.auth_data.as_deref().unwrap_or_default(); |     let auth_data = args.auth_data.as_deref().unwrap_or_default(); | ||||||
|     if !auth_data.is_empty() { |     if !auth_data.is_empty() { | ||||||
|       if let Ok(log_file) = File::create(temp_dir().join("gpcallback.log")) { |       if let Ok(log_file) = File::create(temp_dir().join("gpcallback.log")) { | ||||||
| @@ -108,29 +157,12 @@ fn init_logger(command: &CliCommand) { | |||||||
| pub(crate) async fn run() { | pub(crate) async fn run() { | ||||||
|   let cli = Cli::parse(); |   let cli = Cli::parse(); | ||||||
|  |  | ||||||
|   init_logger(&cli.command); |   init_logger(&cli); | ||||||
|  |  | ||||||
|   info!("gpclient started: {}", VERSION); |   info!("gpclient started: {}", VERSION); | ||||||
|  |  | ||||||
|   if let Err(err) = cli.run().await { |   if let Err(err) = cli.run().await { | ||||||
|     eprintln!("\nError: {}", err); |     handle_error(err, &cli); | ||||||
|  |  | ||||||
|     let err = err.to_string(); |  | ||||||
|  |  | ||||||
|     if err.contains("unsafe legacy renegotiation") && !cli.fix_openssl { |  | ||||||
|       eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n"); |  | ||||||
|       // Print the command |  | ||||||
|       let args = std::env::args().collect::<Vec<_>>(); |  | ||||||
|       eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" ")); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     if err.contains("certificate verify failed") && !cli.ignore_tls_errors { |  | ||||||
|       eprintln!("\nRe-run it with the `--ignore-tls-errors` option to ignore the certificate error, e.g.:\n"); |  | ||||||
|       // Print the command |  | ||||||
|       let args = std::env::args().collect::<Vec<_>>(); |  | ||||||
|       eprintln!("{} --ignore-tls-errors {}\n", args[0], args[1..].join(" ")); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     std::process::exit(1); |     std::process::exit(1); | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -5,7 +5,7 @@ use clap::Args; | |||||||
| use common::vpn_utils::find_csd_wrapper; | use common::vpn_utils::find_csd_wrapper; | ||||||
| use gpapi::{ | use gpapi::{ | ||||||
|   auth::SamlAuthResult, |   auth::SamlAuthResult, | ||||||
|   clap::args::Os, |   clap::{args::Os, ToVerboseArg}, | ||||||
|   credential::{Credential, PasswordCredential}, |   credential::{Credential, PasswordCredential}, | ||||||
|   error::PortalError, |   error::PortalError, | ||||||
|   gateway::{gateway_login, GatewayLogin}, |   gateway::{gateway_login, GatewayLogin}, | ||||||
| @@ -19,7 +19,7 @@ use gpapi::{ | |||||||
|   GP_USER_AGENT, |   GP_USER_AGENT, | ||||||
| }; | }; | ||||||
| use inquire::{Password, PasswordDisplayMode, Select, Text}; | use inquire::{Password, PasswordDisplayMode, Select, Text}; | ||||||
| use log::info; | use log::{info, warn}; | ||||||
| use openconnect::Vpn; | use openconnect::Vpn; | ||||||
|  |  | ||||||
| use crate::{cli::SharedArgs, GP_CLIENT_LOCK_FILE}; | use crate::{cli::SharedArgs, GP_CLIENT_LOCK_FILE}; | ||||||
| @@ -84,21 +84,24 @@ pub(crate) struct ConnectArgs { | |||||||
|   #[arg(long, default_value = GP_USER_AGENT, help = "The user agent to use")] |   #[arg(long, default_value = GP_USER_AGENT, help = "The user agent to use")] | ||||||
|   user_agent: String, |   user_agent: String, | ||||||
|  |  | ||||||
|   #[arg(long, default_value = "Linux")] |   #[arg(long, value_enum, default_value_t = ConnectArgs::default_os())] | ||||||
|   os: Os, |   os: Os, | ||||||
|  |  | ||||||
|   #[arg(long)] |   #[arg(long, help = "If not specified, it will be computed based on the --os option")] | ||||||
|   os_version: Option<String>, |   os_version: Option<String>, | ||||||
|  |  | ||||||
|   #[arg(long, help = "Disable DTLS and ESP")] |   #[arg(long, help = "Disable DTLS and ESP")] | ||||||
|   no_dtls: bool, |   no_dtls: bool, | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   #[arg(long, help = "The HiDPI mode, useful for high-resolution screens")] |   #[arg(long, help = "The HiDPI mode, useful for high-resolution screens")] | ||||||
|   hidpi: bool, |   hidpi: bool, | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   #[arg(long, help = "Do not reuse the remembered authentication cookie")] |   #[arg(long, help = "Do not reuse the remembered authentication cookie")] | ||||||
|   clean: bool, |   clean: bool, | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   #[arg(long, help = "Use the default browser to authenticate")] |   #[arg(long, help = "Use the default browser to authenticate")] | ||||||
|   default_browser: bool, |   default_browser: bool, | ||||||
|  |  | ||||||
| @@ -110,9 +113,17 @@ pub(crate) struct ConnectArgs { | |||||||
| } | } | ||||||
|  |  | ||||||
| impl ConnectArgs { | impl ConnectArgs { | ||||||
|  |   fn default_os() -> Os { | ||||||
|  |     if cfg!(target_os = "macos") { | ||||||
|  |       Os::Mac | ||||||
|  |     } else { | ||||||
|  |       Os::Linux | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|   fn os_version(&self) -> String { |   fn os_version(&self) -> String { | ||||||
|     if let Some(os_version) = &self.os_version { |     if let Some(os_version) = self.os_version.as_deref() { | ||||||
|       return os_version.to_owned(); |       return os_version.to_string(); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|     match self.os { |     match self.os { | ||||||
| @@ -125,7 +136,7 @@ impl ConnectArgs { | |||||||
|  |  | ||||||
| pub(crate) struct ConnectHandler<'a> { | pub(crate) struct ConnectHandler<'a> { | ||||||
|   args: &'a ConnectArgs, |   args: &'a ConnectArgs, | ||||||
|   shared_args: &'a SharedArgs, |   shared_args: &'a SharedArgs<'a>, | ||||||
|   latest_key_password: RefCell<Option<String>>, |   latest_key_password: RefCell<Option<String>>, | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -151,6 +162,7 @@ impl<'a> ConnectHandler<'a> { | |||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub(crate) async fn handle(&self) -> anyhow::Result<()> { |   pub(crate) async fn handle(&self) -> anyhow::Result<()> { | ||||||
|  |     #[cfg(feature = "webview-auth")] | ||||||
|     if self.args.default_browser && self.args.browser.is_some() { |     if self.args.default_browser && self.args.browser.is_some() { | ||||||
|       bail!("Cannot use `--default-browser` and `--browser` options at the same time"); |       bail!("Cannot use `--default-browser` and `--browser` options at the same time"); | ||||||
|     } |     } | ||||||
| @@ -199,7 +211,7 @@ impl<'a> ConnectHandler<'a> { | |||||||
|       return Ok(()); |       return Ok(()); | ||||||
|     }; |     }; | ||||||
|  |  | ||||||
|     info!("Failed to connect portal with prelogin: {}", err); |     warn!("Failed to connect portal with prelogin: {}", err); | ||||||
|     if err.root_cause().downcast_ref::<PortalError>().is_some() { |     if err.root_cause().downcast_ref::<PortalError>().is_some() { | ||||||
|       info!("Trying the gateway authentication workflow..."); |       info!("Trying the gateway authentication workflow..."); | ||||||
|       self.connect_gateway_with_prelogin(server).await?; |       self.connect_gateway_with_prelogin(server).await?; | ||||||
| @@ -343,28 +355,36 @@ impl<'a> ConnectHandler<'a> { | |||||||
|  |  | ||||||
|     match prelogin { |     match prelogin { | ||||||
|       Prelogin::Saml(prelogin) => { |       Prelogin::Saml(prelogin) => { | ||||||
|         let use_default_browser = prelogin.support_default_browser() && self.args.default_browser; |  | ||||||
|         let browser = if prelogin.support_default_browser() { |         let browser = if prelogin.support_default_browser() { | ||||||
|           self.args.browser.as_deref() |           self.args.browser.as_deref() | ||||||
|  |         } else if !cfg!(feature = "webview-auth") { | ||||||
|  |           bail!("The server does not support authentication via the default browser and the gpclient is not built with the `webview-auth` feature"); | ||||||
|         } else { |         } else { | ||||||
|           None |           None | ||||||
|         }; |         }; | ||||||
|  |  | ||||||
|         let cred = SamlAuthLauncher::new(&self.args.server) |         let os_version = self.args.os_version(); | ||||||
|  |         let verbose = self.shared_args.verbose.to_verbose_arg(); | ||||||
|  |         let auth_launcher = SamlAuthLauncher::new(&self.args.server) | ||||||
|           .gateway(is_gateway) |           .gateway(is_gateway) | ||||||
|           .saml_request(prelogin.saml_request()) |           .saml_request(prelogin.saml_request()) | ||||||
|           .user_agent(&self.args.user_agent) |           .user_agent(&self.args.user_agent) | ||||||
|           .os(self.args.os.as_str()) |           .os(self.args.os.as_str()) | ||||||
|           .os_version(Some(&self.args.os_version())) |           .os_version(Some(&os_version)) | ||||||
|           .hidpi(self.args.hidpi) |  | ||||||
|           .fix_openssl(self.shared_args.fix_openssl) |           .fix_openssl(self.shared_args.fix_openssl) | ||||||
|           .ignore_tls_errors(self.shared_args.ignore_tls_errors) |           .ignore_tls_errors(self.shared_args.ignore_tls_errors) | ||||||
|           .clean(self.args.clean) |  | ||||||
|           .default_browser(use_default_browser) |  | ||||||
|           .browser(browser) |           .browser(browser) | ||||||
|           .launch() |           .verbose(verbose); | ||||||
|           .await?; |  | ||||||
|  |  | ||||||
|  |         #[cfg(feature = "webview-auth")] | ||||||
|  |         let use_default_browser = prelogin.support_default_browser() && self.args.default_browser; | ||||||
|  |         #[cfg(feature = "webview-auth")] | ||||||
|  |         let auth_launcher = auth_launcher | ||||||
|  |           .hidpi(self.args.hidpi) | ||||||
|  |           .clean(self.args.clean) | ||||||
|  |           .default_browser(use_default_browser); | ||||||
|  |  | ||||||
|  |         let cred = auth_launcher.launch().await?; | ||||||
|         Ok(cred) |         Ok(cred) | ||||||
|       } |       } | ||||||
|  |  | ||||||
|   | |||||||
| @@ -1,31 +1,63 @@ | |||||||
| use crate::GP_CLIENT_LOCK_FILE; | use crate::GP_CLIENT_LOCK_FILE; | ||||||
|  | use clap::Args; | ||||||
|  | use gpapi::utils::lock_file::gpservice_lock_info; | ||||||
| use log::{info, warn}; | use log::{info, warn}; | ||||||
| use std::fs; | use std::{fs, str::FromStr, thread, time::Duration}; | ||||||
| use sysinfo::{Pid, ProcessExt, Signal, System, SystemExt}; | use sysinfo::{Pid, Signal, System}; | ||||||
|  |  | ||||||
| pub(crate) struct DisconnectHandler; | #[derive(Args)] | ||||||
|  | pub struct DisconnectArgs { | ||||||
| impl DisconnectHandler { |   #[arg( | ||||||
|   pub(crate) fn new() -> Self { |     long, | ||||||
|     Self |     required = false, | ||||||
|  |     help = "The time in seconds to wait for the VPN connection to disconnect" | ||||||
|  |   )] | ||||||
|  |   wait: Option<u64>, | ||||||
| } | } | ||||||
|  |  | ||||||
|   pub(crate) fn handle(&self) -> anyhow::Result<()> { | pub struct DisconnectHandler<'a> { | ||||||
|     if fs::metadata(GP_CLIENT_LOCK_FILE).is_err() { |   args: &'a DisconnectArgs, | ||||||
|       warn!("PID file not found, maybe the client is not running"); |  | ||||||
|       return Ok(()); |  | ||||||
| } | } | ||||||
|  |  | ||||||
|     let pid = fs::read_to_string(GP_CLIENT_LOCK_FILE)?; | impl<'a> DisconnectHandler<'a> { | ||||||
|     let pid = pid.trim().parse::<usize>()?; |   pub fn new(args: &'a DisconnectArgs) -> Self { | ||||||
|  |     Self { args } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub async fn handle(&self) -> anyhow::Result<()> { | ||||||
|  |     // Try to disconnect the CLI client | ||||||
|  |     if let Ok(c) = fs::read_to_string(GP_CLIENT_LOCK_FILE) { | ||||||
|  |       send_signal(c.trim(), Signal::Interrupt).unwrap_or_else(|err| { | ||||||
|  |         warn!("Failed to send signal to client: {}", err); | ||||||
|  |       }); | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     // Try to disconnect the GUI service | ||||||
|  |     if let Ok(c) = gpservice_lock_info().await { | ||||||
|  |       send_signal(&c.pid.to_string(), Signal::User1).unwrap_or_else(|err| { | ||||||
|  |         warn!("Failed to send signal to service: {}", err); | ||||||
|  |       }); | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     // sleep, to give the client and service time to disconnect | ||||||
|  |     if let Some(wait) = self.args.wait { | ||||||
|  |       thread::sleep(Duration::from_secs(wait)); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | fn send_signal(pid: &str, signal: Signal) -> anyhow::Result<()> { | ||||||
|   let s = System::new_all(); |   let s = System::new_all(); | ||||||
|  |   let pid = Pid::from_str(pid)?; | ||||||
|  |  | ||||||
|     if let Some(process) = s.process(Pid::from(pid)) { |   if let Some(process) = s.process(pid) { | ||||||
|       info!("Found process {}, killing...", pid); |     info!("Found process {}, sending signal...", pid); | ||||||
|       if process.kill_with(Signal::Interrupt).is_none() { |  | ||||||
|  |     if process.kill_with(signal).is_none() { | ||||||
|       warn!("Failed to kill process {}", pid); |       warn!("Failed to kill process {}", pid); | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
|   Ok(()) |   Ok(()) | ||||||
| } | } | ||||||
| } |  | ||||||
|   | |||||||
| @@ -4,7 +4,8 @@ use clap::Args; | |||||||
| use directories::ProjectDirs; | use directories::ProjectDirs; | ||||||
| use gpapi::{ | use gpapi::{ | ||||||
|   process::service_launcher::ServiceLauncher, |   process::service_launcher::ServiceLauncher, | ||||||
|   utils::{endpoint::http_endpoint, env_file, shutdown_signal}, |   utils::{endpoint::http_endpoint, env_utils, shutdown_signal}, | ||||||
|  |   GP_CALLBACK_PORT_FILENAME, | ||||||
| }; | }; | ||||||
| use log::info; | use log::info; | ||||||
| use tokio::io::AsyncWriteExt; | use tokio::io::AsyncWriteExt; | ||||||
| @@ -62,7 +63,7 @@ impl<'a> LaunchGuiHandler<'a> { | |||||||
|     extra_envs.insert("GP_LOG_FILE".into(), log_file_path.clone()); |     extra_envs.insert("GP_LOG_FILE".into(), log_file_path.clone()); | ||||||
|  |  | ||||||
|     // Persist the environment variables to a file |     // Persist the environment variables to a file | ||||||
|     let env_file = env_file::persist_env_vars(Some(extra_envs))?; |     let env_file = env_utils::persist_env_vars(Some(extra_envs))?; | ||||||
|     let env_file = env_file.into_temp_path(); |     let env_file = env_file.into_temp_path(); | ||||||
|     let env_file_path = env_file.to_string_lossy().to_string(); |     let env_file_path = env_file.to_string_lossy().to_string(); | ||||||
|  |  | ||||||
| @@ -80,42 +81,17 @@ impl<'a> LaunchGuiHandler<'a> { | |||||||
| } | } | ||||||
|  |  | ||||||
| async fn feed_auth_data(auth_data: &str) -> anyhow::Result<()> { | async fn feed_auth_data(auth_data: &str) -> anyhow::Result<()> { | ||||||
|   let (res_gui, res_cli) = tokio::join!(feed_auth_data_gui(auth_data), feed_auth_data_cli(auth_data)); |   if let Err(err) = feed_auth_data_cli(auth_data).await { | ||||||
|   if let Err(err) = res_gui { |  | ||||||
|     info!("Failed to feed auth data to the GUI: {}", err); |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   if let Err(err) = res_cli { |  | ||||||
|     info!("Failed to feed auth data to the CLI: {}", err); |     info!("Failed to feed auth data to the CLI: {}", err); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   // Cleanup the temporary file |  | ||||||
|   let html_file = temp_dir().join("gpauth.html"); |  | ||||||
|   if let Err(err) = std::fs::remove_file(&html_file) { |  | ||||||
|     info!("Failed to remove {}: {}", html_file.display(), err); |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   Ok(()) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| async fn feed_auth_data_gui(auth_data: &str) -> anyhow::Result<()> { |  | ||||||
|   info!("Feeding auth data to the GUI"); |  | ||||||
|   let service_endpoint = http_endpoint().await?; |  | ||||||
|  |  | ||||||
|   reqwest::Client::default() |  | ||||||
|     .post(format!("{}/auth-data", service_endpoint)) |  | ||||||
|     .body(auth_data.to_string()) |  | ||||||
|     .send() |  | ||||||
|     .await? |  | ||||||
|     .error_for_status()?; |  | ||||||
|  |  | ||||||
|   Ok(()) |   Ok(()) | ||||||
| } | } | ||||||
|  |  | ||||||
| async fn feed_auth_data_cli(auth_data: &str) -> anyhow::Result<()> { | async fn feed_auth_data_cli(auth_data: &str) -> anyhow::Result<()> { | ||||||
|   info!("Feeding auth data to the CLI"); |   info!("Feeding auth data to the CLI"); | ||||||
|  |  | ||||||
|   let port_file = temp_dir().join("gpcallback.port"); |   let port_file = temp_dir().join(GP_CALLBACK_PORT_FILENAME); | ||||||
|   let port = tokio::fs::read_to_string(port_file).await?; |   let port = tokio::fs::read_to_string(port_file).await?; | ||||||
|   let mut stream = tokio::net::TcpStream::connect(format!("127.0.0.1:{}", port.trim())).await?; |   let mut stream = tokio::net::TcpStream::connect(format!("127.0.0.1:{}", port.trim())).await?; | ||||||
|  |  | ||||||
|   | |||||||
| Before Width: | Height: | Size: 6.7 KiB After Width: | Height: | Size: 6.7 KiB | 
							
								
								
									
										193
									
								
								apps/gpgui-helper/dist/assets/main-CQPVXkdn.js
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										193
									
								
								apps/gpgui-helper/dist/assets/main-CQPVXkdn.js
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										188
									
								
								apps/gpgui-helper/dist/assets/main-c159dd55.js
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										188
									
								
								apps/gpgui-helper/dist/assets/main-c159dd55.js
									
									
									
									
										vendored
									
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										5
									
								
								apps/gpgui-helper/dist/index.html
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										5
									
								
								apps/gpgui-helper/dist/index.html
									
									
									
									
										vendored
									
									
								
							| @@ -5,8 +5,8 @@ | |||||||
|     <link rel="icon" type="image/svg+xml" href="/vite.svg" /> |     <link rel="icon" type="image/svg+xml" href="/vite.svg" /> | ||||||
|     <meta name="viewport" content="width=device-width, initial-scale=1" /> |     <meta name="viewport" content="width=device-width, initial-scale=1" /> | ||||||
|     <title>GlobalProtect</title> |     <title>GlobalProtect</title> | ||||||
|     <script type="module" crossorigin src="/assets/main-c159dd55.js"></script> |     <script type="module" crossorigin src="/assets/main-CQPVXkdn.js"></script> | ||||||
|     <link rel="stylesheet" href="/assets/index-11e7064a.css"> |     <link rel="stylesheet" crossorigin href="/assets/main-B3YRsHQ2.css"> | ||||||
|   </head> |   </head> | ||||||
|   <body> |   <body> | ||||||
|     <script> |     <script> | ||||||
| @@ -16,6 +16,5 @@ | |||||||
|       document.documentElement.style.fontSize = 16 / ratio + "px"; |       document.documentElement.style.fontSize = 16 / ratio + "px"; | ||||||
|     </script> |     </script> | ||||||
|     <div id="root" data-tauri-drag-region></div> |     <div id="root" data-tauri-drag-region></div> | ||||||
|      |  | ||||||
|   </body> |   </body> | ||||||
| </html> | </html> | ||||||
|   | |||||||
| @@ -9,29 +9,29 @@ | |||||||
|     "tauri": "tauri" |     "tauri": "tauri" | ||||||
|   }, |   }, | ||||||
|   "dependencies": { |   "dependencies": { | ||||||
|     "@emotion/react": "^11.13.0", |     "@emotion/react": "^11.14.0", | ||||||
|     "@emotion/styled": "^11.13.0", |     "@emotion/styled": "^11.14.0", | ||||||
|     "@mui/icons-material": "^5.16.7", |     "@mui/icons-material": "^6.3.0", | ||||||
|     "@mui/material": "^5.16.7", |     "@mui/material": "^6.3.0", | ||||||
|     "@tauri-apps/api": "^1.6.0", |     "@tauri-apps/api": "^2.1.1", | ||||||
|     "react": "^18.3.1", |     "react": "^19.0.0", | ||||||
|     "react-dom": "^18.3.1" |     "react-dom": "^19.0.0" | ||||||
|   }, |   }, | ||||||
|   "devDependencies": { |   "devDependencies": { | ||||||
|     "@tauri-apps/cli": "^1.6.0", |     "@tauri-apps/cli": "^2.1.0", | ||||||
|     "@types/node": "^20.14.15", |     "@types/node": "^22.10.2", | ||||||
|     "@types/react": "^18.3.3", |     "@types/react": "^19.0.2", | ||||||
|     "@types/react-dom": "^18.3.0", |     "@types/react-dom": "^19.0.2", | ||||||
|     "@typescript-eslint/eslint-plugin": "^6.21.0", |     "@typescript-eslint/eslint-plugin": "^8.18.2", | ||||||
|     "@typescript-eslint/parser": "^6.21.0", |     "@typescript-eslint/parser": "^8.18.2", | ||||||
|     "@vitejs/plugin-react": "^4.3.1", |     "@vitejs/plugin-react": "^4.3.4", | ||||||
|     "eslint": "^8.57.0", |     "eslint": "^9.17.0", | ||||||
|     "eslint-config-prettier": "^9.1.0", |     "eslint-config-prettier": "^9.1.0", | ||||||
|     "eslint-plugin-react": "^7.35.0", |     "eslint-plugin-react": "^7.37.3", | ||||||
|     "eslint-plugin-react-hooks": "^4.6.2", |     "eslint-plugin-react-hooks": "^5.1.0", | ||||||
|     "prettier": "3.1.0", |     "prettier": "3.4.2", | ||||||
|     "typescript": "^5.5.4", |     "typescript": "^5.7.2", | ||||||
|     "vite": "^4.5.3" |     "vite": "^6.0.5" | ||||||
|   }, |   }, | ||||||
|   "packageManager": "pnpm@8.15.7" |   "packageManager": "pnpm@9.15.1" | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										5009
									
								
								apps/gpgui-helper/pnpm-lock.yaml
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										5009
									
								
								apps/gpgui-helper/pnpm-lock.yaml
									
									
									
										generated
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -1,16 +1,18 @@ | |||||||
| [package] | [package] | ||||||
| name = "gpgui-helper" | name = "gpgui-helper" | ||||||
|  | rust-version.workspace = true | ||||||
| authors.workspace = true | authors.workspace = true | ||||||
| version.workspace = true | version.workspace = true | ||||||
| edition.workspace = true | edition.workspace = true | ||||||
| license.workspace = true | license.workspace = true | ||||||
|  |  | ||||||
| [build-dependencies] | [build-dependencies] | ||||||
| tauri-build = { version = "1.5", features = [] } | tauri-build = { version = "2", features = [] } | ||||||
|  |  | ||||||
| [dependencies] | [dependencies] | ||||||
| gpapi = { path = "../../../crates/gpapi", features = ["tauri"] } | gpapi = { path = "../../../crates/gpapi", features = ["tauri", "clap"] } | ||||||
| tauri = { workspace = true, features = ["window-start-dragging"] } | tauri.workspace = true | ||||||
|  |  | ||||||
| tokio.workspace = true | tokio.workspace = true | ||||||
| anyhow.workspace = true | anyhow.workspace = true | ||||||
| log.workspace = true | log.workspace = true | ||||||
|   | |||||||
							
								
								
									
										12
									
								
								apps/gpgui-helper/src-tauri/capabilities/default.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								apps/gpgui-helper/src-tauri/capabilities/default.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,12 @@ | |||||||
|  | { | ||||||
|  |   "$schema": "../gen/schemas/desktop-schema.json", | ||||||
|  |   "identifier": "default", | ||||||
|  |   "description": "Capability for the main window", | ||||||
|  |   "windows": ["main"], | ||||||
|  |   "permissions": [ | ||||||
|  |     "core:window:allow-start-dragging", | ||||||
|  |     "core:event:allow-listen", | ||||||
|  |     "core:event:allow-emit", | ||||||
|  |     "core:event:allow-unlisten" | ||||||
|  |   ] | ||||||
|  | } | ||||||
| @@ -1,8 +1,7 @@ | |||||||
| use std::sync::Arc; | use std::sync::Arc; | ||||||
|  |  | ||||||
| use gpapi::utils::window::WindowExt; |  | ||||||
| use log::info; | use log::info; | ||||||
| use tauri::Manager; | use tauri::{Listener, Manager}; | ||||||
|  |  | ||||||
| use crate::updater::{GuiUpdater, Installer, ProgressNotifier}; | use crate::updater::{GuiUpdater, Installer, ProgressNotifier}; | ||||||
|  |  | ||||||
| @@ -25,15 +24,15 @@ impl App { | |||||||
|  |  | ||||||
|     tauri::Builder::default() |     tauri::Builder::default() | ||||||
|       .setup(move |app| { |       .setup(move |app| { | ||||||
|         let win = app.get_window("main").expect("no main window"); |         let win = app.get_webview_window("main").expect("no main window"); | ||||||
|         win.hide_menu(); |         let _ = win.hide_menu(); | ||||||
|  |  | ||||||
|         let notifier = ProgressNotifier::new(win.clone()); |         let notifier = ProgressNotifier::new(win.clone()); | ||||||
|         let installer = Installer::new(api_key); |         let installer = Installer::new(api_key); | ||||||
|         let updater = Arc::new(GuiUpdater::new(gui_version, notifier, installer)); |         let updater = Arc::new(GuiUpdater::new(gui_version, notifier, installer)); | ||||||
|  |  | ||||||
|         let win_clone = win.clone(); |         let win_clone = win.clone(); | ||||||
|         app.listen_global("app://update-done", move |_event| { |         app.listen_any("app://update-done", move |_event| { | ||||||
|           info!("Update done"); |           info!("Update done"); | ||||||
|           let _ = win_clone.close(); |           let _ = win_clone.close(); | ||||||
|         }); |         }); | ||||||
| @@ -41,12 +40,15 @@ impl App { | |||||||
|         // Listen for the update event |         // Listen for the update event | ||||||
|         win.listen("app://update", move |_event| { |         win.listen("app://update", move |_event| { | ||||||
|           let updater = Arc::clone(&updater); |           let updater = Arc::clone(&updater); | ||||||
|  |           if updater.is_in_progress() { | ||||||
|  |             info!("Update already in progress"); | ||||||
|  |             updater.notify_progress(); | ||||||
|  |             return; | ||||||
|  |           } | ||||||
|  |  | ||||||
|           tokio::spawn(async move { updater.update().await }); |           tokio::spawn(async move { updater.update().await }); | ||||||
|         }); |         }); | ||||||
|  |  | ||||||
|         // Update the GUI on startup |  | ||||||
|         win.trigger("app://update", None); |  | ||||||
|  |  | ||||||
|         Ok(()) |         Ok(()) | ||||||
|       }) |       }) | ||||||
|       .run(tauri::generate_context!())?; |       .run(tauri::generate_context!())?; | ||||||
|   | |||||||
| @@ -1,6 +1,9 @@ | |||||||
| use clap::Parser; | use clap::Parser; | ||||||
| use gpapi::utils::base64; | use gpapi::{ | ||||||
| use log::{info, LevelFilter}; |   clap::InfoLevelVerbosity, | ||||||
|  |   utils::{base64, env_utils}, | ||||||
|  | }; | ||||||
|  | use log::info; | ||||||
|  |  | ||||||
| use crate::app::App; | use crate::app::App; | ||||||
|  |  | ||||||
| @@ -15,6 +18,9 @@ struct Cli { | |||||||
|  |  | ||||||
|   #[arg(long, default_value = env!("CARGO_PKG_VERSION"), help = "The version of the GUI")] |   #[arg(long, default_value = env!("CARGO_PKG_VERSION"), help = "The version of the GUI")] | ||||||
|   gui_version: String, |   gui_version: String, | ||||||
|  |  | ||||||
|  |   #[command(flatten)] | ||||||
|  |   verbose: InfoLevelVerbosity, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Cli { | impl Cli { | ||||||
| @@ -22,6 +28,8 @@ impl Cli { | |||||||
|     let api_key = self.read_api_key()?; |     let api_key = self.read_api_key()?; | ||||||
|     let app = App::new(api_key, &self.gui_version); |     let app = App::new(api_key, &self.gui_version); | ||||||
|  |  | ||||||
|  |     env_utils::patch_gui_runtime_env(false); | ||||||
|  |  | ||||||
|     app.run() |     app.run() | ||||||
|   } |   } | ||||||
|  |  | ||||||
| @@ -39,14 +47,16 @@ impl Cli { | |||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| fn init_logger() { | fn init_logger(cli: &Cli) { | ||||||
|   env_logger::builder().filter_level(LevelFilter::Info).init(); |   env_logger::builder() | ||||||
|  |     .filter_level(cli.verbose.log_level_filter()) | ||||||
|  |     .init(); | ||||||
| } | } | ||||||
|  |  | ||||||
| pub fn run() { | pub fn run() { | ||||||
|   let cli = Cli::parse(); |   let cli = Cli::parse(); | ||||||
|  |  | ||||||
|   init_logger(); |   init_logger(&cli); | ||||||
|   info!("gpgui-helper started: {}", VERSION); |   info!("gpgui-helper started: {}", VERSION); | ||||||
|  |  | ||||||
|   if let Err(e) = cli.run() { |   if let Err(e) = cli.run() { | ||||||
|   | |||||||
| @@ -1,39 +1,39 @@ | |||||||
| use std::sync::Arc; | use std::sync::{Arc, RwLock}; | ||||||
|  |  | ||||||
| use gpapi::{ | use gpapi::{ | ||||||
|   service::request::UpdateGuiRequest, |   service::request::UpdateGuiRequest, | ||||||
|   utils::{checksum::verify_checksum, crypto::Crypto, endpoint::http_endpoint}, |   utils::{checksum::verify_checksum, crypto::Crypto, endpoint::http_endpoint}, | ||||||
| }; | }; | ||||||
| use log::{info, warn}; | use log::{info, warn}; | ||||||
| use tauri::{Manager, Window}; | use tauri::{Emitter, WebviewWindow}; | ||||||
|  |  | ||||||
| use crate::downloader::{ChecksumFetcher, FileDownloader}; | use crate::downloader::{ChecksumFetcher, FileDownloader}; | ||||||
|  |  | ||||||
| #[cfg(not(debug_assertions))] | #[cfg(not(debug_assertions))] | ||||||
| const SNAPSHOT: &str = match option_env!("SNAPSHOT") { | const SNAPSHOT: &str = match option_env!("SNAPSHOT") { | ||||||
|   Some(val) => val, |   Some(val) => val, | ||||||
|     None => "false" |   None => "false", | ||||||
| }; | }; | ||||||
|  |  | ||||||
| pub struct ProgressNotifier { | pub struct ProgressNotifier { | ||||||
|   win: Window, |   win: WebviewWindow, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl ProgressNotifier { | impl ProgressNotifier { | ||||||
|   pub fn new(win: Window) -> Self { |   pub fn new(win: WebviewWindow) -> Self { | ||||||
|     Self { win } |     Self { win } | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   fn notify(&self, progress: Option<f64>) { |   fn notify(&self, progress: Option<f64>) { | ||||||
|     let _ = self.win.emit_all("app://update-progress", progress); |     let _ = self.win.emit("app://update-progress", progress); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   fn notify_error(&self) { |   fn notify_error(&self) { | ||||||
|     let _ = self.win.emit_all("app://update-error", ()); |     let _ = self.win.emit("app://update-error", ()); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   fn notify_done(&self) { |   fn notify_done(&self) { | ||||||
|     let _ = self.win.emit_and_trigger("app://update-done", ()); |     let _ = self.win.emit("app://update-done", ()); | ||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -72,6 +72,8 @@ pub struct GuiUpdater { | |||||||
|   version: String, |   version: String, | ||||||
|   notifier: Arc<ProgressNotifier>, |   notifier: Arc<ProgressNotifier>, | ||||||
|   installer: Installer, |   installer: Installer, | ||||||
|  |   in_progress: RwLock<bool>, | ||||||
|  |   progress: Arc<RwLock<Option<f64>>>, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl GuiUpdater { | impl GuiUpdater { | ||||||
| @@ -80,6 +82,8 @@ impl GuiUpdater { | |||||||
|       version, |       version, | ||||||
|       notifier: Arc::new(notifier), |       notifier: Arc::new(notifier), | ||||||
|       installer, |       installer, | ||||||
|  |       in_progress: Default::default(), | ||||||
|  |       progress: Default::default(), | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
|  |  | ||||||
| @@ -112,15 +116,23 @@ impl GuiUpdater { | |||||||
|     let cf = ChecksumFetcher::new(&checksum_url); |     let cf = ChecksumFetcher::new(&checksum_url); | ||||||
|     let notifier = Arc::clone(&self.notifier); |     let notifier = Arc::clone(&self.notifier); | ||||||
|  |  | ||||||
|     dl.on_progress(move |progress| notifier.notify(progress)); |     let progress_ref = Arc::clone(&self.progress); | ||||||
|  |     dl.on_progress(move |progress| { | ||||||
|  |       // Save progress to shared state so that it can be notified to the UI when needed | ||||||
|  |       if let Ok(mut guard) = progress_ref.try_write() { | ||||||
|  |         *guard = progress; | ||||||
|  |       } | ||||||
|  |       notifier.notify(progress); | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     self.set_in_progress(true); | ||||||
|     let res = tokio::try_join!(dl.download(), cf.fetch()); |     let res = tokio::try_join!(dl.download(), cf.fetch()); | ||||||
|  |  | ||||||
|     let (file, checksum) = match res { |     let (file, checksum) = match res { | ||||||
|       Ok((file, checksum)) => (file, checksum), |       Ok((file, checksum)) => (file, checksum), | ||||||
|       Err(err) => { |       Err(err) => { | ||||||
|         warn!("Download error: {}", err); |         warn!("Download error: {}", err); | ||||||
|         self.notifier.notify_error(); |         self.notify_error(); | ||||||
|         return; |         return; | ||||||
|       } |       } | ||||||
|     }; |     }; | ||||||
| @@ -130,7 +142,7 @@ impl GuiUpdater { | |||||||
|  |  | ||||||
|     if let Err(err) = verify_checksum(&file_path, &checksum) { |     if let Err(err) = verify_checksum(&file_path, &checksum) { | ||||||
|       warn!("Checksum error: {}", err); |       warn!("Checksum error: {}", err); | ||||||
|       self.notifier.notify_error(); |       self.notify_error(); | ||||||
|       return; |       return; | ||||||
|     } |     } | ||||||
|  |  | ||||||
| @@ -138,10 +150,48 @@ impl GuiUpdater { | |||||||
|  |  | ||||||
|     if let Err(err) = self.installer.install(&file_path, &checksum).await { |     if let Err(err) = self.installer.install(&file_path, &checksum).await { | ||||||
|       warn!("Install error: {}", err); |       warn!("Install error: {}", err); | ||||||
|       self.notifier.notify_error(); |       self.notify_error(); | ||||||
|     } else { |     } else { | ||||||
|       info!("Install success"); |       info!("Install success"); | ||||||
|  |       self.notify_done(); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn is_in_progress(&self) -> bool { | ||||||
|  |     if let Ok(guard) = self.in_progress.try_read() { | ||||||
|  |       *guard | ||||||
|  |     } else { | ||||||
|  |       info!("Failed to acquire in_progress lock"); | ||||||
|  |       false | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn set_in_progress(&self, in_progress: bool) { | ||||||
|  |     if let Ok(mut guard) = self.in_progress.try_write() { | ||||||
|  |       *guard = in_progress; | ||||||
|  |     } else { | ||||||
|  |       info!("Failed to acquire in_progress lock"); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn notify_error(&self) { | ||||||
|  |     self.set_in_progress(false); | ||||||
|  |     self.notifier.notify_error(); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn notify_done(&self) { | ||||||
|  |     self.set_in_progress(false); | ||||||
|     self.notifier.notify_done(); |     self.notifier.notify_done(); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   pub fn notify_progress(&self) { | ||||||
|  |     let progress = if let Ok(guard) = self.progress.try_read() { | ||||||
|  |       *guard | ||||||
|  |     } else { | ||||||
|  |       info!("Failed to acquire progress lock"); | ||||||
|  |       None | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     self.notifier.notify(progress); | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,35 +1,15 @@ | |||||||
| { | { | ||||||
|   "$schema": "../node_modules/@tauri-apps/cli/schema.json", |   "$schema": "../node_modules/@tauri-apps/cli/config.schema.json", | ||||||
|   "build": { |   "build": { | ||||||
|     "beforeDevCommand": "pnpm dev", |     "beforeDevCommand": "pnpm dev", | ||||||
|     "beforeBuildCommand": "pnpm build", |     "beforeBuildCommand": "pnpm build", | ||||||
|     "devPath": "http://localhost:1421", |     "devUrl": "http://localhost:1421", | ||||||
|     "distDir": "../dist", |     "frontendDist": "../dist" | ||||||
|     "withGlobalTauri": false |  | ||||||
|   }, |   }, | ||||||
|   "package": { |  | ||||||
|     "productName": "gpgui-helper" |  | ||||||
|   }, |  | ||||||
|   "tauri": { |  | ||||||
|     "allowlist": { |  | ||||||
|       "all": false, |  | ||||||
|       "window": { |  | ||||||
|         "all": false, |  | ||||||
|         "startDragging": true |  | ||||||
|       } |  | ||||||
|     }, |  | ||||||
|     "bundle": { |  | ||||||
|       "active": false, |  | ||||||
|       "targets": "deb", |  | ||||||
|   "identifier": "com.yuezk.gpgui-helper", |   "identifier": "com.yuezk.gpgui-helper", | ||||||
|       "icon": [ |   "productName": "gpgui-helper", | ||||||
|         "icons/32x32.png", |   "app": { | ||||||
|         "icons/128x128.png", |     "withGlobalTauri": false, | ||||||
|         "icons/128x128@2x.png", |  | ||||||
|         "icons/icon.icns", |  | ||||||
|         "icons/icon.ico" |  | ||||||
|       ] |  | ||||||
|     }, |  | ||||||
|     "security": { |     "security": { | ||||||
|       "csp": null |       "csp": null | ||||||
|     }, |     }, | ||||||
| @@ -48,5 +28,16 @@ | |||||||
|         "decorations": false |         "decorations": false | ||||||
|       } |       } | ||||||
|     ] |     ] | ||||||
|  |   }, | ||||||
|  |   "bundle": { | ||||||
|  |     "active": false, | ||||||
|  |     "targets": "deb", | ||||||
|  |     "icon": [ | ||||||
|  |       "icons/32x32.png", | ||||||
|  |       "icons/128x128.png", | ||||||
|  |       "icons/128x128@2x.png", | ||||||
|  |       "icons/icon.icns", | ||||||
|  |       "icons/icon.ico" | ||||||
|  |     ] | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -1,10 +1,12 @@ | |||||||
| import { Box, Button, CssBaseline, LinearProgress, Typography } from "@mui/material"; | import { Box, Button, CssBaseline, LinearProgress, Typography } from "@mui/material"; | ||||||
| import { appWindow } from "@tauri-apps/api/window"; | import { getCurrentWindow } from "@tauri-apps/api/window"; | ||||||
| import logo from "../../assets/icon.svg"; | import logo from "../../assets/icon.svg"; | ||||||
| import { useEffect, useState } from "react"; | import { useEffect, useState } from "react"; | ||||||
|  |  | ||||||
| import "./styles.css"; | import "./styles.css"; | ||||||
|  |  | ||||||
|  | const appWindow = getCurrentWindow(); | ||||||
|  |  | ||||||
| function useUpdateProgress() { | function useUpdateProgress() { | ||||||
|   const [progress, setProgress] = useState<number | null>(null); |   const [progress, setProgress] = useState<number | null>(null); | ||||||
|  |  | ||||||
| @@ -25,6 +27,8 @@ export default function App() { | |||||||
|   const [error, setError] = useState(false); |   const [error, setError] = useState(false); | ||||||
|  |  | ||||||
|   useEffect(() => { |   useEffect(() => { | ||||||
|  |     appWindow.emit("app://update"); | ||||||
|  |  | ||||||
|     const unlisten = appWindow.listen("app://update-error", () => { |     const unlisten = appWindow.listen("app://update-error", () => { | ||||||
|       setError(true); |       setError(true); | ||||||
|     }); |     }); | ||||||
|   | |||||||
| @@ -5,11 +5,11 @@ edition.workspace = true | |||||||
| license.workspace = true | license.workspace = true | ||||||
|  |  | ||||||
| [dependencies] | [dependencies] | ||||||
| gpapi = { path = "../../crates/gpapi" } | gpapi = { path = "../../crates/gpapi", features = ["clap", "logger"] } | ||||||
| openconnect = { path = "../../crates/openconnect" } | openconnect = { path = "../../crates/openconnect" } | ||||||
| clap.workspace = true | clap.workspace = true | ||||||
| anyhow.workspace = true | anyhow.workspace = true | ||||||
| tokio.workspace = true | tokio = { workspace = true, features = ["rt-multi-thread"] } | ||||||
| tokio-util.workspace = true | tokio-util.workspace = true | ||||||
| axum = { workspace = true, features = ["ws"] } | axum = { workspace = true, features = ["ws"] } | ||||||
| futures.workspace = true | futures.workspace = true | ||||||
|   | |||||||
| @@ -3,13 +3,15 @@ use std::{collections::HashMap, io::Write}; | |||||||
|  |  | ||||||
| use anyhow::bail; | use anyhow::bail; | ||||||
| use clap::Parser; | use clap::Parser; | ||||||
|  | use gpapi::clap::InfoLevelVerbosity; | ||||||
|  | use gpapi::logger; | ||||||
| use gpapi::{ | use gpapi::{ | ||||||
|   process::gui_launcher::GuiLauncher, |   process::gui_launcher::GuiLauncher, | ||||||
|   service::{request::WsRequest, vpn_state::VpnState}, |   service::{request::WsRequest, vpn_state::VpnState}, | ||||||
|   utils::{crypto::generate_key, env_file, lock_file::LockFile, redact::Redaction, shutdown_signal}, |   utils::{crypto::generate_key, env_utils, lock_file::LockFile, redact::Redaction, shutdown_signal}, | ||||||
|   GP_SERVICE_LOCK_FILE, |   GP_SERVICE_LOCK_FILE, | ||||||
| }; | }; | ||||||
| use log::{info, warn, LevelFilter}; | use log::{info, warn}; | ||||||
| use tokio::sync::{mpsc, watch}; | use tokio::sync::{mpsc, watch}; | ||||||
|  |  | ||||||
| use crate::{vpn_task::VpnTask, ws_server::WsServer}; | use crate::{vpn_task::VpnTask, ws_server::WsServer}; | ||||||
| @@ -26,11 +28,18 @@ struct Cli { | |||||||
|   #[cfg(debug_assertions)] |   #[cfg(debug_assertions)] | ||||||
|   #[clap(long)] |   #[clap(long)] | ||||||
|   no_gui: bool, |   no_gui: bool, | ||||||
|  |  | ||||||
|  |   #[command(flatten)] | ||||||
|  |   verbose: InfoLevelVerbosity, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Cli { | impl Cli { | ||||||
|   async fn run(&mut self, redaction: Arc<Redaction>) -> anyhow::Result<()> { |   async fn run(&mut self) -> anyhow::Result<()> { | ||||||
|     let lock_file = Arc::new(LockFile::new(GP_SERVICE_LOCK_FILE)); |     let redaction = self.init_logger(); | ||||||
|  |     info!("gpservice started: {}", VERSION); | ||||||
|  |  | ||||||
|  |     let pid = std::process::id(); | ||||||
|  |     let lock_file = Arc::new(LockFile::new(GP_SERVICE_LOCK_FILE, pid)); | ||||||
|  |  | ||||||
|     if lock_file.check_health().await { |     if lock_file.check_health().await { | ||||||
|       bail!("Another instance of the service is already running"); |       bail!("Another instance of the service is already running"); | ||||||
| @@ -48,9 +57,17 @@ impl Cli { | |||||||
|  |  | ||||||
|     let (shutdown_tx, mut shutdown_rx) = mpsc::channel::<()>(4); |     let (shutdown_tx, mut shutdown_rx) = mpsc::channel::<()>(4); | ||||||
|     let shutdown_tx_clone = shutdown_tx.clone(); |     let shutdown_tx_clone = shutdown_tx.clone(); | ||||||
|     let vpn_task_token = vpn_task.cancel_token(); |     let vpn_task_cancel_token = vpn_task.cancel_token(); | ||||||
|     let server_token = ws_server.cancel_token(); |     let server_token = ws_server.cancel_token(); | ||||||
|  |  | ||||||
|  |     #[cfg(unix)] | ||||||
|  |     { | ||||||
|  |       let vpn_ctx = vpn_task.context(); | ||||||
|  |       let ws_ctx = ws_server.context(); | ||||||
|  |  | ||||||
|  |       tokio::spawn(async move { signals::handle_signals(vpn_ctx, ws_ctx).await }); | ||||||
|  |     } | ||||||
|  |  | ||||||
|     let vpn_task_handle = tokio::spawn(async move { vpn_task.start(server_token).await }); |     let vpn_task_handle = tokio::spawn(async move { vpn_task.start(server_token).await }); | ||||||
|     let ws_server_handle = tokio::spawn(async move { ws_server.start(shutdown_tx_clone).await }); |     let ws_server_handle = tokio::spawn(async move { ws_server.start(shutdown_tx_clone).await }); | ||||||
|  |  | ||||||
| @@ -63,7 +80,7 @@ impl Cli { | |||||||
|     if no_gui { |     if no_gui { | ||||||
|       info!("GUI is disabled"); |       info!("GUI is disabled"); | ||||||
|     } else { |     } else { | ||||||
|       let envs = self.env_file.as_ref().map(env_file::load_env_vars).transpose()?; |       let envs = self.env_file.as_ref().map(env_utils::load_env_vars).transpose()?; | ||||||
|  |  | ||||||
|       let minimized = self.minimized; |       let minimized = self.minimized; | ||||||
|  |  | ||||||
| @@ -82,7 +99,7 @@ impl Cli { | |||||||
|       } |       } | ||||||
|     } |     } | ||||||
|  |  | ||||||
|     vpn_task_token.cancel(); |     vpn_task_cancel_token.cancel(); | ||||||
|     let _ = tokio::join!(vpn_task_handle, ws_server_handle); |     let _ = tokio::join!(vpn_task_handle, ws_server_handle); | ||||||
|  |  | ||||||
|     lock_file.unlock()?; |     lock_file.unlock()?; | ||||||
| @@ -92,6 +109,33 @@ impl Cli { | |||||||
|     Ok(()) |     Ok(()) | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   fn init_logger(&self) -> Arc<Redaction> { | ||||||
|  |     let redaction = Arc::new(Redaction::new()); | ||||||
|  |     let redaction_clone = Arc::clone(&redaction); | ||||||
|  |  | ||||||
|  |     let inner_logger = env_logger::builder() | ||||||
|  |       // Set the log level to the Trace level, the logs will be filtered | ||||||
|  |       .filter_level(log::LevelFilter::Trace) | ||||||
|  |       .format(move |buf, record| { | ||||||
|  |         let timestamp = buf.timestamp(); | ||||||
|  |         writeln!( | ||||||
|  |           buf, | ||||||
|  |           "[{} {}  {}] {}", | ||||||
|  |           timestamp, | ||||||
|  |           record.level(), | ||||||
|  |           record.module_path().unwrap_or_default(), | ||||||
|  |           redaction_clone.redact_str(&record.args().to_string()) | ||||||
|  |         ) | ||||||
|  |       }) | ||||||
|  |       .build(); | ||||||
|  |  | ||||||
|  |     let level = self.verbose.log_level_filter().to_level().unwrap_or(log::Level::Info); | ||||||
|  |  | ||||||
|  |     logger::init_with_logger(level, inner_logger); | ||||||
|  |  | ||||||
|  |     redaction | ||||||
|  |   } | ||||||
|  |  | ||||||
|   fn prepare_api_key(&self) -> Vec<u8> { |   fn prepare_api_key(&self) -> Vec<u8> { | ||||||
|     #[cfg(debug_assertions)] |     #[cfg(debug_assertions)] | ||||||
|     if self.no_gui { |     if self.no_gui { | ||||||
| @@ -102,27 +146,52 @@ impl Cli { | |||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| fn init_logger() -> Arc<Redaction> { | #[cfg(unix)] | ||||||
|   let redaction = Arc::new(Redaction::new()); | mod signals { | ||||||
|   let redaction_clone = Arc::clone(&redaction); |   use std::sync::Arc; | ||||||
|   // let target = Box::new(File::create("log.txt").expect("Can't create file")); |  | ||||||
|   env_logger::builder() |  | ||||||
|     .filter_level(LevelFilter::Info) |  | ||||||
|     .format(move |buf, record| { |  | ||||||
|       let timestamp = buf.timestamp(); |  | ||||||
|       writeln!( |  | ||||||
|         buf, |  | ||||||
|         "[{} {}  {}] {}", |  | ||||||
|         timestamp, |  | ||||||
|         record.level(), |  | ||||||
|         record.module_path().unwrap_or_default(), |  | ||||||
|         redaction_clone.redact_str(&record.args().to_string()) |  | ||||||
|       ) |  | ||||||
|     }) |  | ||||||
|     // .target(env_logger::Target::Pipe(target)) |  | ||||||
|     .init(); |  | ||||||
|  |  | ||||||
|   redaction |   use log::{info, warn}; | ||||||
|  |  | ||||||
|  |   use crate::vpn_task::VpnTaskContext; | ||||||
|  |   use crate::ws_server::WsServerContext; | ||||||
|  |  | ||||||
|  |   const DISCONNECTED_PID_FILE: &str = "/tmp/gpservice_disconnected.pid"; | ||||||
|  |  | ||||||
|  |   pub async fn handle_signals(vpn_ctx: Arc<VpnTaskContext>, ws_ctx: Arc<WsServerContext>) { | ||||||
|  |     use gpapi::service::event::WsEvent; | ||||||
|  |     use tokio::signal::unix::{signal, Signal, SignalKind}; | ||||||
|  |  | ||||||
|  |     let (mut user_sig1, mut user_sig2) = match || -> anyhow::Result<(Signal, Signal)> { | ||||||
|  |       let user_sig1 = signal(SignalKind::user_defined1())?; | ||||||
|  |       let user_sig2 = signal(SignalKind::user_defined2())?; | ||||||
|  |       Ok((user_sig1, user_sig2)) | ||||||
|  |     }() { | ||||||
|  |       Ok(signals) => signals, | ||||||
|  |       Err(err) => { | ||||||
|  |         warn!("Failed to create signal: {}", err); | ||||||
|  |         return; | ||||||
|  |       } | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     loop { | ||||||
|  |       tokio::select! { | ||||||
|  |         _ = user_sig1.recv() => { | ||||||
|  |           info!("Received SIGUSR1 signal"); | ||||||
|  |           if vpn_ctx.disconnect().await { | ||||||
|  |             // Write the PID to a dedicated file to indicate that the VPN task is disconnected via SIGUSR1 | ||||||
|  |             let pid = std::process::id(); | ||||||
|  |             if let Err(err) = tokio::fs::write(DISCONNECTED_PID_FILE, pid.to_string()).await { | ||||||
|  |               warn!("Failed to write PID to file: {}", err); | ||||||
|  |             } | ||||||
|  |           } | ||||||
|  |         } | ||||||
|  |         _ = user_sig2.recv() => { | ||||||
|  |           info!("Received SIGUSR2 signal"); | ||||||
|  |           ws_ctx.send_event(WsEvent::ResumeConnection).await; | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| async fn launch_gui(envs: Option<HashMap<String, String>>, api_key: Vec<u8>, mut minimized: bool) { | async fn launch_gui(envs: Option<HashMap<String, String>>, api_key: Vec<u8>, mut minimized: bool) { | ||||||
| @@ -153,10 +222,7 @@ async fn launch_gui(envs: Option<HashMap<String, String>>, api_key: Vec<u8>, mut | |||||||
| pub async fn run() { | pub async fn run() { | ||||||
|   let mut cli = Cli::parse(); |   let mut cli = Cli::parse(); | ||||||
|  |  | ||||||
|   let redaction = init_logger(); |   if let Err(e) = cli.run().await { | ||||||
|   info!("gpservice started: {}", VERSION); |  | ||||||
|  |  | ||||||
|   if let Err(e) = cli.run(redaction).await { |  | ||||||
|     eprintln!("Error: {}", e); |     eprintln!("Error: {}", e); | ||||||
|     std::process::exit(1); |     std::process::exit(1); | ||||||
|   } |   } | ||||||
|   | |||||||
| @@ -1,5 +1,4 @@ | |||||||
| use std::{ | use std::{ | ||||||
|   borrow::Cow, |  | ||||||
|   fs::{File, Permissions}, |   fs::{File, Permissions}, | ||||||
|   io::BufReader, |   io::BufReader, | ||||||
|   ops::ControlFlow, |   ops::ControlFlow, | ||||||
| @@ -12,7 +11,7 @@ use anyhow::bail; | |||||||
| use axum::{ | use axum::{ | ||||||
|   body::Bytes, |   body::Bytes, | ||||||
|   extract::{ |   extract::{ | ||||||
|     ws::{self, CloseFrame, Message, WebSocket}, |     ws::{self, CloseFrame, Message, Utf8Bytes, WebSocket}, | ||||||
|     State, WebSocketUpgrade, |     State, WebSocketUpgrade, | ||||||
|   }, |   }, | ||||||
|   http::StatusCode, |   http::StatusCode, | ||||||
| @@ -39,10 +38,6 @@ pub(crate) async fn active_gui(State(ctx): State<Arc<WsServerContext>>) -> impl | |||||||
|   ctx.send_event(WsEvent::ActiveGui).await; |   ctx.send_event(WsEvent::ActiveGui).await; | ||||||
| } | } | ||||||
|  |  | ||||||
| pub(crate) async fn auth_data(State(ctx): State<Arc<WsServerContext>>, body: String) -> impl IntoResponse { |  | ||||||
|   ctx.send_event(WsEvent::AuthData(body)).await; |  | ||||||
| } |  | ||||||
|  |  | ||||||
| pub async fn update_gui(State(ctx): State<Arc<WsServerContext>>, body: Bytes) -> Result<(), StatusCode> { | pub async fn update_gui(State(ctx): State<Arc<WsServerContext>>, body: Bytes) -> Result<(), StatusCode> { | ||||||
|   let payload = match ctx.decrypt::<UpdateGuiRequest>(body.to_vec()) { |   let payload = match ctx.decrypt::<UpdateGuiRequest>(body.to_vec()) { | ||||||
|     Ok(payload) => payload, |     Ok(payload) => payload, | ||||||
| @@ -137,7 +132,7 @@ async fn handle_socket(mut socket: WebSocket, ctx: Arc<WsServerContext>) { | |||||||
|  |  | ||||||
|     let close_msg = Message::Close(Some(CloseFrame { |     let close_msg = Message::Close(Some(CloseFrame { | ||||||
|       code: ws::close_code::NORMAL, |       code: ws::close_code::NORMAL, | ||||||
|       reason: Cow::from("Goodbye"), |       reason: Utf8Bytes::from("Goodbye"), | ||||||
|     })); |     })); | ||||||
|  |  | ||||||
|     if let Err(err) = sender.send(close_msg).await { |     if let Err(err) = sender.send(close_msg).await { | ||||||
|   | |||||||
| @@ -11,7 +11,6 @@ pub(crate) fn routes(ctx: Arc<WsServerContext>) -> Router { | |||||||
|   Router::new() |   Router::new() | ||||||
|     .route("/health", get(handlers::health)) |     .route("/health", get(handlers::health)) | ||||||
|     .route("/active-gui", post(handlers::active_gui)) |     .route("/active-gui", post(handlers::active_gui)) | ||||||
|     .route("/auth-data", post(handlers::auth_data)) |  | ||||||
|     .route("/update-gui", post(handlers::update_gui)) |     .route("/update-gui", post(handlers::update_gui)) | ||||||
|     .route("/ws", get(handlers::ws_handler)) |     .route("/ws", get(handlers::ws_handler)) | ||||||
|     .with_state(ctx) |     .with_state(ctx) | ||||||
|   | |||||||
| @@ -1,8 +1,11 @@ | |||||||
| use std::{sync::Arc, thread}; | use std::{sync::Arc, thread}; | ||||||
|  |  | ||||||
| use gpapi::service::{ | use gpapi::{ | ||||||
|   request::{ConnectRequest, WsRequest}, |   logger, | ||||||
|  |   service::{ | ||||||
|  |     request::{ConnectRequest, UpdateLogLevelRequest, WsRequest}, | ||||||
|     vpn_state::VpnState, |     vpn_state::VpnState, | ||||||
|  |   }, | ||||||
| }; | }; | ||||||
| use log::{info, warn}; | use log::{info, warn}; | ||||||
| use openconnect::Vpn; | use openconnect::Vpn; | ||||||
| @@ -87,7 +90,7 @@ impl VpnTaskContext { | |||||||
|     }); |     }); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub async fn disconnect(&self) { |   pub async fn disconnect(&self) -> bool { | ||||||
|     if let Some(disconnect_rx) = self.disconnect_rx.write().await.take() { |     if let Some(disconnect_rx) = self.disconnect_rx.write().await.take() { | ||||||
|       info!("Disconnecting VPN..."); |       info!("Disconnecting VPN..."); | ||||||
|       if let Some(vpn) = self.vpn_handle.read().await.as_ref() { |       if let Some(vpn) = self.vpn_handle.read().await.as_ref() { | ||||||
| @@ -98,9 +101,13 @@ impl VpnTaskContext { | |||||||
|       // Wait for the VPN to be disconnected |       // Wait for the VPN to be disconnected | ||||||
|       disconnect_rx.await.ok(); |       disconnect_rx.await.ok(); | ||||||
|       info!("VPN disconnected"); |       info!("VPN disconnected"); | ||||||
|  |  | ||||||
|  |       true | ||||||
|     } else { |     } else { | ||||||
|       info!("VPN is not connected, skip disconnect"); |       info!("VPN is not connected, skip disconnect"); | ||||||
|       self.vpn_state_tx.send(VpnState::Disconnected).ok(); |       self.vpn_state_tx.send(VpnState::Disconnected).ok(); | ||||||
|  |  | ||||||
|  |       false | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
| } | } | ||||||
| @@ -143,6 +150,10 @@ impl VpnTask { | |||||||
|     server_cancel_token.cancel(); |     server_cancel_token.cancel(); | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   pub fn context(&self) -> Arc<VpnTaskContext> { | ||||||
|  |     return Arc::clone(&self.ctx); | ||||||
|  |   } | ||||||
|  |  | ||||||
|   async fn recv(&mut self) { |   async fn recv(&mut self) { | ||||||
|     while let Some(req) = self.ws_req_rx.recv().await { |     while let Some(req) = self.ws_req_rx.recv().await { | ||||||
|       tokio::spawn(process_ws_req(req, self.ctx.clone())); |       tokio::spawn(process_ws_req(req, self.ctx.clone())); | ||||||
| @@ -158,5 +169,12 @@ async fn process_ws_req(req: WsRequest, ctx: Arc<VpnTaskContext>) { | |||||||
|     WsRequest::Disconnect(_) => { |     WsRequest::Disconnect(_) => { | ||||||
|       ctx.disconnect().await; |       ctx.disconnect().await; | ||||||
|     } |     } | ||||||
|  |     WsRequest::UpdateLogLevel(UpdateLogLevelRequest(level)) => { | ||||||
|  |       let level = level.parse().unwrap_or_else(|_| log::Level::Info); | ||||||
|  |       info!("Updating log level to: {}", level); | ||||||
|  |       if let Err(err) = logger::set_max_level(level) { | ||||||
|  |         warn!("Failed to update log level: {}", err); | ||||||
|  |       } | ||||||
|  |     } | ||||||
|   } |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -20,7 +20,7 @@ impl WsConnection { | |||||||
|  |  | ||||||
|   pub async fn send_event(&self, event: &WsEvent) -> anyhow::Result<()> { |   pub async fn send_event(&self, event: &WsEvent) -> anyhow::Result<()> { | ||||||
|     let encrypted = self.crypto.encrypt(event)?; |     let encrypted = self.crypto.encrypt(event)?; | ||||||
|     let msg = Message::Binary(encrypted); |     let msg = Message::Binary(encrypted.into()); | ||||||
|  |  | ||||||
|     self.tx.send(msg).await?; |     self.tx.send(msg).await?; | ||||||
|  |  | ||||||
| @@ -29,7 +29,7 @@ impl WsConnection { | |||||||
|  |  | ||||||
|   pub fn recv_msg(&self, msg: Message) -> ControlFlow<(), WsRequest> { |   pub fn recv_msg(&self, msg: Message) -> ControlFlow<(), WsRequest> { | ||||||
|     match msg { |     match msg { | ||||||
|       Message::Binary(data) => match self.crypto.decrypt(data) { |       Message::Binary(data) => match self.crypto.decrypt(data.into()) { | ||||||
|         Ok(ws_req) => ControlFlow::Continue(ws_req), |         Ok(ws_req) => ControlFlow::Continue(ws_req), | ||||||
|         Err(err) => { |         Err(err) => { | ||||||
|           info!("Failed to decrypt message: {}", err); |           info!("Failed to decrypt message: {}", err); | ||||||
|   | |||||||
| @@ -113,6 +113,10 @@ impl WsServer { | |||||||
|     } |     } | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   pub fn context(&self) -> Arc<WsServerContext> { | ||||||
|  |     Arc::clone(&self.ctx) | ||||||
|  |   } | ||||||
|  |  | ||||||
|   pub fn cancel_token(&self) -> CancellationToken { |   pub fn cancel_token(&self) -> CancellationToken { | ||||||
|     self.cancel_token.clone() |     self.cancel_token.clone() | ||||||
|   } |   } | ||||||
| @@ -124,7 +128,7 @@ impl WsServer { | |||||||
|         warn!("Failed to start WS server: {}", err); |         warn!("Failed to start WS server: {}", err); | ||||||
|         let _ = shutdown_tx.send(()).await; |         let _ = shutdown_tx.send(()).await; | ||||||
|         return; |         return; | ||||||
|       }, |       } | ||||||
|     }; |     }; | ||||||
|  |  | ||||||
|     tokio::select! { |     tokio::select! { | ||||||
| @@ -149,7 +153,7 @@ impl WsServer { | |||||||
|  |  | ||||||
|     info!("WS server listening on port: {}", port); |     info!("WS server listening on port: {}", port); | ||||||
|  |  | ||||||
|     self.lock_file.lock(port.to_string())?; |     self.lock_file.lock(&port.to_string())?; | ||||||
|  |  | ||||||
|     Ok(listener) |     Ok(listener) | ||||||
|   } |   } | ||||||
|   | |||||||
							
								
								
									
										20
									
								
								changelog.md
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								changelog.md
									
									
									
									
									
								
							| @@ -1,5 +1,25 @@ | |||||||
| # Changelog | # Changelog | ||||||
|  |  | ||||||
|  | ## 2.4.3 - 2025-01-21 | ||||||
|  |  | ||||||
|  | - Do not use static default value for `--os-version` option. | ||||||
|  |  | ||||||
|  | ## 2.4.2 - 2025-01-20 | ||||||
|  |  | ||||||
|  | - Disconnect the VPN when sleep (fix [#166](https://github.com/yuezk/GlobalProtect-openconnect/issues/166), [#267](https://github.com/yuezk/GlobalProtect-openconnect/issues/267)) | ||||||
|  |  | ||||||
|  | ## 2.4.1 - 2025-01-09 | ||||||
|  |  | ||||||
|  | - Fix the network issue with OpenSSL < 3.0.4 | ||||||
|  | - GUI: fix the Wayland compatibility issue | ||||||
|  | - Support configure the log level | ||||||
|  | - Log the detailed error message when network error occurs | ||||||
|  |  | ||||||
|  | ## 2.4.0 - 2024-12-26 | ||||||
|  |  | ||||||
|  | - Upgrade to Tauri 2.0 | ||||||
|  | - Support Ubuntu 22.04 and later | ||||||
|  |  | ||||||
| ## 2.3.9 - 2024-11-02 | ## 2.3.9 - 2024-11-02 | ||||||
|  |  | ||||||
| - Enhance the OpenSSL compatibility mode (fix [#437](https://github.com/yuezk/GlobalProtect-openconnect/issues/437)) | - Enhance the OpenSSL compatibility mode (fix [#437](https://github.com/yuezk/GlobalProtect-openconnect/issues/437)) | ||||||
|   | |||||||
							
								
								
									
										69
									
								
								crates/auth/Cargo.toml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										69
									
								
								crates/auth/Cargo.toml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,69 @@ | |||||||
|  | [package] | ||||||
|  | name = "auth" | ||||||
|  | rust-version.workspace = true | ||||||
|  | version.workspace = true | ||||||
|  | authors.workspace = true | ||||||
|  | homepage.workspace = true | ||||||
|  | edition.workspace = true | ||||||
|  | license.workspace = true | ||||||
|  |  | ||||||
|  | [dependencies] | ||||||
|  | gpapi = { path = "../gpapi" } | ||||||
|  |  | ||||||
|  | # Shared dependencies | ||||||
|  | anyhow.workspace = true | ||||||
|  | log.workspace = true | ||||||
|  | tokio.workspace = true | ||||||
|  |  | ||||||
|  | # Browser auth dependencies | ||||||
|  | webbrowser = { version = "1", optional = true } | ||||||
|  | open = { version = "5", optional = true } | ||||||
|  | which = { workspace = true, optional = true } | ||||||
|  | tiny_http = { version = "0.12", optional = true } | ||||||
|  | uuid = { version = "1", optional = true, features = ["v4"] } | ||||||
|  |  | ||||||
|  | # Webview auth dependencies | ||||||
|  | tauri = { workspace = true, optional = true } | ||||||
|  | regex = { workspace = true, optional = true } | ||||||
|  | tokio-util = { workspace = true, optional = true } | ||||||
|  | html-escape = { version = "0.2.13", optional = true } | ||||||
|  |  | ||||||
|  | [target.'cfg(not(any(target_os="macos", target_os="windows")))'.dependencies] | ||||||
|  | webkit2gtk = { version = "2", optional = true } | ||||||
|  |  | ||||||
|  | [target.'cfg(target_os="macos")'.dependencies] | ||||||
|  | block2 = { version = "0.5", optional = true } | ||||||
|  | objc2 = { version = "0.5", optional = true } | ||||||
|  | objc2-foundation = { version = "0.2", optional = true } | ||||||
|  | objc2-web-kit = { version = "0.2", optional = true } | ||||||
|  |  | ||||||
|  | [target.'cfg(target_os="windows")'.dependencies] | ||||||
|  | webview2-com = { version = "0.34", optional = true } | ||||||
|  | windows-core = { version = "0.58", optional = true } | ||||||
|  | windows = { version = "0.58", optional = true } | ||||||
|  | serde_json = { workspace = true, optional = true } | ||||||
|  |  | ||||||
|  | [features] | ||||||
|  | browser-auth = [ | ||||||
|  |   "dep:webbrowser", | ||||||
|  |   "dep:open", | ||||||
|  |   "dep:which", | ||||||
|  |   "dep:tiny_http", | ||||||
|  |   "dep:uuid", | ||||||
|  | ] | ||||||
|  | webview-auth = [ | ||||||
|  |   "gpapi/tauri", | ||||||
|  |   "dep:tauri", | ||||||
|  |   "dep:regex", | ||||||
|  |   "dep:tokio-util", | ||||||
|  |   "dep:html-escape", | ||||||
|  |   "dep:webkit2gtk", | ||||||
|  |   "dep:block2", | ||||||
|  |   "dep:objc2", | ||||||
|  |   "dep:objc2-foundation", | ||||||
|  |   "dep:objc2-web-kit", | ||||||
|  |   "dep:webview2-com", | ||||||
|  |   "dep:windows-core", | ||||||
|  |   "dep:windows", | ||||||
|  |   "dep:serde_json", | ||||||
|  | ] | ||||||
							
								
								
									
										674
									
								
								crates/auth/LICENSE
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										674
									
								
								crates/auth/LICENSE
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,674 @@ | |||||||
|  |                     GNU GENERAL PUBLIC LICENSE | ||||||
|  |                        Version 3, 29 June 2007 | ||||||
|  |  | ||||||
|  |  Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/> | ||||||
|  |  Everyone is permitted to copy and distribute verbatim copies | ||||||
|  |  of this license document, but changing it is not allowed. | ||||||
|  |  | ||||||
|  |                             Preamble | ||||||
|  |  | ||||||
|  |   The GNU General Public License is a free, copyleft license for | ||||||
|  | software and other kinds of works. | ||||||
|  |  | ||||||
|  |   The licenses for most software and other practical works are designed | ||||||
|  | to take away your freedom to share and change the works.  By contrast, | ||||||
|  | the GNU General Public License is intended to guarantee your freedom to | ||||||
|  | share and change all versions of a program--to make sure it remains free | ||||||
|  | software for all its users.  We, the Free Software Foundation, use the | ||||||
|  | GNU General Public License for most of our software; it applies also to | ||||||
|  | any other work released this way by its authors.  You can apply it to | ||||||
|  | your programs, too. | ||||||
|  |  | ||||||
|  |   When we speak of free software, we are referring to freedom, not | ||||||
|  | price.  Our General Public Licenses are designed to make sure that you | ||||||
|  | have the freedom to distribute copies of free software (and charge for | ||||||
|  | them if you wish), that you receive source code or can get it if you | ||||||
|  | want it, that you can change the software or use pieces of it in new | ||||||
|  | free programs, and that you know you can do these things. | ||||||
|  |  | ||||||
|  |   To protect your rights, we need to prevent others from denying you | ||||||
|  | these rights or asking you to surrender the rights.  Therefore, you have | ||||||
|  | certain responsibilities if you distribute copies of the software, or if | ||||||
|  | you modify it: responsibilities to respect the freedom of others. | ||||||
|  |  | ||||||
|  |   For example, if you distribute copies of such a program, whether | ||||||
|  | gratis or for a fee, you must pass on to the recipients the same | ||||||
|  | freedoms that you received.  You must make sure that they, too, receive | ||||||
|  | or can get the source code.  And you must show them these terms so they | ||||||
|  | know their rights. | ||||||
|  |  | ||||||
|  |   Developers that use the GNU GPL protect your rights with two steps: | ||||||
|  | (1) assert copyright on the software, and (2) offer you this License | ||||||
|  | giving you legal permission to copy, distribute and/or modify it. | ||||||
|  |  | ||||||
|  |   For the developers' and authors' protection, the GPL clearly explains | ||||||
|  | that there is no warranty for this free software.  For both users' and | ||||||
|  | authors' sake, the GPL requires that modified versions be marked as | ||||||
|  | changed, so that their problems will not be attributed erroneously to | ||||||
|  | authors of previous versions. | ||||||
|  |  | ||||||
|  |   Some devices are designed to deny users access to install or run | ||||||
|  | modified versions of the software inside them, although the manufacturer | ||||||
|  | can do so.  This is fundamentally incompatible with the aim of | ||||||
|  | protecting users' freedom to change the software.  The systematic | ||||||
|  | pattern of such abuse occurs in the area of products for individuals to | ||||||
|  | use, which is precisely where it is most unacceptable.  Therefore, we | ||||||
|  | have designed this version of the GPL to prohibit the practice for those | ||||||
|  | products.  If such problems arise substantially in other domains, we | ||||||
|  | stand ready to extend this provision to those domains in future versions | ||||||
|  | of the GPL, as needed to protect the freedom of users. | ||||||
|  |  | ||||||
|  |   Finally, every program is threatened constantly by software patents. | ||||||
|  | States should not allow patents to restrict development and use of | ||||||
|  | software on general-purpose computers, but in those that do, we wish to | ||||||
|  | avoid the special danger that patents applied to a free program could | ||||||
|  | make it effectively proprietary.  To prevent this, the GPL assures that | ||||||
|  | patents cannot be used to render the program non-free. | ||||||
|  |  | ||||||
|  |   The precise terms and conditions for copying, distribution and | ||||||
|  | modification follow. | ||||||
|  |  | ||||||
|  |                        TERMS AND CONDITIONS | ||||||
|  |  | ||||||
|  |   0. Definitions. | ||||||
|  |  | ||||||
|  |   "This License" refers to version 3 of the GNU General Public License. | ||||||
|  |  | ||||||
|  |   "Copyright" also means copyright-like laws that apply to other kinds of | ||||||
|  | works, such as semiconductor masks. | ||||||
|  |  | ||||||
|  |   "The Program" refers to any copyrightable work licensed under this | ||||||
|  | License.  Each licensee is addressed as "you".  "Licensees" and | ||||||
|  | "recipients" may be individuals or organizations. | ||||||
|  |  | ||||||
|  |   To "modify" a work means to copy from or adapt all or part of the work | ||||||
|  | in a fashion requiring copyright permission, other than the making of an | ||||||
|  | exact copy.  The resulting work is called a "modified version" of the | ||||||
|  | earlier work or a work "based on" the earlier work. | ||||||
|  |  | ||||||
|  |   A "covered work" means either the unmodified Program or a work based | ||||||
|  | on the Program. | ||||||
|  |  | ||||||
|  |   To "propagate" a work means to do anything with it that, without | ||||||
|  | permission, would make you directly or secondarily liable for | ||||||
|  | infringement under applicable copyright law, except executing it on a | ||||||
|  | computer or modifying a private copy.  Propagation includes copying, | ||||||
|  | distribution (with or without modification), making available to the | ||||||
|  | public, and in some countries other activities as well. | ||||||
|  |  | ||||||
|  |   To "convey" a work means any kind of propagation that enables other | ||||||
|  | parties to make or receive copies.  Mere interaction with a user through | ||||||
|  | a computer network, with no transfer of a copy, is not conveying. | ||||||
|  |  | ||||||
|  |   An interactive user interface displays "Appropriate Legal Notices" | ||||||
|  | to the extent that it includes a convenient and prominently visible | ||||||
|  | feature that (1) displays an appropriate copyright notice, and (2) | ||||||
|  | tells the user that there is no warranty for the work (except to the | ||||||
|  | extent that warranties are provided), that licensees may convey the | ||||||
|  | work under this License, and how to view a copy of this License.  If | ||||||
|  | the interface presents a list of user commands or options, such as a | ||||||
|  | menu, a prominent item in the list meets this criterion. | ||||||
|  |  | ||||||
|  |   1. Source Code. | ||||||
|  |  | ||||||
|  |   The "source code" for a work means the preferred form of the work | ||||||
|  | for making modifications to it.  "Object code" means any non-source | ||||||
|  | form of a work. | ||||||
|  |  | ||||||
|  |   A "Standard Interface" means an interface that either is an official | ||||||
|  | standard defined by a recognized standards body, or, in the case of | ||||||
|  | interfaces specified for a particular programming language, one that | ||||||
|  | is widely used among developers working in that language. | ||||||
|  |  | ||||||
|  |   The "System Libraries" of an executable work include anything, other | ||||||
|  | than the work as a whole, that (a) is included in the normal form of | ||||||
|  | packaging a Major Component, but which is not part of that Major | ||||||
|  | Component, and (b) serves only to enable use of the work with that | ||||||
|  | Major Component, or to implement a Standard Interface for which an | ||||||
|  | implementation is available to the public in source code form.  A | ||||||
|  | "Major Component", in this context, means a major essential component | ||||||
|  | (kernel, window system, and so on) of the specific operating system | ||||||
|  | (if any) on which the executable work runs, or a compiler used to | ||||||
|  | produce the work, or an object code interpreter used to run it. | ||||||
|  |  | ||||||
|  |   The "Corresponding Source" for a work in object code form means all | ||||||
|  | the source code needed to generate, install, and (for an executable | ||||||
|  | work) run the object code and to modify the work, including scripts to | ||||||
|  | control those activities.  However, it does not include the work's | ||||||
|  | System Libraries, or general-purpose tools or generally available free | ||||||
|  | programs which are used unmodified in performing those activities but | ||||||
|  | which are not part of the work.  For example, Corresponding Source | ||||||
|  | includes interface definition files associated with source files for | ||||||
|  | the work, and the source code for shared libraries and dynamically | ||||||
|  | linked subprograms that the work is specifically designed to require, | ||||||
|  | such as by intimate data communication or control flow between those | ||||||
|  | subprograms and other parts of the work. | ||||||
|  |  | ||||||
|  |   The Corresponding Source need not include anything that users | ||||||
|  | can regenerate automatically from other parts of the Corresponding | ||||||
|  | Source. | ||||||
|  |  | ||||||
|  |   The Corresponding Source for a work in source code form is that | ||||||
|  | same work. | ||||||
|  |  | ||||||
|  |   2. Basic Permissions. | ||||||
|  |  | ||||||
|  |   All rights granted under this License are granted for the term of | ||||||
|  | copyright on the Program, and are irrevocable provided the stated | ||||||
|  | conditions are met.  This License explicitly affirms your unlimited | ||||||
|  | permission to run the unmodified Program.  The output from running a | ||||||
|  | covered work is covered by this License only if the output, given its | ||||||
|  | content, constitutes a covered work.  This License acknowledges your | ||||||
|  | rights of fair use or other equivalent, as provided by copyright law. | ||||||
|  |  | ||||||
|  |   You may make, run and propagate covered works that you do not | ||||||
|  | convey, without conditions so long as your license otherwise remains | ||||||
|  | in force.  You may convey covered works to others for the sole purpose | ||||||
|  | of having them make modifications exclusively for you, or provide you | ||||||
|  | with facilities for running those works, provided that you comply with | ||||||
|  | the terms of this License in conveying all material for which you do | ||||||
|  | not control copyright.  Those thus making or running the covered works | ||||||
|  | for you must do so exclusively on your behalf, under your direction | ||||||
|  | and control, on terms that prohibit them from making any copies of | ||||||
|  | your copyrighted material outside their relationship with you. | ||||||
|  |  | ||||||
|  |   Conveying under any other circumstances is permitted solely under | ||||||
|  | the conditions stated below.  Sublicensing is not allowed; section 10 | ||||||
|  | makes it unnecessary. | ||||||
|  |  | ||||||
|  |   3. Protecting Users' Legal Rights From Anti-Circumvention Law. | ||||||
|  |  | ||||||
|  |   No covered work shall be deemed part of an effective technological | ||||||
|  | measure under any applicable law fulfilling obligations under article | ||||||
|  | 11 of the WIPO copyright treaty adopted on 20 December 1996, or | ||||||
|  | similar laws prohibiting or restricting circumvention of such | ||||||
|  | measures. | ||||||
|  |  | ||||||
|  |   When you convey a covered work, you waive any legal power to forbid | ||||||
|  | circumvention of technological measures to the extent such circumvention | ||||||
|  | is effected by exercising rights under this License with respect to | ||||||
|  | the covered work, and you disclaim any intention to limit operation or | ||||||
|  | modification of the work as a means of enforcing, against the work's | ||||||
|  | users, your or third parties' legal rights to forbid circumvention of | ||||||
|  | technological measures. | ||||||
|  |  | ||||||
|  |   4. Conveying Verbatim Copies. | ||||||
|  |  | ||||||
|  |   You may convey verbatim copies of the Program's source code as you | ||||||
|  | receive it, in any medium, provided that you conspicuously and | ||||||
|  | appropriately publish on each copy an appropriate copyright notice; | ||||||
|  | keep intact all notices stating that this License and any | ||||||
|  | non-permissive terms added in accord with section 7 apply to the code; | ||||||
|  | keep intact all notices of the absence of any warranty; and give all | ||||||
|  | recipients a copy of this License along with the Program. | ||||||
|  |  | ||||||
|  |   You may charge any price or no price for each copy that you convey, | ||||||
|  | and you may offer support or warranty protection for a fee. | ||||||
|  |  | ||||||
|  |   5. Conveying Modified Source Versions. | ||||||
|  |  | ||||||
|  |   You may convey a work based on the Program, or the modifications to | ||||||
|  | produce it from the Program, in the form of source code under the | ||||||
|  | terms of section 4, provided that you also meet all of these conditions: | ||||||
|  |  | ||||||
|  |     a) The work must carry prominent notices stating that you modified | ||||||
|  |     it, and giving a relevant date. | ||||||
|  |  | ||||||
|  |     b) The work must carry prominent notices stating that it is | ||||||
|  |     released under this License and any conditions added under section | ||||||
|  |     7.  This requirement modifies the requirement in section 4 to | ||||||
|  |     "keep intact all notices". | ||||||
|  |  | ||||||
|  |     c) You must license the entire work, as a whole, under this | ||||||
|  |     License to anyone who comes into possession of a copy.  This | ||||||
|  |     License will therefore apply, along with any applicable section 7 | ||||||
|  |     additional terms, to the whole of the work, and all its parts, | ||||||
|  |     regardless of how they are packaged.  This License gives no | ||||||
|  |     permission to license the work in any other way, but it does not | ||||||
|  |     invalidate such permission if you have separately received it. | ||||||
|  |  | ||||||
|  |     d) If the work has interactive user interfaces, each must display | ||||||
|  |     Appropriate Legal Notices; however, if the Program has interactive | ||||||
|  |     interfaces that do not display Appropriate Legal Notices, your | ||||||
|  |     work need not make them do so. | ||||||
|  |  | ||||||
|  |   A compilation of a covered work with other separate and independent | ||||||
|  | works, which are not by their nature extensions of the covered work, | ||||||
|  | and which are not combined with it such as to form a larger program, | ||||||
|  | in or on a volume of a storage or distribution medium, is called an | ||||||
|  | "aggregate" if the compilation and its resulting copyright are not | ||||||
|  | used to limit the access or legal rights of the compilation's users | ||||||
|  | beyond what the individual works permit.  Inclusion of a covered work | ||||||
|  | in an aggregate does not cause this License to apply to the other | ||||||
|  | parts of the aggregate. | ||||||
|  |  | ||||||
|  |   6. Conveying Non-Source Forms. | ||||||
|  |  | ||||||
|  |   You may convey a covered work in object code form under the terms | ||||||
|  | of sections 4 and 5, provided that you also convey the | ||||||
|  | machine-readable Corresponding Source under the terms of this License, | ||||||
|  | in one of these ways: | ||||||
|  |  | ||||||
|  |     a) Convey the object code in, or embodied in, a physical product | ||||||
|  |     (including a physical distribution medium), accompanied by the | ||||||
|  |     Corresponding Source fixed on a durable physical medium | ||||||
|  |     customarily used for software interchange. | ||||||
|  |  | ||||||
|  |     b) Convey the object code in, or embodied in, a physical product | ||||||
|  |     (including a physical distribution medium), accompanied by a | ||||||
|  |     written offer, valid for at least three years and valid for as | ||||||
|  |     long as you offer spare parts or customer support for that product | ||||||
|  |     model, to give anyone who possesses the object code either (1) a | ||||||
|  |     copy of the Corresponding Source for all the software in the | ||||||
|  |     product that is covered by this License, on a durable physical | ||||||
|  |     medium customarily used for software interchange, for a price no | ||||||
|  |     more than your reasonable cost of physically performing this | ||||||
|  |     conveying of source, or (2) access to copy the | ||||||
|  |     Corresponding Source from a network server at no charge. | ||||||
|  |  | ||||||
|  |     c) Convey individual copies of the object code with a copy of the | ||||||
|  |     written offer to provide the Corresponding Source.  This | ||||||
|  |     alternative is allowed only occasionally and noncommercially, and | ||||||
|  |     only if you received the object code with such an offer, in accord | ||||||
|  |     with subsection 6b. | ||||||
|  |  | ||||||
|  |     d) Convey the object code by offering access from a designated | ||||||
|  |     place (gratis or for a charge), and offer equivalent access to the | ||||||
|  |     Corresponding Source in the same way through the same place at no | ||||||
|  |     further charge.  You need not require recipients to copy the | ||||||
|  |     Corresponding Source along with the object code.  If the place to | ||||||
|  |     copy the object code is a network server, the Corresponding Source | ||||||
|  |     may be on a different server (operated by you or a third party) | ||||||
|  |     that supports equivalent copying facilities, provided you maintain | ||||||
|  |     clear directions next to the object code saying where to find the | ||||||
|  |     Corresponding Source.  Regardless of what server hosts the | ||||||
|  |     Corresponding Source, you remain obligated to ensure that it is | ||||||
|  |     available for as long as needed to satisfy these requirements. | ||||||
|  |  | ||||||
|  |     e) Convey the object code using peer-to-peer transmission, provided | ||||||
|  |     you inform other peers where the object code and Corresponding | ||||||
|  |     Source of the work are being offered to the general public at no | ||||||
|  |     charge under subsection 6d. | ||||||
|  |  | ||||||
|  |   A separable portion of the object code, whose source code is excluded | ||||||
|  | from the Corresponding Source as a System Library, need not be | ||||||
|  | included in conveying the object code work. | ||||||
|  |  | ||||||
|  |   A "User Product" is either (1) a "consumer product", which means any | ||||||
|  | tangible personal property which is normally used for personal, family, | ||||||
|  | or household purposes, or (2) anything designed or sold for incorporation | ||||||
|  | into a dwelling.  In determining whether a product is a consumer product, | ||||||
|  | doubtful cases shall be resolved in favor of coverage.  For a particular | ||||||
|  | product received by a particular user, "normally used" refers to a | ||||||
|  | typical or common use of that class of product, regardless of the status | ||||||
|  | of the particular user or of the way in which the particular user | ||||||
|  | actually uses, or expects or is expected to use, the product.  A product | ||||||
|  | is a consumer product regardless of whether the product has substantial | ||||||
|  | commercial, industrial or non-consumer uses, unless such uses represent | ||||||
|  | the only significant mode of use of the product. | ||||||
|  |  | ||||||
|  |   "Installation Information" for a User Product means any methods, | ||||||
|  | procedures, authorization keys, or other information required to install | ||||||
|  | and execute modified versions of a covered work in that User Product from | ||||||
|  | a modified version of its Corresponding Source.  The information must | ||||||
|  | suffice to ensure that the continued functioning of the modified object | ||||||
|  | code is in no case prevented or interfered with solely because | ||||||
|  | modification has been made. | ||||||
|  |  | ||||||
|  |   If you convey an object code work under this section in, or with, or | ||||||
|  | specifically for use in, a User Product, and the conveying occurs as | ||||||
|  | part of a transaction in which the right of possession and use of the | ||||||
|  | User Product is transferred to the recipient in perpetuity or for a | ||||||
|  | fixed term (regardless of how the transaction is characterized), the | ||||||
|  | Corresponding Source conveyed under this section must be accompanied | ||||||
|  | by the Installation Information.  But this requirement does not apply | ||||||
|  | if neither you nor any third party retains the ability to install | ||||||
|  | modified object code on the User Product (for example, the work has | ||||||
|  | been installed in ROM). | ||||||
|  |  | ||||||
|  |   The requirement to provide Installation Information does not include a | ||||||
|  | requirement to continue to provide support service, warranty, or updates | ||||||
|  | for a work that has been modified or installed by the recipient, or for | ||||||
|  | the User Product in which it has been modified or installed.  Access to a | ||||||
|  | network may be denied when the modification itself materially and | ||||||
|  | adversely affects the operation of the network or violates the rules and | ||||||
|  | protocols for communication across the network. | ||||||
|  |  | ||||||
|  |   Corresponding Source conveyed, and Installation Information provided, | ||||||
|  | in accord with this section must be in a format that is publicly | ||||||
|  | documented (and with an implementation available to the public in | ||||||
|  | source code form), and must require no special password or key for | ||||||
|  | unpacking, reading or copying. | ||||||
|  |  | ||||||
|  |   7. Additional Terms. | ||||||
|  |  | ||||||
|  |   "Additional permissions" are terms that supplement the terms of this | ||||||
|  | License by making exceptions from one or more of its conditions. | ||||||
|  | Additional permissions that are applicable to the entire Program shall | ||||||
|  | be treated as though they were included in this License, to the extent | ||||||
|  | that they are valid under applicable law.  If additional permissions | ||||||
|  | apply only to part of the Program, that part may be used separately | ||||||
|  | under those permissions, but the entire Program remains governed by | ||||||
|  | this License without regard to the additional permissions. | ||||||
|  |  | ||||||
|  |   When you convey a copy of a covered work, you may at your option | ||||||
|  | remove any additional permissions from that copy, or from any part of | ||||||
|  | it.  (Additional permissions may be written to require their own | ||||||
|  | removal in certain cases when you modify the work.)  You may place | ||||||
|  | additional permissions on material, added by you to a covered work, | ||||||
|  | for which you have or can give appropriate copyright permission. | ||||||
|  |  | ||||||
|  |   Notwithstanding any other provision of this License, for material you | ||||||
|  | add to a covered work, you may (if authorized by the copyright holders of | ||||||
|  | that material) supplement the terms of this License with terms: | ||||||
|  |  | ||||||
|  |     a) Disclaiming warranty or limiting liability differently from the | ||||||
|  |     terms of sections 15 and 16 of this License; or | ||||||
|  |  | ||||||
|  |     b) Requiring preservation of specified reasonable legal notices or | ||||||
|  |     author attributions in that material or in the Appropriate Legal | ||||||
|  |     Notices displayed by works containing it; or | ||||||
|  |  | ||||||
|  |     c) Prohibiting misrepresentation of the origin of that material, or | ||||||
|  |     requiring that modified versions of such material be marked in | ||||||
|  |     reasonable ways as different from the original version; or | ||||||
|  |  | ||||||
|  |     d) Limiting the use for publicity purposes of names of licensors or | ||||||
|  |     authors of the material; or | ||||||
|  |  | ||||||
|  |     e) Declining to grant rights under trademark law for use of some | ||||||
|  |     trade names, trademarks, or service marks; or | ||||||
|  |  | ||||||
|  |     f) Requiring indemnification of licensors and authors of that | ||||||
|  |     material by anyone who conveys the material (or modified versions of | ||||||
|  |     it) with contractual assumptions of liability to the recipient, for | ||||||
|  |     any liability that these contractual assumptions directly impose on | ||||||
|  |     those licensors and authors. | ||||||
|  |  | ||||||
|  |   All other non-permissive additional terms are considered "further | ||||||
|  | restrictions" within the meaning of section 10.  If the Program as you | ||||||
|  | received it, or any part of it, contains a notice stating that it is | ||||||
|  | governed by this License along with a term that is a further | ||||||
|  | restriction, you may remove that term.  If a license document contains | ||||||
|  | a further restriction but permits relicensing or conveying under this | ||||||
|  | License, you may add to a covered work material governed by the terms | ||||||
|  | of that license document, provided that the further restriction does | ||||||
|  | not survive such relicensing or conveying. | ||||||
|  |  | ||||||
|  |   If you add terms to a covered work in accord with this section, you | ||||||
|  | must place, in the relevant source files, a statement of the | ||||||
|  | additional terms that apply to those files, or a notice indicating | ||||||
|  | where to find the applicable terms. | ||||||
|  |  | ||||||
|  |   Additional terms, permissive or non-permissive, may be stated in the | ||||||
|  | form of a separately written license, or stated as exceptions; | ||||||
|  | the above requirements apply either way. | ||||||
|  |  | ||||||
|  |   8. Termination. | ||||||
|  |  | ||||||
|  |   You may not propagate or modify a covered work except as expressly | ||||||
|  | provided under this License.  Any attempt otherwise to propagate or | ||||||
|  | modify it is void, and will automatically terminate your rights under | ||||||
|  | this License (including any patent licenses granted under the third | ||||||
|  | paragraph of section 11). | ||||||
|  |  | ||||||
|  |   However, if you cease all violation of this License, then your | ||||||
|  | license from a particular copyright holder is reinstated (a) | ||||||
|  | provisionally, unless and until the copyright holder explicitly and | ||||||
|  | finally terminates your license, and (b) permanently, if the copyright | ||||||
|  | holder fails to notify you of the violation by some reasonable means | ||||||
|  | prior to 60 days after the cessation. | ||||||
|  |  | ||||||
|  |   Moreover, your license from a particular copyright holder is | ||||||
|  | reinstated permanently if the copyright holder notifies you of the | ||||||
|  | violation by some reasonable means, this is the first time you have | ||||||
|  | received notice of violation of this License (for any work) from that | ||||||
|  | copyright holder, and you cure the violation prior to 30 days after | ||||||
|  | your receipt of the notice. | ||||||
|  |  | ||||||
|  |   Termination of your rights under this section does not terminate the | ||||||
|  | licenses of parties who have received copies or rights from you under | ||||||
|  | this License.  If your rights have been terminated and not permanently | ||||||
|  | reinstated, you do not qualify to receive new licenses for the same | ||||||
|  | material under section 10. | ||||||
|  |  | ||||||
|  |   9. Acceptance Not Required for Having Copies. | ||||||
|  |  | ||||||
|  |   You are not required to accept this License in order to receive or | ||||||
|  | run a copy of the Program.  Ancillary propagation of a covered work | ||||||
|  | occurring solely as a consequence of using peer-to-peer transmission | ||||||
|  | to receive a copy likewise does not require acceptance.  However, | ||||||
|  | nothing other than this License grants you permission to propagate or | ||||||
|  | modify any covered work.  These actions infringe copyright if you do | ||||||
|  | not accept this License.  Therefore, by modifying or propagating a | ||||||
|  | covered work, you indicate your acceptance of this License to do so. | ||||||
|  |  | ||||||
|  |   10. Automatic Licensing of Downstream Recipients. | ||||||
|  |  | ||||||
|  |   Each time you convey a covered work, the recipient automatically | ||||||
|  | receives a license from the original licensors, to run, modify and | ||||||
|  | propagate that work, subject to this License.  You are not responsible | ||||||
|  | for enforcing compliance by third parties with this License. | ||||||
|  |  | ||||||
|  |   An "entity transaction" is a transaction transferring control of an | ||||||
|  | organization, or substantially all assets of one, or subdividing an | ||||||
|  | organization, or merging organizations.  If propagation of a covered | ||||||
|  | work results from an entity transaction, each party to that | ||||||
|  | transaction who receives a copy of the work also receives whatever | ||||||
|  | licenses to the work the party's predecessor in interest had or could | ||||||
|  | give under the previous paragraph, plus a right to possession of the | ||||||
|  | Corresponding Source of the work from the predecessor in interest, if | ||||||
|  | the predecessor has it or can get it with reasonable efforts. | ||||||
|  |  | ||||||
|  |   You may not impose any further restrictions on the exercise of the | ||||||
|  | rights granted or affirmed under this License.  For example, you may | ||||||
|  | not impose a license fee, royalty, or other charge for exercise of | ||||||
|  | rights granted under this License, and you may not initiate litigation | ||||||
|  | (including a cross-claim or counterclaim in a lawsuit) alleging that | ||||||
|  | any patent claim is infringed by making, using, selling, offering for | ||||||
|  | sale, or importing the Program or any portion of it. | ||||||
|  |  | ||||||
|  |   11. Patents. | ||||||
|  |  | ||||||
|  |   A "contributor" is a copyright holder who authorizes use under this | ||||||
|  | License of the Program or a work on which the Program is based.  The | ||||||
|  | work thus licensed is called the contributor's "contributor version". | ||||||
|  |  | ||||||
|  |   A contributor's "essential patent claims" are all patent claims | ||||||
|  | owned or controlled by the contributor, whether already acquired or | ||||||
|  | hereafter acquired, that would be infringed by some manner, permitted | ||||||
|  | by this License, of making, using, or selling its contributor version, | ||||||
|  | but do not include claims that would be infringed only as a | ||||||
|  | consequence of further modification of the contributor version.  For | ||||||
|  | purposes of this definition, "control" includes the right to grant | ||||||
|  | patent sublicenses in a manner consistent with the requirements of | ||||||
|  | this License. | ||||||
|  |  | ||||||
|  |   Each contributor grants you a non-exclusive, worldwide, royalty-free | ||||||
|  | patent license under the contributor's essential patent claims, to | ||||||
|  | make, use, sell, offer for sale, import and otherwise run, modify and | ||||||
|  | propagate the contents of its contributor version. | ||||||
|  |  | ||||||
|  |   In the following three paragraphs, a "patent license" is any express | ||||||
|  | agreement or commitment, however denominated, not to enforce a patent | ||||||
|  | (such as an express permission to practice a patent or covenant not to | ||||||
|  | sue for patent infringement).  To "grant" such a patent license to a | ||||||
|  | party means to make such an agreement or commitment not to enforce a | ||||||
|  | patent against the party. | ||||||
|  |  | ||||||
|  |   If you convey a covered work, knowingly relying on a patent license, | ||||||
|  | and the Corresponding Source of the work is not available for anyone | ||||||
|  | to copy, free of charge and under the terms of this License, through a | ||||||
|  | publicly available network server or other readily accessible means, | ||||||
|  | then you must either (1) cause the Corresponding Source to be so | ||||||
|  | available, or (2) arrange to deprive yourself of the benefit of the | ||||||
|  | patent license for this particular work, or (3) arrange, in a manner | ||||||
|  | consistent with the requirements of this License, to extend the patent | ||||||
|  | license to downstream recipients.  "Knowingly relying" means you have | ||||||
|  | actual knowledge that, but for the patent license, your conveying the | ||||||
|  | covered work in a country, or your recipient's use of the covered work | ||||||
|  | in a country, would infringe one or more identifiable patents in that | ||||||
|  | country that you have reason to believe are valid. | ||||||
|  |  | ||||||
|  |   If, pursuant to or in connection with a single transaction or | ||||||
|  | arrangement, you convey, or propagate by procuring conveyance of, a | ||||||
|  | covered work, and grant a patent license to some of the parties | ||||||
|  | receiving the covered work authorizing them to use, propagate, modify | ||||||
|  | or convey a specific copy of the covered work, then the patent license | ||||||
|  | you grant is automatically extended to all recipients of the covered | ||||||
|  | work and works based on it. | ||||||
|  |  | ||||||
|  |   A patent license is "discriminatory" if it does not include within | ||||||
|  | the scope of its coverage, prohibits the exercise of, or is | ||||||
|  | conditioned on the non-exercise of one or more of the rights that are | ||||||
|  | specifically granted under this License.  You may not convey a covered | ||||||
|  | work if you are a party to an arrangement with a third party that is | ||||||
|  | in the business of distributing software, under which you make payment | ||||||
|  | to the third party based on the extent of your activity of conveying | ||||||
|  | the work, and under which the third party grants, to any of the | ||||||
|  | parties who would receive the covered work from you, a discriminatory | ||||||
|  | patent license (a) in connection with copies of the covered work | ||||||
|  | conveyed by you (or copies made from those copies), or (b) primarily | ||||||
|  | for and in connection with specific products or compilations that | ||||||
|  | contain the covered work, unless you entered into that arrangement, | ||||||
|  | or that patent license was granted, prior to 28 March 2007. | ||||||
|  |  | ||||||
|  |   Nothing in this License shall be construed as excluding or limiting | ||||||
|  | any implied license or other defenses to infringement that may | ||||||
|  | otherwise be available to you under applicable patent law. | ||||||
|  |  | ||||||
|  |   12. No Surrender of Others' Freedom. | ||||||
|  |  | ||||||
|  |   If conditions are imposed on you (whether by court order, agreement or | ||||||
|  | otherwise) that contradict the conditions of this License, they do not | ||||||
|  | excuse you from the conditions of this License.  If you cannot convey a | ||||||
|  | covered work so as to satisfy simultaneously your obligations under this | ||||||
|  | License and any other pertinent obligations, then as a consequence you may | ||||||
|  | not convey it at all.  For example, if you agree to terms that obligate you | ||||||
|  | to collect a royalty for further conveying from those to whom you convey | ||||||
|  | the Program, the only way you could satisfy both those terms and this | ||||||
|  | License would be to refrain entirely from conveying the Program. | ||||||
|  |  | ||||||
|  |   13. Use with the GNU Affero General Public License. | ||||||
|  |  | ||||||
|  |   Notwithstanding any other provision of this License, you have | ||||||
|  | permission to link or combine any covered work with a work licensed | ||||||
|  | under version 3 of the GNU Affero General Public License into a single | ||||||
|  | combined work, and to convey the resulting work.  The terms of this | ||||||
|  | License will continue to apply to the part which is the covered work, | ||||||
|  | but the special requirements of the GNU Affero General Public License, | ||||||
|  | section 13, concerning interaction through a network will apply to the | ||||||
|  | combination as such. | ||||||
|  |  | ||||||
|  |   14. Revised Versions of this License. | ||||||
|  |  | ||||||
|  |   The Free Software Foundation may publish revised and/or new versions of | ||||||
|  | the GNU General Public License from time to time.  Such new versions will | ||||||
|  | be similar in spirit to the present version, but may differ in detail to | ||||||
|  | address new problems or concerns. | ||||||
|  |  | ||||||
|  |   Each version is given a distinguishing version number.  If the | ||||||
|  | Program specifies that a certain numbered version of the GNU General | ||||||
|  | Public License "or any later version" applies to it, you have the | ||||||
|  | option of following the terms and conditions either of that numbered | ||||||
|  | version or of any later version published by the Free Software | ||||||
|  | Foundation.  If the Program does not specify a version number of the | ||||||
|  | GNU General Public License, you may choose any version ever published | ||||||
|  | by the Free Software Foundation. | ||||||
|  |  | ||||||
|  |   If the Program specifies that a proxy can decide which future | ||||||
|  | versions of the GNU General Public License can be used, that proxy's | ||||||
|  | public statement of acceptance of a version permanently authorizes you | ||||||
|  | to choose that version for the Program. | ||||||
|  |  | ||||||
|  |   Later license versions may give you additional or different | ||||||
|  | permissions.  However, no additional obligations are imposed on any | ||||||
|  | author or copyright holder as a result of your choosing to follow a | ||||||
|  | later version. | ||||||
|  |  | ||||||
|  |   15. Disclaimer of Warranty. | ||||||
|  |  | ||||||
|  |   THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY | ||||||
|  | APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT | ||||||
|  | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY | ||||||
|  | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, | ||||||
|  | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||||||
|  | PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM | ||||||
|  | IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF | ||||||
|  | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. | ||||||
|  |  | ||||||
|  |   16. Limitation of Liability. | ||||||
|  |  | ||||||
|  |   IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | ||||||
|  | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS | ||||||
|  | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY | ||||||
|  | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE | ||||||
|  | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF | ||||||
|  | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD | ||||||
|  | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), | ||||||
|  | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF | ||||||
|  | SUCH DAMAGES. | ||||||
|  |  | ||||||
|  |   17. Interpretation of Sections 15 and 16. | ||||||
|  |  | ||||||
|  |   If the disclaimer of warranty and limitation of liability provided | ||||||
|  | above cannot be given local legal effect according to their terms, | ||||||
|  | reviewing courts shall apply local law that most closely approximates | ||||||
|  | an absolute waiver of all civil liability in connection with the | ||||||
|  | Program, unless a warranty or assumption of liability accompanies a | ||||||
|  | copy of the Program in return for a fee. | ||||||
|  |  | ||||||
|  |                      END OF TERMS AND CONDITIONS | ||||||
|  |  | ||||||
|  |             How to Apply These Terms to Your New Programs | ||||||
|  |  | ||||||
|  |   If you develop a new program, and you want it to be of the greatest | ||||||
|  | possible use to the public, the best way to achieve this is to make it | ||||||
|  | free software which everyone can redistribute and change under these terms. | ||||||
|  |  | ||||||
|  |   To do so, attach the following notices to the program.  It is safest | ||||||
|  | to attach them to the start of each source file to most effectively | ||||||
|  | state the exclusion of warranty; and each file should have at least | ||||||
|  | the "copyright" line and a pointer to where the full notice is found. | ||||||
|  |  | ||||||
|  |     <one line to give the program's name and a brief idea of what it does.> | ||||||
|  |     Copyright (C) <year>  <name of author> | ||||||
|  |  | ||||||
|  |     This program is free software: you can redistribute it and/or modify | ||||||
|  |     it under the terms of the GNU General Public License as published by | ||||||
|  |     the Free Software Foundation, either version 3 of the License, or | ||||||
|  |     (at your option) any later version. | ||||||
|  |  | ||||||
|  |     This program is distributed in the hope that it will be useful, | ||||||
|  |     but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||||
|  |     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||||
|  |     GNU General Public License for more details. | ||||||
|  |  | ||||||
|  |     You should have received a copy of the GNU General Public License | ||||||
|  |     along with this program.  If not, see <https://www.gnu.org/licenses/>. | ||||||
|  |  | ||||||
|  | Also add information on how to contact you by electronic and paper mail. | ||||||
|  |  | ||||||
|  |   If the program does terminal interaction, make it output a short | ||||||
|  | notice like this when it starts in an interactive mode: | ||||||
|  |  | ||||||
|  |     <program>  Copyright (C) <year>  <name of author> | ||||||
|  |     This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. | ||||||
|  |     This is free software, and you are welcome to redistribute it | ||||||
|  |     under certain conditions; type `show c' for details. | ||||||
|  |  | ||||||
|  | The hypothetical commands `show w' and `show c' should show the appropriate | ||||||
|  | parts of the General Public License.  Of course, your program's commands | ||||||
|  | might be different; for a GUI interface, you would use an "about box". | ||||||
|  |  | ||||||
|  |   You should also get your employer (if you work as a programmer) or school, | ||||||
|  | if any, to sign a "copyright disclaimer" for the program, if necessary. | ||||||
|  | For more information on this, and how to apply and follow the GNU GPL, see | ||||||
|  | <https://www.gnu.org/licenses/>. | ||||||
|  |  | ||||||
|  |   The GNU General Public License does not permit incorporating your program | ||||||
|  | into proprietary programs.  If your program is a subroutine library, you | ||||||
|  | may consider it more useful to permit linking proprietary applications with | ||||||
|  | the library.  If this is what you want to do, use the GNU Lesser General | ||||||
|  | Public License instead of this License.  But first, please read | ||||||
|  | <https://www.gnu.org/licenses/why-not-lgpl.html>. | ||||||
							
								
								
									
										4
									
								
								crates/auth/src/browser.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								crates/auth/src/browser.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | |||||||
|  | mod auth_server; | ||||||
|  | mod browser_auth; | ||||||
|  |  | ||||||
|  | pub use browser_auth::BrowserAuthenticator; | ||||||
							
								
								
									
										57
									
								
								crates/auth/src/browser/auth_server.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										57
									
								
								crates/auth/src/browser/auth_server.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,57 @@ | |||||||
|  | use std::io::Cursor; | ||||||
|  |  | ||||||
|  | use log::info; | ||||||
|  | use tiny_http::{Header, Response, Server}; | ||||||
|  | use uuid::Uuid; | ||||||
|  |  | ||||||
|  | pub(super) struct AuthServer { | ||||||
|  |   server: Server, | ||||||
|  |   auth_id: String, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl AuthServer { | ||||||
|  |   pub fn new() -> anyhow::Result<Self> { | ||||||
|  |     let server = Server::http("127.0.0.1:0").map_err(|err| anyhow::anyhow!(err))?; | ||||||
|  |     let auth_id = Uuid::new_v4().to_string(); | ||||||
|  |  | ||||||
|  |     Ok(Self { server, auth_id }) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn auth_url(&self) -> String { | ||||||
|  |     format!("http://{}/{}", self.server.server_addr(), self.auth_id) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn serve_request(&self, auth_request: &str) { | ||||||
|  |     info!("auth server started at: {}", self.auth_url()); | ||||||
|  |  | ||||||
|  |     for req in self.server.incoming_requests() { | ||||||
|  |       info!("received request, method: {}, url: {}", req.method(), req.url()); | ||||||
|  |  | ||||||
|  |       if req.url() != format!("/{}", self.auth_id) { | ||||||
|  |         let forbidden = Response::from_string("forbidden").with_status_code(403); | ||||||
|  |         let _ = req.respond(forbidden); | ||||||
|  |       } else { | ||||||
|  |         let auth_response = build_auth_response(auth_request); | ||||||
|  |         if let Err(err) = req.respond(auth_response) { | ||||||
|  |           info!("failed to respond to request: {}", err); | ||||||
|  |         } else { | ||||||
|  |           info!("stop the auth server"); | ||||||
|  |           break; | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | fn build_auth_response(auth_request: &str) -> Response<Cursor<Vec<u8>>> { | ||||||
|  |   if auth_request.starts_with("http") { | ||||||
|  |     let header = format!("location: {}", auth_request); | ||||||
|  |     let header: Header = header.parse().unwrap(); | ||||||
|  |     Response::from_string("redirect") | ||||||
|  |       .with_status_code(302) | ||||||
|  |       .with_header(header) | ||||||
|  |   } else { | ||||||
|  |     let content_type: Header = "content-type: text/html".parse().unwrap(); | ||||||
|  |     Response::from_string(auth_request).with_header(content_type) | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										125
									
								
								crates/auth/src/browser/browser_auth.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										125
									
								
								crates/auth/src/browser/browser_auth.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,125 @@ | |||||||
|  | use std::{env::temp_dir, fs}; | ||||||
|  |  | ||||||
|  | use gpapi::{auth::SamlAuthData, GP_CALLBACK_PORT_FILENAME}; | ||||||
|  | use log::info; | ||||||
|  | use tokio::{io::AsyncReadExt, net::TcpListener}; | ||||||
|  |  | ||||||
|  | use crate::browser::auth_server::AuthServer; | ||||||
|  |  | ||||||
|  | pub enum Browser<'a> { | ||||||
|  |   Default, | ||||||
|  |   Chrome, | ||||||
|  |   Firefox, | ||||||
|  |   Other(&'a str), | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl<'a> Browser<'a> { | ||||||
|  |   pub fn from_str(browser: &'a str) -> Self { | ||||||
|  |     match browser.to_lowercase().as_str() { | ||||||
|  |       "default" => Browser::Default, | ||||||
|  |       "chrome" => Browser::Chrome, | ||||||
|  |       "firefox" => Browser::Firefox, | ||||||
|  |       _ => Browser::Other(browser), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn as_str(&self) -> &str { | ||||||
|  |     match self { | ||||||
|  |       Browser::Default => "default", | ||||||
|  |       Browser::Chrome => "chrome", | ||||||
|  |       Browser::Firefox => "firefox", | ||||||
|  |       Browser::Other(browser) => browser, | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub struct BrowserAuthenticator<'a> { | ||||||
|  |   auth_request: &'a str, | ||||||
|  |   browser: Browser<'a>, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl<'a> BrowserAuthenticator<'a> { | ||||||
|  |   pub fn new(auth_request: &'a str, browser: &'a str) -> Self { | ||||||
|  |     Self { | ||||||
|  |       auth_request, | ||||||
|  |       browser: Browser::from_str(browser), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub async fn authenticate(&self) -> anyhow::Result<SamlAuthData> { | ||||||
|  |     let auth_server = AuthServer::new()?; | ||||||
|  |     let auth_url = auth_server.auth_url(); | ||||||
|  |  | ||||||
|  |     let auth_request = self.auth_request.to_string(); | ||||||
|  |     tokio::spawn(async move { | ||||||
|  |       auth_server.serve_request(&auth_request); | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     match self.browser { | ||||||
|  |       Browser::Default => { | ||||||
|  |         info!("Launching the default browser..."); | ||||||
|  |         webbrowser::open(&auth_url)?; | ||||||
|  |       } | ||||||
|  |       _ => { | ||||||
|  |         let app = find_browser_path(&self.browser); | ||||||
|  |  | ||||||
|  |         info!("Launching browser: {}", app); | ||||||
|  |         open::with_detached(auth_url, app)?; | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     info!("Please continue the authentication process in the default browser"); | ||||||
|  |     wait_auth_data().await | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | fn find_browser_path(browser: &Browser) -> String { | ||||||
|  |   match browser { | ||||||
|  |     Browser::Chrome => { | ||||||
|  |       const CHROME_VARIANTS: &[&str] = &["google-chrome-stable", "google-chrome", "chromium"]; | ||||||
|  |  | ||||||
|  |       CHROME_VARIANTS | ||||||
|  |         .iter() | ||||||
|  |         .find_map(|&browser_name| which::which(browser_name).ok()) | ||||||
|  |         .map(|path| path.to_string_lossy().to_string()) | ||||||
|  |         .unwrap_or_else(|| browser.as_str().to_string()) | ||||||
|  |     } | ||||||
|  |     _ => browser.as_str().to_string(), | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | async fn wait_auth_data() -> anyhow::Result<SamlAuthData> { | ||||||
|  |   // Start a local server to receive the browser authentication data | ||||||
|  |   let listener = TcpListener::bind("127.0.0.1:0").await?; | ||||||
|  |   let port = listener.local_addr()?.port(); | ||||||
|  |   let port_file = temp_dir().join(GP_CALLBACK_PORT_FILENAME); | ||||||
|  |  | ||||||
|  |   // Write the port to a file | ||||||
|  |   fs::write(&port_file, port.to_string())?; | ||||||
|  |   #[cfg(unix)] | ||||||
|  |   { | ||||||
|  |     use os::unix::fs::PermissionsExt; | ||||||
|  |     fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?; | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   // Remove the previous log file | ||||||
|  |   let callback_log = temp_dir().join("gpcallback.log"); | ||||||
|  |   let _ = fs::remove_file(&callback_log); | ||||||
|  |  | ||||||
|  |   info!("Listening authentication data on port {}", port); | ||||||
|  |   info!( | ||||||
|  |     "If it hangs, please check the logs at `{}` for more information", | ||||||
|  |     callback_log.display() | ||||||
|  |   ); | ||||||
|  |   let (mut socket, _) = listener.accept().await?; | ||||||
|  |  | ||||||
|  |   info!("Received the browser authentication data from the socket"); | ||||||
|  |   let mut data = String::new(); | ||||||
|  |   socket.read_to_string(&mut data).await?; | ||||||
|  |  | ||||||
|  |   // Remove the port file | ||||||
|  |   fs::remove_file(&port_file)?; | ||||||
|  |  | ||||||
|  |   let auth_data = SamlAuthData::from_gpcallback(&data)?; | ||||||
|  |   Ok(auth_data) | ||||||
|  | } | ||||||
							
								
								
									
										23
									
								
								crates/auth/src/lib.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								crates/auth/src/lib.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,23 @@ | |||||||
|  | use anyhow::bail; | ||||||
|  | use gpapi::{ | ||||||
|  |   gp_params::GpParams, | ||||||
|  |   portal::{prelogin, Prelogin}, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | #[cfg(feature = "browser-auth")] | ||||||
|  | mod browser; | ||||||
|  |  | ||||||
|  | #[cfg(feature = "browser-auth")] | ||||||
|  | pub use browser::*; | ||||||
|  |  | ||||||
|  | #[cfg(feature = "webview-auth")] | ||||||
|  | mod webview; | ||||||
|  | #[cfg(feature = "webview-auth")] | ||||||
|  | pub use webview::*; | ||||||
|  |  | ||||||
|  | pub async fn auth_prelogin(server: &str, gp_params: &GpParams) -> anyhow::Result<String> { | ||||||
|  |   match prelogin(server, gp_params).await? { | ||||||
|  |     Prelogin::Saml(prelogin) => Ok(prelogin.saml_request().to_string()), | ||||||
|  |     Prelogin::Standard(_) => bail!("Received non-SAML prelogin response"), | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										9
									
								
								crates/auth/src/webview.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								crates/auth/src/webview.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,9 @@ | |||||||
|  | mod auth_messenger; | ||||||
|  | mod webview_auth; | ||||||
|  |  | ||||||
|  | #[cfg_attr(not(any(target_os = "macos", target_os = "windows")), path = "webview/unix.rs")] | ||||||
|  | #[cfg_attr(target_os = "macos", path = "webview/macos.rs")] | ||||||
|  | #[cfg_attr(windows, path = "webview/windows.rs")] | ||||||
|  | mod platform_impl; | ||||||
|  |  | ||||||
|  | pub use webview_auth::WebviewAuthenticator; | ||||||
							
								
								
									
										229
									
								
								crates/auth/src/webview/auth_messenger.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										229
									
								
								crates/auth/src/webview/auth_messenger.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,229 @@ | |||||||
|  | use anyhow::bail; | ||||||
|  | use gpapi::{auth::SamlAuthData, error::AuthDataParseError}; | ||||||
|  | use log::{error, info}; | ||||||
|  | use regex::Regex; | ||||||
|  | use tokio::sync::{mpsc, RwLock}; | ||||||
|  | use tokio_util::sync::CancellationToken; | ||||||
|  |  | ||||||
|  | #[derive(Debug)] | ||||||
|  | pub(crate) enum AuthDataLocation { | ||||||
|  |   #[cfg(not(target_os = "macos"))] | ||||||
|  |   Headers, | ||||||
|  |   Body, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[derive(Debug)] | ||||||
|  | pub(crate) enum AuthError { | ||||||
|  |   /// Failed to load page due to TLS error | ||||||
|  |   #[cfg(not(any(target_os = "macos", target_os = "windows")))] | ||||||
|  |   TlsError, | ||||||
|  |   /// 1. Found auth data in headers/body but it's invalid | ||||||
|  |   /// 2. Loaded an empty page, failed to load page. etc. | ||||||
|  |   Invalid(anyhow::Error, AuthDataLocation), | ||||||
|  |   /// No auth data found in headers/body | ||||||
|  |   NotFound(AuthDataLocation), | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl AuthError { | ||||||
|  |   pub fn invalid_from_body(err: anyhow::Error) -> Self { | ||||||
|  |     Self::Invalid(err, AuthDataLocation::Body) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn not_found_in_body() -> Self { | ||||||
|  |     Self::NotFound(AuthDataLocation::Body) | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[cfg(not(target_os = "macos"))] | ||||||
|  | impl AuthError { | ||||||
|  |   pub fn not_found_in_headers() -> Self { | ||||||
|  |     Self::NotFound(AuthDataLocation::Headers) | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub(crate) enum AuthEvent { | ||||||
|  |   Data(SamlAuthData, AuthDataLocation), | ||||||
|  |   Error(AuthError), | ||||||
|  |   RaiseWindow, | ||||||
|  |   Close, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub struct AuthMessenger { | ||||||
|  |   tx: mpsc::UnboundedSender<AuthEvent>, | ||||||
|  |   rx: RwLock<mpsc::UnboundedReceiver<AuthEvent>>, | ||||||
|  |   raise_window_cancel_token: RwLock<Option<CancellationToken>>, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl AuthMessenger { | ||||||
|  |   pub fn new() -> Self { | ||||||
|  |     let (tx, rx) = mpsc::unbounded_channel(); | ||||||
|  |  | ||||||
|  |     Self { | ||||||
|  |       tx, | ||||||
|  |       rx: RwLock::new(rx), | ||||||
|  |       raise_window_cancel_token: Default::default(), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub async fn subscribe(&self) -> anyhow::Result<AuthEvent> { | ||||||
|  |     let mut rx = self.rx.write().await; | ||||||
|  |     if let Some(event) = rx.recv().await { | ||||||
|  |       return Ok(event); | ||||||
|  |     } | ||||||
|  |     bail!("Failed to receive auth event"); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn send_auth_event(&self, event: AuthEvent) { | ||||||
|  |     if let Err(event) = self.tx.send(event) { | ||||||
|  |       error!("Failed to send auth event: {}", event); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn send_auth_error(&self, err: AuthError) { | ||||||
|  |     self.send_auth_event(AuthEvent::Error(err)); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn send_auth_data(&self, data: SamlAuthData, location: AuthDataLocation) { | ||||||
|  |     self.send_auth_event(AuthEvent::Data(data, location)); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn schedule_raise_window(&self, delay: u64) { | ||||||
|  |     let Ok(mut guard) = self.raise_window_cancel_token.try_write() else { | ||||||
|  |       return; | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     // Return if the previous raise window task is still running | ||||||
|  |     if let Some(token) = guard.as_ref() { | ||||||
|  |       if !token.is_cancelled() { | ||||||
|  |         info!("Raise window task is still running, skipping..."); | ||||||
|  |         return; | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     let cancel_token = CancellationToken::new(); | ||||||
|  |     let cancel_token_clone = cancel_token.clone(); | ||||||
|  |  | ||||||
|  |     *guard = Some(cancel_token_clone); | ||||||
|  |  | ||||||
|  |     let tx = self.tx.clone(); | ||||||
|  |     tokio::spawn(async move { | ||||||
|  |       info!("Displaying the window in {} second(s)...", delay); | ||||||
|  |  | ||||||
|  |       tokio::select! { | ||||||
|  |         _ = tokio::time::sleep(tokio::time::Duration::from_secs(delay)) => { | ||||||
|  |           cancel_token.cancel(); | ||||||
|  |  | ||||||
|  |           if let Err(err) = tx.send(AuthEvent::RaiseWindow) { | ||||||
|  |             error!("Failed to send raise window event: {}", err); | ||||||
|  |           } | ||||||
|  |         } | ||||||
|  |         _ = cancel_token.cancelled() => { | ||||||
|  |           info!("Cancelled raise window task"); | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn cancel_raise_window(&self) { | ||||||
|  |     if let Ok(mut cancel_token) = self.raise_window_cancel_token.try_write() { | ||||||
|  |       if let Some(token) = cancel_token.take() { | ||||||
|  |         token.cancel(); | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn read_from_html(&self, html: &str) { | ||||||
|  |     if html.contains("Temporarily Unavailable") { | ||||||
|  |       return self.send_auth_error(AuthError::invalid_from_body(anyhow::anyhow!("Temporarily Unavailable"))); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     let auth_result = SamlAuthData::from_html(html).or_else(|err| { | ||||||
|  |       info!("Read auth data from html failed: {}, extracting gpcallback...", err); | ||||||
|  |  | ||||||
|  |       if let Some(gpcallback) = extract_gpcallback(html) { | ||||||
|  |         info!("Found gpcallback from html..."); | ||||||
|  |         SamlAuthData::from_gpcallback(&gpcallback) | ||||||
|  |       } else { | ||||||
|  |         Err(err) | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     match auth_result { | ||||||
|  |       Ok(data) => self.send_auth_data(data, AuthDataLocation::Body), | ||||||
|  |       Err(AuthDataParseError::Invalid(err)) => self.send_auth_error(AuthError::invalid_from_body(err)), | ||||||
|  |       Err(AuthDataParseError::NotFound) => self.send_auth_error(AuthError::not_found_in_body()), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[cfg(not(target_os = "macos"))] | ||||||
|  |   pub fn read_from_response(&self, auth_response: &impl super::webview_auth::GetHeader) { | ||||||
|  |     use log::warn; | ||||||
|  |  | ||||||
|  |     let Some(status) = auth_response.get_header("saml-auth-status") else { | ||||||
|  |       return self.send_auth_error(AuthError::not_found_in_headers()); | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     // Do not send auth error when reading from headers, as the html body may contain the auth data | ||||||
|  |     if status != "1" { | ||||||
|  |       warn!("Found invalid saml-auth-status in headers: {}", status); | ||||||
|  |       return; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     let username = auth_response.get_header("saml-username"); | ||||||
|  |     let prelogin_cookie = auth_response.get_header("prelogin-cookie"); | ||||||
|  |     let portal_userauthcookie = auth_response.get_header("portal-userauthcookie"); | ||||||
|  |  | ||||||
|  |     match SamlAuthData::new(username, prelogin_cookie, portal_userauthcookie) { | ||||||
|  |       Ok(auth_data) => self.send_auth_data(auth_data, AuthDataLocation::Headers), | ||||||
|  |       Err(err) => { | ||||||
|  |         warn!("Failed to read auth data from headers: {}", err); | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | fn extract_gpcallback(html: &str) -> Option<String> { | ||||||
|  |   let re = Regex::new(r#"globalprotectcallback:[^"]+"#).unwrap(); | ||||||
|  |   re.captures(html) | ||||||
|  |     .and_then(|captures| captures.get(0)) | ||||||
|  |     .map(|m| html_escape::decode_html_entities(m.as_str()).to_string()) | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[cfg(test)] | ||||||
|  | mod tests { | ||||||
|  |   use super::*; | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn extract_gpcallback_some() { | ||||||
|  |     let html = r#" | ||||||
|  |       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c"> | ||||||
|  |       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c"> | ||||||
|  |     "#; | ||||||
|  |  | ||||||
|  |     assert_eq!( | ||||||
|  |       extract_gpcallback(html).as_deref(), | ||||||
|  |       Some("globalprotectcallback:PGh0bWw+PCEtLSA8c") | ||||||
|  |     ); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn extract_gpcallback_cas() { | ||||||
|  |     let html = r#" | ||||||
|  |       <meta http-equiv="refresh" content="0; URL=globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string"> | ||||||
|  |     "#; | ||||||
|  |  | ||||||
|  |     assert_eq!( | ||||||
|  |       extract_gpcallback(html).as_deref(), | ||||||
|  |       Some("globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string") | ||||||
|  |     ); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn extract_gpcallback_none() { | ||||||
|  |     let html = r#" | ||||||
|  |       <meta http-equiv="refresh" content="0; URL=PGh0bWw+PCEtLSA8c"> | ||||||
|  |     "#; | ||||||
|  |  | ||||||
|  |     assert_eq!(extract_gpcallback(html), None); | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										58
									
								
								crates/auth/src/webview/macos.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										58
									
								
								crates/auth/src/webview/macos.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,58 @@ | |||||||
|  | use block2::RcBlock; | ||||||
|  | use log::warn; | ||||||
|  | use objc2::runtime::AnyObject; | ||||||
|  | use objc2_foundation::{NSError, NSString, NSURLRequest, NSURL}; | ||||||
|  | use objc2_web_kit::WKWebView; | ||||||
|  | use tauri::webview::PlatformWebview; | ||||||
|  |  | ||||||
|  | use super::webview_auth::PlatformWebviewExt; | ||||||
|  |  | ||||||
|  | impl PlatformWebviewExt for PlatformWebview { | ||||||
|  |   fn ignore_tls_errors(&self) -> anyhow::Result<()> { | ||||||
|  |     warn!("Ignoring TLS errors is not supported on macOS"); | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_url(&self, url: &str) -> anyhow::Result<()> { | ||||||
|  |     unsafe { | ||||||
|  |       let wv: &WKWebView = &*self.inner().cast(); | ||||||
|  |       let url = NSURL::URLWithString(&NSString::from_str(url)).ok_or_else(|| anyhow::anyhow!("Invalid URL"))?; | ||||||
|  |       let request = NSURLRequest::requestWithURL(&url); | ||||||
|  |  | ||||||
|  |       wv.loadRequest(&request); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_html(&self, html: &str) -> anyhow::Result<()> { | ||||||
|  |     unsafe { | ||||||
|  |       let wv: &WKWebView = &*self.inner().cast(); | ||||||
|  |       wv.loadHTMLString_baseURL(&NSString::from_str(html), None); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn get_html(&self, callback: Box<dyn Fn(anyhow::Result<String>) + 'static>) { | ||||||
|  |     unsafe { | ||||||
|  |       let wv: &WKWebView = &*self.inner().cast(); | ||||||
|  |  | ||||||
|  |       let js_callback = RcBlock::new(move |body: *mut AnyObject, err: *mut NSError| { | ||||||
|  |         if let Some(err) = err.as_ref() { | ||||||
|  |           let code = err.code(); | ||||||
|  |           let message = err.localizedDescription(); | ||||||
|  |           callback(Err(anyhow::anyhow!("Error {}: {}", code, message))); | ||||||
|  |         } else { | ||||||
|  |           let body: &NSString = &*body.cast(); | ||||||
|  |           callback(Ok(body.to_string())); | ||||||
|  |         } | ||||||
|  |       }); | ||||||
|  |  | ||||||
|  |       wv.evaluateJavaScript_completionHandler( | ||||||
|  |         &NSString::from_str("document.documentElement.outerHTML"), | ||||||
|  |         Some(&js_callback), | ||||||
|  |       ); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										105
									
								
								crates/auth/src/webview/unix.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										105
									
								
								crates/auth/src/webview/unix.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,105 @@ | |||||||
|  | use std::sync::Arc; | ||||||
|  |  | ||||||
|  | use anyhow::bail; | ||||||
|  | use gpapi::utils::redact::redact_uri; | ||||||
|  | use log::warn; | ||||||
|  | use tauri::webview::PlatformWebview; | ||||||
|  | use webkit2gtk::{ | ||||||
|  |   gio::Cancellable, glib::GString, LoadEvent, TLSErrorsPolicy, URIResponseExt, WebResource, WebResourceExt, WebViewExt, | ||||||
|  |   WebsiteDataManagerExt, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | use super::{ | ||||||
|  |   auth_messenger::AuthError, | ||||||
|  |   webview_auth::{GetHeader, PlatformWebviewExt}, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | impl GetHeader for WebResource { | ||||||
|  |   fn get_header(&self, key: &str) -> Option<String> { | ||||||
|  |     self | ||||||
|  |       .response() | ||||||
|  |       .and_then(|response| response.http_headers()) | ||||||
|  |       .and_then(|headers| headers.one(key)) | ||||||
|  |       .map(GString::into) | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl PlatformWebviewExt for PlatformWebview { | ||||||
|  |   fn ignore_tls_errors(&self) -> anyhow::Result<()> { | ||||||
|  |     if let Some(manager) = self.inner().website_data_manager() { | ||||||
|  |       manager.set_tls_errors_policy(TLSErrorsPolicy::Ignore); | ||||||
|  |       return Ok(()); | ||||||
|  |     } | ||||||
|  |     bail!("Failed to get website data manager"); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_url(&self, url: &str) -> anyhow::Result<()> { | ||||||
|  |     self.inner().load_uri(url); | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_html(&self, html: &str) -> anyhow::Result<()> { | ||||||
|  |     self.inner().load_html(html, None); | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn get_html(&self, callback: Box<dyn Fn(anyhow::Result<String>) + 'static>) { | ||||||
|  |     let script = "document.documentElement.outerHTML"; | ||||||
|  |     self | ||||||
|  |       .inner() | ||||||
|  |       .evaluate_javascript(script, None, None, Cancellable::NONE, move |result| match result { | ||||||
|  |         Ok(value) => callback(Ok(value.to_string())), | ||||||
|  |         Err(err) => callback(Err(anyhow::anyhow!(err))), | ||||||
|  |       }); | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub trait PlatformWebviewOnResponse { | ||||||
|  |   fn on_response(&self, callback: Box<dyn Fn(anyhow::Result<WebResource, AuthError>) + 'static>); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl PlatformWebviewOnResponse for PlatformWebview { | ||||||
|  |   fn on_response(&self, callback: Box<dyn Fn(anyhow::Result<WebResource, AuthError>) + 'static>) { | ||||||
|  |     let wv = self.inner(); | ||||||
|  |     let callback = Arc::new(callback); | ||||||
|  |     let callback_clone = Arc::clone(&callback); | ||||||
|  |  | ||||||
|  |     wv.connect_load_changed(move |wv, event| { | ||||||
|  |       if event != LoadEvent::Finished { | ||||||
|  |         return; | ||||||
|  |       } | ||||||
|  |  | ||||||
|  |       let Some(web_resource) = wv.main_resource() else { | ||||||
|  |         return; | ||||||
|  |       }; | ||||||
|  |  | ||||||
|  |       let uri = web_resource.uri().unwrap_or("".into()); | ||||||
|  |       if uri.is_empty() { | ||||||
|  |         callback_clone(Err(AuthError::invalid_from_body(anyhow::anyhow!("Empty URI")))); | ||||||
|  |       } else { | ||||||
|  |         callback_clone(Ok(web_resource)); | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     wv.connect_load_failed_with_tls_errors(move |_wv, uri, cert, err| { | ||||||
|  |       let redacted_uri = redact_uri(uri); | ||||||
|  |       warn!( | ||||||
|  |         "Failed to load uri: {} with error: {}, cert: {}", | ||||||
|  |         redacted_uri, err, cert | ||||||
|  |       ); | ||||||
|  |  | ||||||
|  |       callback(Err(AuthError::TlsError)); | ||||||
|  |       true | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     wv.connect_load_failed(move |_wv, _event, uri, err| { | ||||||
|  |       let redacted_uri = redact_uri(uri); | ||||||
|  |       if !uri.starts_with("globalprotectcallback:") { | ||||||
|  |         warn!("Failed to load uri: {} with error: {}", redacted_uri, err); | ||||||
|  |       } | ||||||
|  |       // NOTE: Don't send error here, since load_changed event will be triggered after this | ||||||
|  |       // true to stop other handlers from being invoked for the event. false to propagate the event further. | ||||||
|  |       true | ||||||
|  |     }); | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										277
									
								
								crates/auth/src/webview/webview_auth.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										277
									
								
								crates/auth/src/webview/webview_auth.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,277 @@ | |||||||
|  | use std::{sync::Arc, time::Duration}; | ||||||
|  |  | ||||||
|  | use anyhow::bail; | ||||||
|  | use gpapi::{auth::SamlAuthData, gp_params::GpParams, utils::redact::redact_uri}; | ||||||
|  | use log::{info, warn}; | ||||||
|  | use tauri::{ | ||||||
|  |   webview::{PageLoadEvent, PageLoadPayload}, | ||||||
|  |   AppHandle, WebviewUrl, WebviewWindow, WindowEvent, | ||||||
|  | }; | ||||||
|  | use tokio::{sync::oneshot, time}; | ||||||
|  |  | ||||||
|  | use crate::auth_prelogin; | ||||||
|  |  | ||||||
|  | use super::auth_messenger::{AuthError, AuthEvent, AuthMessenger}; | ||||||
|  |  | ||||||
|  | pub trait PlatformWebviewExt { | ||||||
|  |   fn ignore_tls_errors(&self) -> anyhow::Result<()>; | ||||||
|  |  | ||||||
|  |   fn load_url(&self, url: &str) -> anyhow::Result<()>; | ||||||
|  |  | ||||||
|  |   fn load_html(&self, html: &str) -> anyhow::Result<()>; | ||||||
|  |  | ||||||
|  |   fn get_html(&self, callback: Box<dyn Fn(anyhow::Result<String>) + 'static>); | ||||||
|  |  | ||||||
|  |   fn load_auth_request(&self, auth_request: &str) -> anyhow::Result<()> { | ||||||
|  |     if auth_request.starts_with("http") { | ||||||
|  |       info!("Loading auth request as URL: {}", redact_uri(auth_request)); | ||||||
|  |       self.load_url(auth_request) | ||||||
|  |     } else { | ||||||
|  |       info!("Loading auth request as HTML..."); | ||||||
|  |       self.load_html(auth_request) | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[cfg(not(target_os = "macos"))] | ||||||
|  | pub trait GetHeader { | ||||||
|  |   fn get_header(&self, key: &str) -> Option<String>; | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub struct WebviewAuthenticator<'a> { | ||||||
|  |   server: &'a str, | ||||||
|  |   gp_params: &'a GpParams, | ||||||
|  |   auth_request: Option<&'a str>, | ||||||
|  |   clean: bool, | ||||||
|  |  | ||||||
|  |   is_retrying: tokio::sync::RwLock<bool>, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl<'a> WebviewAuthenticator<'a> { | ||||||
|  |   pub fn new(server: &'a str, gp_params: &'a GpParams) -> Self { | ||||||
|  |     Self { | ||||||
|  |       server, | ||||||
|  |       gp_params, | ||||||
|  |       auth_request: None, | ||||||
|  |       clean: false, | ||||||
|  |       is_retrying: Default::default(), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn with_auth_request(mut self, auth_request: &'a str) -> Self { | ||||||
|  |     self.auth_request = Some(auth_request); | ||||||
|  |     self | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn with_clean(mut self, clean: bool) -> Self { | ||||||
|  |     self.clean = clean; | ||||||
|  |     self | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub async fn authenticate(&self, app_handle: &AppHandle) -> anyhow::Result<SamlAuthData> { | ||||||
|  |     let auth_messenger = Arc::new(AuthMessenger::new()); | ||||||
|  |     let auth_messenger_clone = Arc::clone(&auth_messenger); | ||||||
|  |  | ||||||
|  |     let on_page_load = move |auth_window: WebviewWindow, event: PageLoadPayload<'_>| { | ||||||
|  |       let auth_messenger_clone = Arc::clone(&auth_messenger_clone); | ||||||
|  |       let redacted_url = redact_uri(event.url().as_str()); | ||||||
|  |  | ||||||
|  |       match event.event() { | ||||||
|  |         PageLoadEvent::Started => { | ||||||
|  |           info!("Started loading page: {}", redacted_url); | ||||||
|  |           auth_messenger_clone.cancel_raise_window(); | ||||||
|  |         } | ||||||
|  |         PageLoadEvent::Finished => { | ||||||
|  |           info!("Finished loading page: {}", redacted_url); | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |  | ||||||
|  |       // Read auth data from the page no matter whether it's finished loading or not | ||||||
|  |       // Because we found that the finished event may not be triggered in some cases (e.g., on macOS) | ||||||
|  |       let _ = auth_window.with_webview(move |wv| { | ||||||
|  |         wv.get_html(Box::new(move |html| match html { | ||||||
|  |           Ok(html) => auth_messenger_clone.read_from_html(&html), | ||||||
|  |           Err(err) => warn!("Failed to get html: {}", err), | ||||||
|  |         })); | ||||||
|  |       }); | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     let title_bar_height = if cfg!(target_os = "macos") { 28.0 } else { 0.0 }; | ||||||
|  |  | ||||||
|  |     let auth_window = WebviewWindow::builder(app_handle, "auth_window", WebviewUrl::default()) | ||||||
|  |       .on_page_load(on_page_load) | ||||||
|  |       .title("GlobalProtect Login") | ||||||
|  |       .inner_size(900.0, 650.0 + title_bar_height) | ||||||
|  |       .focused(true) | ||||||
|  |       .visible(false) | ||||||
|  |       .center() | ||||||
|  |       .build()?; | ||||||
|  |  | ||||||
|  |     self | ||||||
|  |       .setup_auth_window(&auth_window, Arc::clone(&auth_messenger)) | ||||||
|  |       .await?; | ||||||
|  |  | ||||||
|  |     loop { | ||||||
|  |       match auth_messenger.subscribe().await? { | ||||||
|  |         AuthEvent::Close => bail!("Authentication cancelled"), | ||||||
|  |         AuthEvent::RaiseWindow => self.raise_window(&auth_window), | ||||||
|  |         #[cfg(not(any(target_os = "macos", target_os = "windows")))] | ||||||
|  |         AuthEvent::Error(AuthError::TlsError) => bail!(gpapi::error::PortalError::TlsError), | ||||||
|  |         AuthEvent::Error(AuthError::NotFound(location)) => { | ||||||
|  |           info!( | ||||||
|  |             "No auth data found in {:?}, it may not be the /SAML20/SP/ACS endpoint", | ||||||
|  |             location | ||||||
|  |           ); | ||||||
|  |           self.handle_not_found(&auth_window, &auth_messenger); | ||||||
|  |         } | ||||||
|  |         AuthEvent::Error(AuthError::Invalid(err, location)) => { | ||||||
|  |           warn!("Got invalid auth data in {:?}: {}", location, err); | ||||||
|  |           self.retry_auth(&auth_window).await; | ||||||
|  |         } | ||||||
|  |         AuthEvent::Data(auth_data, location) => { | ||||||
|  |           info!("Got auth data from {:?}", location); | ||||||
|  |  | ||||||
|  |           auth_window.close()?; | ||||||
|  |           return Ok(auth_data); | ||||||
|  |         } | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   async fn setup_auth_window( | ||||||
|  |     &self, | ||||||
|  |     auth_window: &WebviewWindow, | ||||||
|  |     auth_messenger: Arc<AuthMessenger>, | ||||||
|  |   ) -> anyhow::Result<()> { | ||||||
|  |     info!("Setting up auth window..."); | ||||||
|  |  | ||||||
|  |     if self.clean { | ||||||
|  |       info!("Clearing all browsing data..."); | ||||||
|  |       auth_window.clear_all_browsing_data()?; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     // Handle window close event | ||||||
|  |     let auth_messenger_clone = Arc::clone(&auth_messenger); | ||||||
|  |     auth_window.on_window_event(move |event| { | ||||||
|  |       if let WindowEvent::CloseRequested { .. } = event { | ||||||
|  |         auth_messenger_clone.send_auth_event(AuthEvent::Close); | ||||||
|  |       } | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     // Show the window after 10 seconds, so that the user can see the window if the auth process is stuck | ||||||
|  |     let auth_messenger_clone = Arc::clone(&auth_messenger); | ||||||
|  |     tokio::spawn(async move { | ||||||
|  |       time::sleep(Duration::from_secs(10)).await; | ||||||
|  |       auth_messenger_clone.send_auth_event(AuthEvent::RaiseWindow); | ||||||
|  |     }); | ||||||
|  |  | ||||||
|  |     let auth_request = match self.auth_request { | ||||||
|  |       Some(auth_request) => auth_request.to_string(), | ||||||
|  |       None => auth_prelogin(&self.server, &self.gp_params).await?, | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     let (tx, rx) = oneshot::channel::<anyhow::Result<()>>(); | ||||||
|  |     let ignore_tls_errors = self.gp_params.ignore_tls_errors(); | ||||||
|  |  | ||||||
|  |     // Set up webview | ||||||
|  |     auth_window.with_webview(move |wv| { | ||||||
|  |       #[cfg(not(target_os = "macos"))] | ||||||
|  |       { | ||||||
|  |         use super::platform_impl::PlatformWebviewOnResponse; | ||||||
|  |         wv.on_response(Box::new(move |response| match response { | ||||||
|  |           Ok(response) => auth_messenger.read_from_response(&response), | ||||||
|  |           Err(err) => auth_messenger.send_auth_error(err), | ||||||
|  |         })); | ||||||
|  |       } | ||||||
|  |  | ||||||
|  |       let result = || -> anyhow::Result<()> { | ||||||
|  |         if ignore_tls_errors { | ||||||
|  |           wv.ignore_tls_errors()?; | ||||||
|  |         } | ||||||
|  |  | ||||||
|  |         wv.load_auth_request(&auth_request) | ||||||
|  |       }(); | ||||||
|  |  | ||||||
|  |       if let Err(result) = tx.send(result) { | ||||||
|  |         warn!("Failed to send setup auth window result: {:?}", result); | ||||||
|  |       } | ||||||
|  |     })?; | ||||||
|  |  | ||||||
|  |     rx.await??; | ||||||
|  |     info!("Auth window setup completed"); | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn handle_not_found(&self, auth_window: &WebviewWindow, auth_messenger: &Arc<AuthMessenger>) { | ||||||
|  |     let visible = auth_window.is_visible().unwrap_or(false); | ||||||
|  |     if visible { | ||||||
|  |       return; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     auth_messenger.schedule_raise_window(2); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   async fn retry_auth(&self, auth_window: &WebviewWindow) { | ||||||
|  |     let mut is_retrying = self.is_retrying.write().await; | ||||||
|  |     if *is_retrying { | ||||||
|  |       info!("Already retrying authentication, skipping..."); | ||||||
|  |       return; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     *is_retrying = true; | ||||||
|  |     drop(is_retrying); | ||||||
|  |  | ||||||
|  |     if let Err(err) = self.retry_auth_impl(auth_window).await { | ||||||
|  |       warn!("Failed to retry authentication: {}", err); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     *self.is_retrying.write().await = false; | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   async fn retry_auth_impl(&self, auth_window: &WebviewWindow) -> anyhow::Result<()> { | ||||||
|  |     info!("Retrying authentication..."); | ||||||
|  |  | ||||||
|  |     auth_window.eval( r#" | ||||||
|  |       var loading = document.createElement("div"); | ||||||
|  |       loading.innerHTML = '<div style="position: absolute; width: 100%; text-align: center; font-size: 20px; font-weight: bold; top: 50%; left: 50%; transform: translate(-50%, -50%);">Got invalid token, retrying...</div>'; | ||||||
|  |       loading.style = "position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(255, 255, 255, 0.85); z-index: 99999;"; | ||||||
|  |       document.body.appendChild(loading); | ||||||
|  |     "#)?; | ||||||
|  |  | ||||||
|  |     let auth_request = auth_prelogin(&self.server, &self.gp_params).await?; | ||||||
|  |     let (tx, rx) = oneshot::channel::<anyhow::Result<()>>(); | ||||||
|  |     auth_window.with_webview(move |wv| { | ||||||
|  |       let result = wv.load_auth_request(&auth_request); | ||||||
|  |       if let Err(result) = tx.send(result) { | ||||||
|  |         warn!("Failed to send retry auth result: {:?}", result); | ||||||
|  |       } | ||||||
|  |     })?; | ||||||
|  |  | ||||||
|  |     rx.await??; | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn raise_window(&self, auth_window: &WebviewWindow) { | ||||||
|  |     let visible = auth_window.is_visible().unwrap_or(false); | ||||||
|  |     if visible { | ||||||
|  |       return; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     info!("Raising auth window..."); | ||||||
|  |  | ||||||
|  |     #[cfg(any(target_os = "macos", target_os = "windows"))] | ||||||
|  |     let result = auth_window.show(); | ||||||
|  |  | ||||||
|  |     #[cfg(not(any(target_os = "macos", target_os = "windows")))] | ||||||
|  |     let result = { | ||||||
|  |       use gpapi::utils::window::WindowExt; | ||||||
|  |       auth_window.raise() | ||||||
|  |     }; | ||||||
|  |  | ||||||
|  |     if let Err(err) = result { | ||||||
|  |       warn!("Failed to raise window: {}", err); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
							
								
								
									
										142
									
								
								crates/auth/src/webview/windows.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										142
									
								
								crates/auth/src/webview/windows.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,142 @@ | |||||||
|  | use log::warn; | ||||||
|  | use tauri::webview::PlatformWebview; | ||||||
|  | use webview2_com::{ | ||||||
|  |   pwstr_from_str, take_pwstr, ExecuteScriptCompletedHandler, | ||||||
|  |   Microsoft::Web::WebView2::Win32::{ | ||||||
|  |     ICoreWebView2WebResourceResponseView, ICoreWebView2_14, ICoreWebView2_2, | ||||||
|  |     COREWEBVIEW2_SERVER_CERTIFICATE_ERROR_ACTION_ALWAYS_ALLOW, | ||||||
|  |   }, | ||||||
|  |   ServerCertificateErrorDetectedEventHandler, WebResourceResponseReceivedEventHandler, | ||||||
|  | }; | ||||||
|  | use windows_core::{Interface, PWSTR}; | ||||||
|  |  | ||||||
|  | use super::{ | ||||||
|  |   auth_messenger::AuthError, | ||||||
|  |   webview_auth::{GetHeader, PlatformWebviewExt}, | ||||||
|  | }; | ||||||
|  |  | ||||||
|  | impl PlatformWebviewExt for PlatformWebview { | ||||||
|  |   fn ignore_tls_errors(&self) -> anyhow::Result<()> { | ||||||
|  |     unsafe { | ||||||
|  |       let wv = self.controller().CoreWebView2()?.cast::<ICoreWebView2_14>()?; | ||||||
|  |       let handler = ServerCertificateErrorDetectedEventHandler::create(Box::new(|_, e| { | ||||||
|  |         if let Some(e) = e { | ||||||
|  |           let _ = e.SetAction(COREWEBVIEW2_SERVER_CERTIFICATE_ERROR_ACTION_ALWAYS_ALLOW); | ||||||
|  |         } | ||||||
|  |         Ok(()) | ||||||
|  |       })); | ||||||
|  |  | ||||||
|  |       wv.add_ServerCertificateErrorDetected(&handler, &mut Default::default())?; | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_url(&self, url: &str) -> anyhow::Result<()> { | ||||||
|  |     let url = pwstr_from_str(url); | ||||||
|  |  | ||||||
|  |     unsafe { self.controller().CoreWebView2()?.Navigate(url)? } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn load_html(&self, html: &str) -> anyhow::Result<()> { | ||||||
|  |     let html = pwstr_from_str(html); | ||||||
|  |  | ||||||
|  |     unsafe { self.controller().CoreWebView2()?.NavigateToString(html)? } | ||||||
|  |  | ||||||
|  |     Ok(()) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn get_html(&self, callback: Box<dyn Fn(anyhow::Result<String>) + 'static>) { | ||||||
|  |     unsafe { | ||||||
|  |       match self.controller().CoreWebView2() { | ||||||
|  |         Ok(wv) => { | ||||||
|  |           let js = "document.documentElement.outerHTML"; | ||||||
|  |           let js = pwstr_from_str(js); | ||||||
|  |  | ||||||
|  |           let handler = ExecuteScriptCompletedHandler::create(Box::new(move |err, html| { | ||||||
|  |             if let Err(err) = err { | ||||||
|  |               callback(Err(anyhow::anyhow!(err))); | ||||||
|  |               return Ok(()); | ||||||
|  |             } | ||||||
|  |  | ||||||
|  |             // The returned HTML is JSON.stringify'd string, so we need to parse it | ||||||
|  |             let res = match serde_json::from_str(&html) { | ||||||
|  |               Ok(Some(html)) => Ok(html), | ||||||
|  |               Ok(None) => Err(anyhow::anyhow!("No HTML returned")), | ||||||
|  |               Err(err) => Err(anyhow::anyhow!(err)), | ||||||
|  |             }; | ||||||
|  |             callback(res); | ||||||
|  |  | ||||||
|  |             Ok(()) | ||||||
|  |           })); | ||||||
|  |  | ||||||
|  |           if let Err(err) = wv.ExecuteScript(js, &handler) { | ||||||
|  |             warn!("Failed to execute script: {}", err); | ||||||
|  |           } | ||||||
|  |         } | ||||||
|  |         Err(err) => callback(Err(anyhow::anyhow!(err))), | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl GetHeader for ICoreWebView2WebResourceResponseView { | ||||||
|  |   fn get_header(&self, key: &str) -> Option<String> { | ||||||
|  |     unsafe { | ||||||
|  |       let headers = self.Headers().ok()?; | ||||||
|  |       let key = pwstr_from_str(key); | ||||||
|  |  | ||||||
|  |       let mut contains = Default::default(); | ||||||
|  |       headers.Contains(key, &mut contains).ok()?; | ||||||
|  |  | ||||||
|  |       if contains.as_bool() { | ||||||
|  |         let mut value = PWSTR::null(); | ||||||
|  |         headers.GetHeader(key, &mut value).ok()?; | ||||||
|  |         let value = take_pwstr(value); | ||||||
|  |  | ||||||
|  |         Some(value) | ||||||
|  |       } else { | ||||||
|  |         None | ||||||
|  |       } | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub trait PlatformWebviewOnResponse { | ||||||
|  |   fn on_response( | ||||||
|  |     &self, | ||||||
|  |     callback: Box<dyn Fn(anyhow::Result<ICoreWebView2WebResourceResponseView, AuthError>) + 'static>, | ||||||
|  |   ); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl PlatformWebviewOnResponse for PlatformWebview { | ||||||
|  |   fn on_response( | ||||||
|  |     &self, | ||||||
|  |     callback: Box<dyn Fn(anyhow::Result<ICoreWebView2WebResourceResponseView, AuthError>) + 'static>, | ||||||
|  |   ) { | ||||||
|  |     unsafe { | ||||||
|  |       let _ = self | ||||||
|  |         .controller() | ||||||
|  |         .CoreWebView2() | ||||||
|  |         .and_then(|wv| wv.cast::<ICoreWebView2_2>()) | ||||||
|  |         .map(|wv| { | ||||||
|  |           let handler = WebResourceResponseReceivedEventHandler::create(Box::new(move |_, e| { | ||||||
|  |             let Some(e) = e else { | ||||||
|  |               return Ok(()); | ||||||
|  |             }; | ||||||
|  |  | ||||||
|  |             match e.Response() { | ||||||
|  |               Ok(res) => callback(Ok(res)), | ||||||
|  |               Err(err) => warn!("Failed to get response: {}", err), | ||||||
|  |             } | ||||||
|  |  | ||||||
|  |             Ok(()) | ||||||
|  |           })); | ||||||
|  |  | ||||||
|  |           let _ = wv.add_WebResourceResponseReceived(&handler, &mut Default::default()); | ||||||
|  |         }); | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
| @@ -2,22 +2,26 @@ use std::{io, path::Path}; | |||||||
|  |  | ||||||
| use is_executable::IsExecutable; | use is_executable::IsExecutable; | ||||||
|  |  | ||||||
| const VPNC_SCRIPT_LOCATIONS: [&str; 6] = [ | const VPNC_SCRIPT_LOCATIONS: &[&str] = &[ | ||||||
|   "/usr/local/share/vpnc-scripts/vpnc-script", |   "/usr/local/share/vpnc-scripts/vpnc-script", | ||||||
|   "/usr/local/sbin/vpnc-script", |   "/usr/local/sbin/vpnc-script", | ||||||
|   "/usr/share/vpnc-scripts/vpnc-script", |   "/usr/share/vpnc-scripts/vpnc-script", | ||||||
|   "/usr/sbin/vpnc-script", |   "/usr/sbin/vpnc-script", | ||||||
|   "/etc/vpnc/vpnc-script", |   "/etc/vpnc/vpnc-script", | ||||||
|   "/etc/openconnect/vpnc-script", |   "/etc/openconnect/vpnc-script", | ||||||
|  |   #[cfg(target_os = "macos")] | ||||||
|  |   "/opt/homebrew/etc/vpnc/vpnc-script", | ||||||
| ]; | ]; | ||||||
|  |  | ||||||
| const CSD_WRAPPER_LOCATIONS: [&str; 3] = [ | const CSD_WRAPPER_LOCATIONS: &[&str] = &[ | ||||||
|   #[cfg(target_arch = "x86_64")] |   #[cfg(target_arch = "x86_64")] | ||||||
|   "/usr/lib/x86_64-linux-gnu/openconnect/hipreport.sh", |   "/usr/lib/x86_64-linux-gnu/openconnect/hipreport.sh", | ||||||
|   #[cfg(target_arch = "aarch64")] |   #[cfg(target_arch = "aarch64")] | ||||||
|   "/usr/lib/aarch64-linux-gnu/openconnect/hipreport.sh", |   "/usr/lib/aarch64-linux-gnu/openconnect/hipreport.sh", | ||||||
|   "/usr/lib/openconnect/hipreport.sh", |   "/usr/lib/openconnect/hipreport.sh", | ||||||
|   "/usr/libexec/openconnect/hipreport.sh", |   "/usr/libexec/openconnect/hipreport.sh", | ||||||
|  |   #[cfg(target_os = "macos")] | ||||||
|  |   "/opt/homebrew/opt/openconnect/libexec/openconnect/hipreport.sh", | ||||||
| ]; | ]; | ||||||
|  |  | ||||||
| fn find_executable(locations: &[&str]) -> Option<String> { | fn find_executable(locations: &[&str]) -> Option<String> { | ||||||
|   | |||||||
| @@ -1,5 +1,6 @@ | |||||||
| [package] | [package] | ||||||
| name = "gpapi" | name = "gpapi" | ||||||
|  | rust-version.workspace = true | ||||||
| version.workspace = true | version.workspace = true | ||||||
| edition.workspace = true | edition.workspace = true | ||||||
| license = "MIT" | license = "MIT" | ||||||
| @@ -11,13 +12,13 @@ dns-lookup.workspace = true | |||||||
| log.workspace = true | log.workspace = true | ||||||
| reqwest.workspace = true | reqwest.workspace = true | ||||||
| openssl.workspace = true | openssl.workspace = true | ||||||
|  | version-compare = "0.2" | ||||||
| pem.workspace = true | pem.workspace = true | ||||||
| roxmltree.workspace = true | roxmltree.workspace = true | ||||||
| serde.workspace = true | serde.workspace = true | ||||||
| specta.workspace = true | specta = { workspace = true, features = ["derive"] } | ||||||
| specta-macros.workspace = true |  | ||||||
| urlencoding.workspace = true | urlencoding.workspace = true | ||||||
| tokio.workspace = true | tokio = { workspace = true, features = ["process", "signal", "macros"] } | ||||||
| serde_json.workspace = true | serde_json.workspace = true | ||||||
| whoami.workspace = true | whoami.workspace = true | ||||||
| tempfile.workspace = true | tempfile.workspace = true | ||||||
| @@ -26,18 +27,23 @@ chacha20poly1305 = { version = "0.10", features = ["std"] } | |||||||
| redact-engine.workspace = true | redact-engine.workspace = true | ||||||
| url.workspace = true | url.workspace = true | ||||||
| regex.workspace = true | regex.workspace = true | ||||||
| uzers.workspace = true |  | ||||||
| serde_urlencoded.workspace = true | serde_urlencoded.workspace = true | ||||||
| md5.workspace = true | md5.workspace = true | ||||||
| sha256.workspace = true | sha256.workspace = true | ||||||
| which.workspace = true |  | ||||||
|  |  | ||||||
| tauri = { workspace = true, optional = true } | tauri = { workspace = true, optional = true } | ||||||
| clap = { workspace = true, optional = true } | clap = { workspace = true, optional = true } | ||||||
| open = { version = "5", optional = true } | clap-verbosity-flag = { workspace = true, optional = true } | ||||||
| webbrowser = { version = "1", optional = true } |  | ||||||
|  | env_logger = { workspace = true, optional = true } | ||||||
|  | log-reload = { version = "0.1", optional = true } | ||||||
|  |  | ||||||
|  | [target.'cfg(target_family="unix")'.dependencies] | ||||||
|  | uzers.workspace = true | ||||||
|  |  | ||||||
| [features] | [features] | ||||||
| tauri = ["dep:tauri"] | tauri = ["dep:tauri"] | ||||||
| clap = ["dep:clap"] | clap = ["dep:clap", "dep:clap-verbosity-flag"] | ||||||
| browser-auth = ["dep:open", "dep:webbrowser"] | webview-auth = [] | ||||||
|  | logger = ["dep:env_logger", "dep:log-reload"] | ||||||
|   | |||||||
| @@ -1,11 +1,14 @@ | |||||||
| use std::borrow::{Borrow, Cow}; | use std::borrow::{Borrow, Cow}; | ||||||
|  |  | ||||||
|  | use anyhow::bail; | ||||||
| use log::{info, warn}; | use log::{info, warn}; | ||||||
| use regex::Regex; | use regex::Regex; | ||||||
| use serde::{Deserialize, Serialize}; | use serde::{Deserialize, Serialize}; | ||||||
|  |  | ||||||
| use crate::{error::AuthDataParseError, utils::base64::decode_to_string}; | use crate::{error::AuthDataParseError, utils::base64::decode_to_string}; | ||||||
|  |  | ||||||
|  | pub type AuthDataParseResult = anyhow::Result<SamlAuthData, AuthDataParseError>; | ||||||
|  |  | ||||||
| #[derive(Debug, Serialize, Deserialize)] | #[derive(Debug, Serialize, Deserialize)] | ||||||
| #[serde(rename_all = "camelCase")] | #[serde(rename_all = "camelCase")] | ||||||
| pub struct SamlAuthData { | pub struct SamlAuthData { | ||||||
| @@ -33,33 +36,48 @@ impl SamlAuthResult { | |||||||
| } | } | ||||||
|  |  | ||||||
| impl SamlAuthData { | impl SamlAuthData { | ||||||
|   pub fn new(username: String, prelogin_cookie: Option<String>, portal_userauthcookie: Option<String>) -> Self { |   pub fn new( | ||||||
|     Self { |     username: Option<String>, | ||||||
|       username, |     prelogin_cookie: Option<String>, | ||||||
|       prelogin_cookie, |     portal_userauthcookie: Option<String>, | ||||||
|       portal_userauthcookie, |   ) -> anyhow::Result<Self> { | ||||||
|       token: None, |     let username = username.unwrap_or_default(); | ||||||
|     } |     if username.is_empty() { | ||||||
|  |       bail!("Invalid username: <empty>"); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|   pub fn from_html(html: &str) -> anyhow::Result<SamlAuthData, AuthDataParseError> { |     let prelogin_cookie = prelogin_cookie.unwrap_or_default(); | ||||||
|  |     let portal_userauthcookie = portal_userauthcookie.unwrap_or_default(); | ||||||
|  |  | ||||||
|  |     if prelogin_cookie.len() <= 5 && portal_userauthcookie.len() <= 5 { | ||||||
|  |       bail!( | ||||||
|  |         "Invalid prelogin-cookie: {}, portal-userauthcookie: {}", | ||||||
|  |         prelogin_cookie, | ||||||
|  |         portal_userauthcookie | ||||||
|  |       ); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(Self { | ||||||
|  |       username, | ||||||
|  |       prelogin_cookie: Some(prelogin_cookie), | ||||||
|  |       portal_userauthcookie: Some(portal_userauthcookie), | ||||||
|  |       token: None, | ||||||
|  |     }) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn from_html(html: &str) -> AuthDataParseResult { | ||||||
|     match parse_xml_tag(html, "saml-auth-status") { |     match parse_xml_tag(html, "saml-auth-status") { | ||||||
|       Some(saml_status) if saml_status == "1" => { |       Some(status) if status == "1" => { | ||||||
|         let username = parse_xml_tag(html, "saml-username"); |         let username = parse_xml_tag(html, "saml-username"); | ||||||
|         let prelogin_cookie = parse_xml_tag(html, "prelogin-cookie"); |         let prelogin_cookie = parse_xml_tag(html, "prelogin-cookie"); | ||||||
|         let portal_userauthcookie = parse_xml_tag(html, "portal-userauthcookie"); |         let portal_userauthcookie = parse_xml_tag(html, "portal-userauthcookie"); | ||||||
|  |  | ||||||
|         if SamlAuthData::check(&username, &prelogin_cookie, &portal_userauthcookie) { |         SamlAuthData::new(username, prelogin_cookie, portal_userauthcookie).map_err(AuthDataParseError::Invalid) | ||||||
|           Ok(SamlAuthData::new( |  | ||||||
|             username.unwrap(), |  | ||||||
|             prelogin_cookie, |  | ||||||
|             portal_userauthcookie, |  | ||||||
|           )) |  | ||||||
|         } else { |  | ||||||
|           Err(AuthDataParseError::Invalid) |  | ||||||
|       } |       } | ||||||
|       } |       Some(status) => Err(AuthDataParseError::Invalid(anyhow::anyhow!( | ||||||
|       Some(_) => Err(AuthDataParseError::Invalid), |         "SAML auth status: {}", | ||||||
|  |         status | ||||||
|  |       ))), | ||||||
|       None => Err(AuthDataParseError::NotFound), |       None => Err(AuthDataParseError::NotFound), | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
| @@ -79,15 +97,15 @@ impl SamlAuthData { | |||||||
|       let auth_data: SamlAuthData = serde_urlencoded::from_str(auth_data.borrow()).map_err(|e| { |       let auth_data: SamlAuthData = serde_urlencoded::from_str(auth_data.borrow()).map_err(|e| { | ||||||
|         warn!("Failed to parse token auth data: {}", e); |         warn!("Failed to parse token auth data: {}", e); | ||||||
|         warn!("Auth data: {}", auth_data); |         warn!("Auth data: {}", auth_data); | ||||||
|         AuthDataParseError::Invalid |         AuthDataParseError::Invalid(anyhow::anyhow!(e)) | ||||||
|       })?; |       })?; | ||||||
|  |  | ||||||
|       return Ok(auth_data); |       return Ok(auth_data); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|     let auth_data = decode_to_string(auth_data).map_err(|e| { |     let auth_data = decode_to_string(auth_data).map_err(|e| { | ||||||
|       warn!("Failed to decode SAML auth data: {}", e); |       warn!("Failed to decode SAML auth data: {}", auth_data); | ||||||
|       AuthDataParseError::Invalid |       AuthDataParseError::Invalid(anyhow::anyhow!(e)) | ||||||
|     })?; |     })?; | ||||||
|     let auth_data = Self::from_html(&auth_data)?; |     let auth_data = Self::from_html(&auth_data)?; | ||||||
|  |  | ||||||
| @@ -105,30 +123,9 @@ impl SamlAuthData { | |||||||
|   pub fn token(&self) -> Option<&str> { |   pub fn token(&self) -> Option<&str> { | ||||||
|     self.token.as_deref() |     self.token.as_deref() | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub fn check( |  | ||||||
|     username: &Option<String>, |  | ||||||
|     prelogin_cookie: &Option<String>, |  | ||||||
|     portal_userauthcookie: &Option<String>, |  | ||||||
|   ) -> bool { |  | ||||||
|     let username_valid = username.as_ref().is_some_and(|username| !username.is_empty()); |  | ||||||
|     let prelogin_cookie_valid = prelogin_cookie.as_ref().is_some_and(|val| val.len() > 5); |  | ||||||
|     let portal_userauthcookie_valid = portal_userauthcookie.as_ref().is_some_and(|val| val.len() > 5); |  | ||||||
|  |  | ||||||
|     let is_valid = username_valid && (prelogin_cookie_valid || portal_userauthcookie_valid); |  | ||||||
|  |  | ||||||
|     if !is_valid { |  | ||||||
|       warn!( |  | ||||||
|         "Invalid SAML auth data: username: {:?}, prelogin-cookie: {:?}, portal-userauthcookie: {:?}", |  | ||||||
|         username, prelogin_cookie, portal_userauthcookie |  | ||||||
|       ); |  | ||||||
| } | } | ||||||
|  |  | ||||||
|     is_valid | fn parse_xml_tag(html: &str, tag: &str) -> Option<String> { | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| pub fn parse_xml_tag(html: &str, tag: &str) -> Option<String> { |  | ||||||
|   let re = Regex::new(&format!("<{}>(.*)</{}>", tag, tag)).unwrap(); |   let re = Regex::new(&format!("<{}>(.*)</{}>", tag, tag)).unwrap(); | ||||||
|   re.captures(html) |   re.captures(html) | ||||||
|     .and_then(|captures| captures.get(1)) |     .and_then(|captures| captures.get(1)) | ||||||
|   | |||||||
| @@ -1 +1,81 @@ | |||||||
|  | use clap_verbosity_flag::{LogLevel, Verbosity, VerbosityFilter}; | ||||||
|  | use log::Level; | ||||||
|  |  | ||||||
|  | use crate::error::PortalError; | ||||||
|  |  | ||||||
| pub mod args; | pub mod args; | ||||||
|  |  | ||||||
|  | pub trait Args { | ||||||
|  |   fn fix_openssl(&self) -> bool; | ||||||
|  |   fn ignore_tls_errors(&self) -> bool; | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub fn handle_error(err: anyhow::Error, args: &impl Args) { | ||||||
|  |   eprintln!("\nError: {:?}", err); | ||||||
|  |  | ||||||
|  |   let Some(err) = err.downcast_ref::<PortalError>() else { | ||||||
|  |     return; | ||||||
|  |   }; | ||||||
|  |  | ||||||
|  |   if err.is_legacy_openssl_error() && !args.fix_openssl() { | ||||||
|  |     eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n"); | ||||||
|  |     let args = std::env::args().collect::<Vec<_>>(); | ||||||
|  |     eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" ")); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   if err.is_tls_error() && !args.ignore_tls_errors() { | ||||||
|  |     eprintln!("\nRe-run it with the `--ignore-tls-errors` option to ignore the certificate error, e.g.:\n"); | ||||||
|  |     let args = std::env::args().collect::<Vec<_>>(); | ||||||
|  |     eprintln!("{} --ignore-tls-errors {}\n", args[0], args[1..].join(" ")); | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[derive(Debug)] | ||||||
|  | pub struct InfoLevel; | ||||||
|  |  | ||||||
|  | pub type InfoLevelVerbosity = Verbosity<InfoLevel>; | ||||||
|  |  | ||||||
|  | impl LogLevel for InfoLevel { | ||||||
|  |   fn default_filter() -> VerbosityFilter { | ||||||
|  |     VerbosityFilter::Info | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn verbose_help() -> Option<&'static str> { | ||||||
|  |     Some("Enable verbose output, -v for debug, -vv for trace") | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn quiet_help() -> Option<&'static str> { | ||||||
|  |     Some("Decrease logging verbosity, -q for warnings, -qq for errors") | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub trait ToVerboseArg { | ||||||
|  |   fn to_verbose_arg(&self) -> Option<&'static str>; | ||||||
|  | } | ||||||
|  |  | ||||||
|  | /// Convert the verbosity to the CLI argument value | ||||||
|  | /// The default verbosity is `Info`, which means no argument is needed | ||||||
|  | impl ToVerboseArg for InfoLevelVerbosity { | ||||||
|  |   fn to_verbose_arg(&self) -> Option<&'static str> { | ||||||
|  |     match self.filter() { | ||||||
|  |       VerbosityFilter::Off => Some("-qqq"), | ||||||
|  |       VerbosityFilter::Error => Some("-qq"), | ||||||
|  |       VerbosityFilter::Warn => Some("-q"), | ||||||
|  |       VerbosityFilter::Info => None, | ||||||
|  |       VerbosityFilter::Debug => Some("-v"), | ||||||
|  |       VerbosityFilter::Trace => Some("-vv"), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl ToVerboseArg for Level { | ||||||
|  |   fn to_verbose_arg(&self) -> Option<&'static str> { | ||||||
|  |     match self { | ||||||
|  |       Level::Error => Some("-qq"), | ||||||
|  |       Level::Warn => Some("-q"), | ||||||
|  |       Level::Info => None, | ||||||
|  |       Level::Debug => Some("-v"), | ||||||
|  |       Level::Trace => Some("-vv"), | ||||||
|  |     } | ||||||
|  |   } | ||||||
|  | } | ||||||
|   | |||||||
| @@ -4,16 +4,37 @@ use thiserror::Error; | |||||||
| pub enum PortalError { | pub enum PortalError { | ||||||
|   #[error("Prelogin error: {0}")] |   #[error("Prelogin error: {0}")] | ||||||
|   PreloginError(String), |   PreloginError(String), | ||||||
|  |  | ||||||
|   #[error("Portal config error: {0}")] |   #[error("Portal config error: {0}")] | ||||||
|   ConfigError(String), |   ConfigError(String), | ||||||
|   #[error("Network error: {0}")] |  | ||||||
|   NetworkError(String), |   #[error(transparent)] | ||||||
|  |   NetworkError(#[from] reqwest::Error), | ||||||
|  |  | ||||||
|  |   #[error("TLS error")] | ||||||
|  |   TlsError, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl PortalError { | ||||||
|  |   pub fn is_legacy_openssl_error(&self) -> bool { | ||||||
|  |     format!("{:?}", self).contains("unsafe legacy renegotiation") | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   pub fn is_tls_error(&self) -> bool { | ||||||
|  |     matches!(self, PortalError::TlsError) || format!("{:?}", self).contains("certificate verify failed") | ||||||
|  |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| #[derive(Error, Debug)] | #[derive(Error, Debug)] | ||||||
| pub enum AuthDataParseError { | pub enum AuthDataParseError { | ||||||
|   #[error("No auth data found")] |   #[error("No auth data found")] | ||||||
|   NotFound, |   NotFound, | ||||||
|   #[error("Invalid auth data")] |   #[error(transparent)] | ||||||
|   Invalid, |   Invalid(#[from] anyhow::Error), | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl AuthDataParseError { | ||||||
|  |   pub fn is_invalid(&self) -> bool { | ||||||
|  |     matches!(self, AuthDataParseError::Invalid(_)) | ||||||
|  |   } | ||||||
| } | } | ||||||
|   | |||||||
| @@ -31,12 +31,10 @@ pub async fn gateway_login(gateway: &str, cred: &Credential, gp_params: &GpParam | |||||||
|  |  | ||||||
|   info!("Perform gateway login, user_agent: {}", gp_params.user_agent()); |   info!("Perform gateway login, user_agent: {}", gp_params.user_agent()); | ||||||
|  |  | ||||||
|   let res = client |   let res = client.post(&login_url).form(¶ms).send().await.map_err(|e| { | ||||||
|     .post(&login_url) |     warn!("Network error: {:?}", e); | ||||||
|     .form(¶ms) |     anyhow::anyhow!(PortalError::NetworkError(e)) | ||||||
|     .send() |   })?; | ||||||
|     .await |  | ||||||
|     .map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?; |  | ||||||
|  |  | ||||||
|   let res = parse_gp_response(res).await.map_err(|err| { |   let res = parse_gp_response(res).await.map_err(|err| { | ||||||
|     warn!("{err}"); |     warn!("{err}"); | ||||||
|   | |||||||
| @@ -1,5 +1,7 @@ | |||||||
| mod login; | mod login; | ||||||
| mod parse_gateways; | mod parse_gateways; | ||||||
|  |  | ||||||
|  | #[cfg(unix)] | ||||||
| pub mod hip; | pub mod hip; | ||||||
|  |  | ||||||
| pub use login::*; | pub use login::*; | ||||||
|   | |||||||
| @@ -9,9 +9,10 @@ use crate::{utils::request::create_identity, GP_USER_AGENT}; | |||||||
|  |  | ||||||
| #[derive(Debug, Serialize, Deserialize, Clone, Type, Default)] | #[derive(Debug, Serialize, Deserialize, Clone, Type, Default)] | ||||||
| pub enum ClientOs { | pub enum ClientOs { | ||||||
|   #[default] |   #[cfg_attr(not(target_os = "macos"), default)] | ||||||
|   Linux, |   Linux, | ||||||
|   Windows, |   Windows, | ||||||
|  |   #[cfg_attr(target_os = "macos", default)] | ||||||
|   Mac, |   Mac, | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
| @@ -4,10 +4,16 @@ pub mod error; | |||||||
| pub mod gateway; | pub mod gateway; | ||||||
| pub mod gp_params; | pub mod gp_params; | ||||||
| pub mod portal; | pub mod portal; | ||||||
|  |  | ||||||
|  | #[cfg(unix)] | ||||||
| pub mod process; | pub mod process; | ||||||
|  |  | ||||||
| pub mod service; | pub mod service; | ||||||
| pub mod utils; | pub mod utils; | ||||||
|  |  | ||||||
|  | #[cfg(feature = "logger")] | ||||||
|  | pub mod logger; | ||||||
|  |  | ||||||
| #[cfg(feature = "clap")] | #[cfg(feature = "clap")] | ||||||
| pub mod clap; | pub mod clap; | ||||||
|  |  | ||||||
| @@ -16,6 +22,7 @@ pub const GP_API_KEY: &[u8; 32] = &[0; 32]; | |||||||
|  |  | ||||||
| pub const GP_USER_AGENT: &str = "PAN GlobalProtect"; | pub const GP_USER_AGENT: &str = "PAN GlobalProtect"; | ||||||
| pub const GP_SERVICE_LOCK_FILE: &str = "/var/run/gpservice.lock"; | pub const GP_SERVICE_LOCK_FILE: &str = "/var/run/gpservice.lock"; | ||||||
|  | pub const GP_CALLBACK_PORT_FILENAME: &str = "gpcallback.port"; | ||||||
|  |  | ||||||
| #[cfg(not(debug_assertions))] | #[cfg(not(debug_assertions))] | ||||||
| pub const GP_CLIENT_BINARY: &str = "/usr/bin/gpclient"; | pub const GP_CLIENT_BINARY: &str = "/usr/bin/gpclient"; | ||||||
|   | |||||||
							
								
								
									
										44
									
								
								crates/gpapi/src/logger.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								crates/gpapi/src/logger.rs
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,44 @@ | |||||||
|  | use std::sync::OnceLock; | ||||||
|  |  | ||||||
|  | use anyhow::bail; | ||||||
|  | use env_logger::Logger; | ||||||
|  | use log::{warn, Level}; | ||||||
|  | use log_reload::{ReloadHandle, ReloadLog}; | ||||||
|  |  | ||||||
|  | static LOG_HANDLE: OnceLock<ReloadHandle<log_reload::LevelFilter<Logger>>> = OnceLock::new(); | ||||||
|  |  | ||||||
|  | pub fn init(level: Level) { | ||||||
|  |   // Initialize the env_logger and global max level to trace, the logs will be | ||||||
|  |   // filtered by the outer logger | ||||||
|  |   let logger = env_logger::builder().filter_level(log::LevelFilter::Trace).build(); | ||||||
|  |   init_with_logger(level, logger); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub fn init_with_logger(level: Level, logger: Logger) { | ||||||
|  |   if let Some(_) = LOG_HANDLE.get() { | ||||||
|  |     warn!("Logger already initialized"); | ||||||
|  |     return; | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   log::set_max_level(log::LevelFilter::Trace); | ||||||
|  |  | ||||||
|  |   // Create a new logger that will filter the logs based on the max level | ||||||
|  |   let level_filter_logger = log_reload::LevelFilter::new(level, logger); | ||||||
|  |  | ||||||
|  |   let reload_log = ReloadLog::new(level_filter_logger); | ||||||
|  |   let handle = reload_log.handle(); | ||||||
|  |  | ||||||
|  |   // Register the logger to be used by the log crate | ||||||
|  |   let _ = log::set_boxed_logger(Box::new(reload_log)); | ||||||
|  |   let _ = LOG_HANDLE.set(handle); | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub fn set_max_level(level: Level) -> anyhow::Result<()> { | ||||||
|  |   let Some(handle) = LOG_HANDLE.get() else { | ||||||
|  |     bail!("Logger not initialized") | ||||||
|  |   }; | ||||||
|  |  | ||||||
|  |   handle | ||||||
|  |     .modify(|logger| logger.set_level(level)) | ||||||
|  |     .map_err(|e| anyhow::anyhow!(e)) | ||||||
|  | } | ||||||
| @@ -1,6 +1,6 @@ | |||||||
| use anyhow::bail; | use anyhow::bail; | ||||||
| use dns_lookup::lookup_addr; | use dns_lookup::lookup_addr; | ||||||
| use log::{debug, info, warn}; | use log::{info, warn}; | ||||||
| use reqwest::{Client, StatusCode}; | use reqwest::{Client, StatusCode}; | ||||||
| use roxmltree::{Document, Node}; | use roxmltree::{Document, Node}; | ||||||
| use serde::Serialize; | use serde::Serialize; | ||||||
| @@ -111,12 +111,10 @@ pub async fn retrieve_config(portal: &str, cred: &Credential, gp_params: &GpPara | |||||||
|  |  | ||||||
|   info!("Retrieve the portal config, user_agent: {}", gp_params.user_agent()); |   info!("Retrieve the portal config, user_agent: {}", gp_params.user_agent()); | ||||||
|  |  | ||||||
|   let res = client |   let res = client.post(&url).form(¶ms).send().await.map_err(|e| { | ||||||
|     .post(&url) |     warn!("Network error: {:?}", e); | ||||||
|     .form(¶ms) |     anyhow::anyhow!(PortalError::NetworkError(e)) | ||||||
|     .send() |   })?; | ||||||
|     .await |  | ||||||
|     .map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?; |  | ||||||
|  |  | ||||||
|   let res_xml = parse_gp_response(res).await.or_else(|err| { |   let res_xml = parse_gp_response(res).await.or_else(|err| { | ||||||
|     if err.status == StatusCode::NOT_FOUND { |     if err.status == StatusCode::NOT_FOUND { | ||||||
| @@ -135,8 +133,6 @@ pub async fn retrieve_config(portal: &str, cred: &Credential, gp_params: &GpPara | |||||||
|     bail!(PortalError::ConfigError("Empty portal config response".to_string())) |     bail!(PortalError::ConfigError("Empty portal config response".to_string())) | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   debug!("Portal config response: {}", res_xml); |  | ||||||
|  |  | ||||||
|   let doc = Document::parse(&res_xml).map_err(|e| PortalError::ConfigError(e.to_string()))?; |   let doc = Document::parse(&res_xml).map_err(|e| PortalError::ConfigError(e.to_string()))?; | ||||||
|   let root = doc.root(); |   let root = doc.root(); | ||||||
|  |  | ||||||
|   | |||||||
| @@ -116,14 +116,10 @@ pub async fn prelogin(portal: &str, gp_params: &GpParams) -> anyhow::Result<Prel | |||||||
|  |  | ||||||
|   let client = Client::try_from(gp_params)?; |   let client = Client::try_from(gp_params)?; | ||||||
|  |  | ||||||
|   info!("Perform prelogin, user_agent: {}", gp_params.user_agent()); |   let res = client.post(&prelogin_url).form(¶ms).send().await.map_err(|e| { | ||||||
|  |     warn!("Network error: {:?}", e); | ||||||
|   let res = client |     anyhow::anyhow!(PortalError::NetworkError(e)) | ||||||
|     .post(&prelogin_url) |   })?; | ||||||
|     .form(¶ms) |  | ||||||
|     .send() |  | ||||||
|     .await |  | ||||||
|     .map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?; |  | ||||||
|  |  | ||||||
|   let res_xml = parse_gp_response(res).await.or_else(|err| { |   let res_xml = parse_gp_response(res).await.or_else(|err| { | ||||||
|     if err.status == StatusCode::NOT_FOUND { |     if err.status == StatusCode::NOT_FOUND { | ||||||
|   | |||||||
| @@ -14,12 +14,16 @@ pub struct SamlAuthLauncher<'a> { | |||||||
|   user_agent: Option<&'a str>, |   user_agent: Option<&'a str>, | ||||||
|   os: Option<&'a str>, |   os: Option<&'a str>, | ||||||
|   os_version: Option<&'a str>, |   os_version: Option<&'a str>, | ||||||
|   hidpi: bool, |  | ||||||
|   fix_openssl: bool, |   fix_openssl: bool, | ||||||
|   ignore_tls_errors: bool, |   ignore_tls_errors: bool, | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|  |   hidpi: bool, | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   clean: bool, |   clean: bool, | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   default_browser: bool, |   default_browser: bool, | ||||||
|   browser: Option<&'a str>, |   browser: Option<&'a str>, | ||||||
|  |   verbose: Option<&'a str>, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl<'a> SamlAuthLauncher<'a> { | impl<'a> SamlAuthLauncher<'a> { | ||||||
| @@ -31,12 +35,16 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|       user_agent: None, |       user_agent: None, | ||||||
|       os: None, |       os: None, | ||||||
|       os_version: None, |       os_version: None, | ||||||
|       hidpi: false, |  | ||||||
|       fix_openssl: false, |       fix_openssl: false, | ||||||
|       ignore_tls_errors: false, |       ignore_tls_errors: false, | ||||||
|  |       #[cfg(feature = "webview-auth")] | ||||||
|  |       hidpi: false, | ||||||
|  |       #[cfg(feature = "webview-auth")] | ||||||
|       clean: false, |       clean: false, | ||||||
|  |       #[cfg(feature = "webview-auth")] | ||||||
|       default_browser: false, |       default_browser: false, | ||||||
|       browser: None, |       browser: None, | ||||||
|  |       verbose: None, | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
|  |  | ||||||
| @@ -65,11 +73,6 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|     self |     self | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub fn hidpi(mut self, hidpi: bool) -> Self { |  | ||||||
|     self.hidpi = hidpi; |  | ||||||
|     self |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn fix_openssl(mut self, fix_openssl: bool) -> Self { |   pub fn fix_openssl(mut self, fix_openssl: bool) -> Self { | ||||||
|     self.fix_openssl = fix_openssl; |     self.fix_openssl = fix_openssl; | ||||||
|     self |     self | ||||||
| @@ -80,11 +83,19 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|     self |     self | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|  |   pub fn hidpi(mut self, hidpi: bool) -> Self { | ||||||
|  |     self.hidpi = hidpi; | ||||||
|  |     self | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   pub fn clean(mut self, clean: bool) -> Self { |   pub fn clean(mut self, clean: bool) -> Self { | ||||||
|     self.clean = clean; |     self.clean = clean; | ||||||
|     self |     self | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   #[cfg(feature = "webview-auth")] | ||||||
|   pub fn default_browser(mut self, default_browser: bool) -> Self { |   pub fn default_browser(mut self, default_browser: bool) -> Self { | ||||||
|     self.default_browser = default_browser; |     self.default_browser = default_browser; | ||||||
|     self |     self | ||||||
| @@ -95,6 +106,11 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|     self |     self | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   pub fn verbose(mut self, verbose: Option<&'a str>) -> Self { | ||||||
|  |     self.verbose = verbose; | ||||||
|  |     self | ||||||
|  |   } | ||||||
|  |  | ||||||
|   /// Launch the authenticator binary as the current user or SUDO_USER if available. |   /// Launch the authenticator binary as the current user or SUDO_USER if available. | ||||||
|   pub async fn launch(self) -> anyhow::Result<Credential> { |   pub async fn launch(self) -> anyhow::Result<Credential> { | ||||||
|     let mut auth_cmd = Command::new(GP_AUTH_BINARY); |     let mut auth_cmd = Command::new(GP_AUTH_BINARY); | ||||||
| @@ -120,10 +136,6 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|       auth_cmd.arg("--os-version").arg(os_version); |       auth_cmd.arg("--os-version").arg(os_version); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|     if self.hidpi { |  | ||||||
|       auth_cmd.arg("--hidpi"); |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     if self.fix_openssl { |     if self.fix_openssl { | ||||||
|       auth_cmd.arg("--fix-openssl"); |       auth_cmd.arg("--fix-openssl"); | ||||||
|     } |     } | ||||||
| @@ -132,6 +144,12 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|       auth_cmd.arg("--ignore-tls-errors"); |       auth_cmd.arg("--ignore-tls-errors"); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|  |     #[cfg(feature = "webview-auth")] | ||||||
|  |     { | ||||||
|  |       if self.hidpi { | ||||||
|  |         auth_cmd.arg("--hidpi"); | ||||||
|  |       } | ||||||
|  |  | ||||||
|       if self.clean { |       if self.clean { | ||||||
|         auth_cmd.arg("--clean"); |         auth_cmd.arg("--clean"); | ||||||
|       } |       } | ||||||
| @@ -139,11 +157,16 @@ impl<'a> SamlAuthLauncher<'a> { | |||||||
|       if self.default_browser { |       if self.default_browser { | ||||||
|         auth_cmd.arg("--default-browser"); |         auth_cmd.arg("--default-browser"); | ||||||
|       } |       } | ||||||
|  |     } | ||||||
|  |  | ||||||
|     if let Some(browser) = self.browser { |     if let Some(browser) = self.browser { | ||||||
|       auth_cmd.arg("--browser").arg(browser); |       auth_cmd.arg("--browser").arg(browser); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|  |     if let Some(verbose) = self.verbose { | ||||||
|  |       auth_cmd.arg(verbose); | ||||||
|  |     } | ||||||
|  |  | ||||||
|     let mut non_root_cmd = auth_cmd.into_non_root()?; |     let mut non_root_cmd = auth_cmd.into_non_root()?; | ||||||
|     let output = non_root_cmd |     let output = non_root_cmd | ||||||
|       .kill_on_drop(true) |       .kill_on_drop(true) | ||||||
|   | |||||||
| @@ -1,77 +0,0 @@ | |||||||
| use std::{borrow::Cow, env::temp_dir, fs, io::Write, os::unix::fs::PermissionsExt}; |  | ||||||
|  |  | ||||||
| use anyhow::bail; |  | ||||||
| use log::{info, warn}; |  | ||||||
|  |  | ||||||
| pub struct BrowserAuthenticator<'a> { |  | ||||||
|   auth_request: &'a str, |  | ||||||
|   browser: Option<&'a str>, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| impl BrowserAuthenticator<'_> { |  | ||||||
|   pub fn new(auth_request: &str) -> BrowserAuthenticator { |  | ||||||
|     BrowserAuthenticator { |  | ||||||
|       auth_request, |  | ||||||
|       browser: None, |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn new_with_browser<'a>(auth_request: &'a str, browser: &'a str) -> BrowserAuthenticator<'a> { |  | ||||||
|     let browser = browser.trim(); |  | ||||||
|     BrowserAuthenticator { |  | ||||||
|       auth_request, |  | ||||||
|       browser: if browser.is_empty() || browser == "default" { |  | ||||||
|         None |  | ||||||
|       } else { |  | ||||||
|         Some(browser) |  | ||||||
|       }, |  | ||||||
|     } |  | ||||||
|   } |  | ||||||
|  |  | ||||||
|   pub fn authenticate(&self) -> anyhow::Result<()> { |  | ||||||
|     let path = if self.auth_request.starts_with("http") { |  | ||||||
|       Cow::Borrowed(self.auth_request) |  | ||||||
|     } else { |  | ||||||
|       let html_file = temp_dir().join("gpauth.html"); |  | ||||||
|  |  | ||||||
|       // Remove the file and error if permission denied |  | ||||||
|       if let Err(err) = fs::remove_file(&html_file) { |  | ||||||
|         if err.kind() != std::io::ErrorKind::NotFound { |  | ||||||
|           warn!("Failed to remove the temporary file: {}", err); |  | ||||||
|           bail!("Please remove the file manually: {:?}", html_file); |  | ||||||
|         } |  | ||||||
|       } |  | ||||||
|  |  | ||||||
|       let mut file = fs::File::create(&html_file)?; |  | ||||||
|  |  | ||||||
|       file.set_permissions(fs::Permissions::from_mode(0o600))?; |  | ||||||
|       file.write_all(self.auth_request.as_bytes())?; |  | ||||||
|  |  | ||||||
|       Cow::Owned(html_file.to_string_lossy().to_string()) |  | ||||||
|     }; |  | ||||||
|  |  | ||||||
|     if let Some(browser) = self.browser { |  | ||||||
|       let app = find_browser_path(browser); |  | ||||||
|  |  | ||||||
|       info!("Launching browser: {}", app); |  | ||||||
|       open::with_detached(path.as_ref(), app)?; |  | ||||||
|     } else { |  | ||||||
|       info!("Launching the default browser..."); |  | ||||||
|       webbrowser::open(path.as_ref())?; |  | ||||||
|     } |  | ||||||
|  |  | ||||||
|     Ok(()) |  | ||||||
|   } |  | ||||||
| } |  | ||||||
|  |  | ||||||
| fn find_browser_path(browser: &str) -> String { |  | ||||||
|   if browser == "chrome" { |  | ||||||
|     which::which("google-chrome-stable") |  | ||||||
|       .or_else(|_| which::which("google-chrome")) |  | ||||||
|       .or_else(|_| which::which("chromium")) |  | ||||||
|       .map(|path| path.to_string_lossy().to_string()) |  | ||||||
|       .unwrap_or_else(|_| browser.to_string()) |  | ||||||
|   } else { |  | ||||||
|     browser.into() |  | ||||||
|   } |  | ||||||
| } |  | ||||||
| @@ -1,10 +1,11 @@ | |||||||
| pub(crate) mod command_traits; | pub(crate) mod command_traits; | ||||||
|  |  | ||||||
| pub(crate) mod gui_helper_launcher; | pub(crate) mod gui_helper_launcher; | ||||||
|  |  | ||||||
| pub mod auth_launcher; | pub mod auth_launcher; | ||||||
| #[cfg(feature = "browser-auth")] |  | ||||||
| pub mod browser_authenticator; |  | ||||||
| pub mod gui_launcher; | pub mod gui_launcher; | ||||||
| pub mod hip_launcher; | pub mod hip_launcher; | ||||||
| pub mod service_launcher; | pub mod service_launcher; | ||||||
|  |  | ||||||
|  | #[cfg(unix)] | ||||||
| pub mod users; | pub mod users; | ||||||
|   | |||||||
| @@ -10,26 +10,28 @@ use crate::GP_SERVICE_BINARY; | |||||||
|  |  | ||||||
| use super::command_traits::CommandExt; | use super::command_traits::CommandExt; | ||||||
|  |  | ||||||
| pub struct ServiceLauncher { | pub struct ServiceLauncher<'a> { | ||||||
|   program: PathBuf, |   program: PathBuf, | ||||||
|   minimized: bool, |   minimized: bool, | ||||||
|   env_file: Option<String>, |   env_file: Option<String>, | ||||||
|   log_file: Option<String>, |   log_file: Option<String>, | ||||||
|  |   verbose: Option<&'a str> | ||||||
| } | } | ||||||
|  |  | ||||||
| impl Default for ServiceLauncher { | impl Default for ServiceLauncher<'_> { | ||||||
|   fn default() -> Self { |   fn default() -> Self { | ||||||
|     Self::new() |     Self::new() | ||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
| impl ServiceLauncher { | impl<'a> ServiceLauncher<'a> { | ||||||
|   pub fn new() -> Self { |   pub fn new() -> Self { | ||||||
|     Self { |     Self { | ||||||
|       program: GP_SERVICE_BINARY.into(), |       program: GP_SERVICE_BINARY.into(), | ||||||
|       minimized: false, |       minimized: false, | ||||||
|       env_file: None, |       env_file: None, | ||||||
|       log_file: None, |       log_file: None, | ||||||
|  |       verbose: None | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
|  |  | ||||||
| @@ -48,6 +50,11 @@ impl ServiceLauncher { | |||||||
|     self |     self | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   pub fn verbose(mut self, verbose: Option<&'a str>) -> Self { | ||||||
|  |     self.verbose = verbose; | ||||||
|  |     self | ||||||
|  |   } | ||||||
|  |  | ||||||
|   pub async fn launch(&self) -> anyhow::Result<ExitStatus> { |   pub async fn launch(&self) -> anyhow::Result<ExitStatus> { | ||||||
|     let mut cmd = Command::new_pkexec(&self.program); |     let mut cmd = Command::new_pkexec(&self.program); | ||||||
|  |  | ||||||
| @@ -59,6 +66,10 @@ impl ServiceLauncher { | |||||||
|       cmd.arg("--env-file").arg(env_file); |       cmd.arg("--env-file").arg(env_file); | ||||||
|     } |     } | ||||||
|  |  | ||||||
|  |     if let Some(verbose) = self.verbose { | ||||||
|  |       cmd.arg(verbose); | ||||||
|  |     } | ||||||
|  |  | ||||||
|     if let Some(log_file) = &self.log_file { |     if let Some(log_file) = &self.log_file { | ||||||
|       let log_file = File::create(log_file)?; |       let log_file = File::create(log_file)?; | ||||||
|       let stdio = Stdio::from(log_file); |       let stdio = Stdio::from(log_file); | ||||||
|   | |||||||
| @@ -7,6 +7,5 @@ use super::vpn_state::VpnState; | |||||||
| pub enum WsEvent { | pub enum WsEvent { | ||||||
|   VpnState(VpnState), |   VpnState(VpnState), | ||||||
|   ActiveGui, |   ActiveGui, | ||||||
|   /// External authentication data |   ResumeConnection, | ||||||
|   AuthData(String), |  | ||||||
| } | } | ||||||
|   | |||||||
| @@ -206,11 +206,15 @@ impl ConnectRequest { | |||||||
| #[derive(Debug, Deserialize, Serialize, Type)] | #[derive(Debug, Deserialize, Serialize, Type)] | ||||||
| pub struct DisconnectRequest; | pub struct DisconnectRequest; | ||||||
|  |  | ||||||
|  | #[derive(Debug, Deserialize, Serialize)] | ||||||
|  | pub struct UpdateLogLevelRequest(pub String); | ||||||
|  |  | ||||||
| /// Requests that can be sent to the service | /// Requests that can be sent to the service | ||||||
| #[derive(Debug, Deserialize, Serialize)] | #[derive(Debug, Deserialize, Serialize)] | ||||||
| pub enum WsRequest { | pub enum WsRequest { | ||||||
|   Connect(Box<ConnectRequest>), |   Connect(Box<ConnectRequest>), | ||||||
|   Disconnect(DisconnectRequest), |   Disconnect(DisconnectRequest), | ||||||
|  |   UpdateLogLevel(UpdateLogLevelRequest), | ||||||
| } | } | ||||||
|  |  | ||||||
| #[derive(Debug, Deserialize, Serialize)] | #[derive(Debug, Deserialize, Serialize)] | ||||||
|   | |||||||
| @@ -1,10 +1,9 @@ | |||||||
| use tokio::fs; | use super::lock_file::gpservice_lock_info; | ||||||
|  |  | ||||||
| use crate::GP_SERVICE_LOCK_FILE; |  | ||||||
|  |  | ||||||
| async fn read_port() -> anyhow::Result<String> { | async fn read_port() -> anyhow::Result<String> { | ||||||
|   let port = fs::read_to_string(GP_SERVICE_LOCK_FILE).await?; |   let lock_info = gpservice_lock_info().await?; | ||||||
|   Ok(port.trim().to_string()) |  | ||||||
|  |   Ok(lock_info.port.to_string()) | ||||||
| } | } | ||||||
|  |  | ||||||
| pub async fn http_endpoint() -> anyhow::Result<String> { | pub async fn http_endpoint() -> anyhow::Result<String> { | ||||||
|   | |||||||
| @@ -3,6 +3,7 @@ use std::env; | |||||||
| use std::io::Write; | use std::io::Write; | ||||||
| use std::path::Path; | use std::path::Path; | ||||||
| 
 | 
 | ||||||
|  | use log::info; | ||||||
| use tempfile::NamedTempFile; | use tempfile::NamedTempFile; | ||||||
| 
 | 
 | ||||||
| pub fn persist_env_vars(extra: Option<HashMap<String, String>>) -> anyhow::Result<NamedTempFile> { | pub fn persist_env_vars(extra: Option<HashMap<String, String>>) -> anyhow::Result<NamedTempFile> { | ||||||
| @@ -35,3 +36,20 @@ pub fn load_env_vars<T: AsRef<Path>>(env_file: T) -> anyhow::Result<HashMap<Stri | |||||||
| 
 | 
 | ||||||
|   Ok(env_vars) |   Ok(env_vars) | ||||||
| } | } | ||||||
|  | 
 | ||||||
|  | pub fn patch_gui_runtime_env(hidpi: bool) { | ||||||
|  |   // This is to avoid blank screen on some systems
 | ||||||
|  |   std::env::set_var("WEBKIT_DISABLE_COMPOSITING_MODE", "1"); | ||||||
|  | 
 | ||||||
|  |   // Workaround for https://github.com/tauri-apps/tao/issues/929
 | ||||||
|  |   let is_wayland = std::env::var("XDG_SESSION_TYPE").unwrap_or_default() == "wayland"; | ||||||
|  |   if is_wayland { | ||||||
|  |     env::set_var("GDK_BACKEND", "x11"); | ||||||
|  |   } | ||||||
|  | 
 | ||||||
|  |   if hidpi { | ||||||
|  |     info!("Setting GDK_SCALE=2 and GDK_DPI_SCALE=0.5"); | ||||||
|  |     std::env::set_var("GDK_SCALE", "2"); | ||||||
|  |     std::env::set_var("GDK_DPI_SCALE", "0.5"); | ||||||
|  |   } | ||||||
|  | } | ||||||
| @@ -1,19 +1,24 @@ | |||||||
| use std::path::PathBuf; | use std::path::PathBuf; | ||||||
|  |  | ||||||
|  | use thiserror::Error; | ||||||
|  | use tokio::fs; | ||||||
|  |  | ||||||
| pub struct LockFile { | pub struct LockFile { | ||||||
|   path: PathBuf, |   path: PathBuf, | ||||||
|  |   pid: u32, | ||||||
| } | } | ||||||
|  |  | ||||||
| impl LockFile { | impl LockFile { | ||||||
|   pub fn new<P: Into<PathBuf>>(path: P) -> Self { |   pub fn new<P: Into<PathBuf>>(path: P, pid: u32) -> Self { | ||||||
|     Self { path: path.into() } |     Self { path: path.into(), pid } | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub fn exists(&self) -> bool { |   pub fn exists(&self) -> bool { | ||||||
|     self.path.exists() |     self.path.exists() | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   pub fn lock(&self, content: impl AsRef<[u8]>) -> anyhow::Result<()> { |   pub fn lock(&self, content: &str) -> anyhow::Result<()> { | ||||||
|  |     let content = format!("{}:{}", self.pid, content); | ||||||
|     std::fs::write(&self.path, content)?; |     std::fs::write(&self.path, content)?; | ||||||
|     Ok(()) |     Ok(()) | ||||||
|   } |   } | ||||||
| @@ -37,3 +42,87 @@ impl LockFile { | |||||||
|     } |     } | ||||||
|   } |   } | ||||||
| } | } | ||||||
|  |  | ||||||
|  | #[derive(Error, Debug)] | ||||||
|  | pub enum LockFileError { | ||||||
|  |   #[error("Failed to read lock file: {0}")] | ||||||
|  |   IoError(#[from] std::io::Error), | ||||||
|  |  | ||||||
|  |   #[error("Invalid lock file format: expected 'pid:port'")] | ||||||
|  |   InvalidFormat, | ||||||
|  |  | ||||||
|  |   #[error("Invalid PID value: {0}")] | ||||||
|  |   InvalidPid(std::num::ParseIntError), | ||||||
|  |  | ||||||
|  |   #[error("Invalid port value: {0}")] | ||||||
|  |   InvalidPort(std::num::ParseIntError), | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub struct LockInfo { | ||||||
|  |   pub pid: u32, | ||||||
|  |   pub port: u32, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | impl LockInfo { | ||||||
|  |   async fn from_file(path: impl AsRef<std::path::Path>) -> Result<Self, LockFileError> { | ||||||
|  |     let content = fs::read_to_string(path).await?; | ||||||
|  |     Self::parse(&content) | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   fn parse(content: &str) -> Result<Self, LockFileError> { | ||||||
|  |     let mut parts = content.trim().split(':'); | ||||||
|  |  | ||||||
|  |     let pid = parts | ||||||
|  |       .next() | ||||||
|  |       .ok_or(LockFileError::InvalidFormat)? | ||||||
|  |       .parse() | ||||||
|  |       .map_err(LockFileError::InvalidPid)?; | ||||||
|  |  | ||||||
|  |     let port = parts | ||||||
|  |       .next() | ||||||
|  |       .ok_or(LockFileError::InvalidFormat)? | ||||||
|  |       .parse() | ||||||
|  |       .map_err(LockFileError::InvalidPort)?; | ||||||
|  |  | ||||||
|  |     // Ensure there are no extra parts after pid:port | ||||||
|  |     if parts.next().is_some() { | ||||||
|  |       return Err(LockFileError::InvalidFormat); | ||||||
|  |     } | ||||||
|  |  | ||||||
|  |     Ok(Self { pid, port }) | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | pub async fn gpservice_lock_info() -> Result<LockInfo, LockFileError> { | ||||||
|  |   LockInfo::from_file(crate::GP_SERVICE_LOCK_FILE).await | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[cfg(test)] | ||||||
|  | mod tests { | ||||||
|  |   use super::*; | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_parse_valid_input() { | ||||||
|  |     let info = LockInfo::parse("1234:8080").unwrap(); | ||||||
|  |     assert_eq!(info.pid, 1234); | ||||||
|  |     assert_eq!(info.port, 8080); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_parse_invalid_format() { | ||||||
|  |     assert!(matches!( | ||||||
|  |       LockInfo::parse("123:456:789"), | ||||||
|  |       Err(LockFileError::InvalidFormat) | ||||||
|  |     )); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_parse_invalid_numbers() { | ||||||
|  |     assert!(matches!(LockInfo::parse("abc:8080"), Err(LockFileError::InvalidPid(_)))); | ||||||
|  |  | ||||||
|  |     assert!(matches!( | ||||||
|  |       LockInfo::parse("1234:abc"), | ||||||
|  |       Err(LockFileError::InvalidPort(_)) | ||||||
|  |     )); | ||||||
|  |   } | ||||||
|  | } | ||||||
|   | |||||||
| @@ -4,12 +4,12 @@ pub mod base64; | |||||||
| pub mod checksum; | pub mod checksum; | ||||||
| pub mod crypto; | pub mod crypto; | ||||||
| pub mod endpoint; | pub mod endpoint; | ||||||
| pub mod env_file; | pub mod env_utils; | ||||||
| pub mod lock_file; | pub mod lock_file; | ||||||
| pub mod openssl; | pub mod openssl; | ||||||
| pub mod redact; | pub mod redact; | ||||||
| pub mod request; | pub mod request; | ||||||
| #[cfg(feature = "tauri")] | #[cfg(all(feature = "tauri", not(any(target_os = "macos", target_os = "windows"))))] | ||||||
| pub mod window; | pub mod window; | ||||||
|  |  | ||||||
| mod shutdown_signal; | mod shutdown_signal; | ||||||
|   | |||||||
| @@ -1,9 +1,12 @@ | |||||||
| use std::path::Path; | use std::path::Path; | ||||||
|  |  | ||||||
|  | use log::{info, warn}; | ||||||
|  | use regex::Regex; | ||||||
| use tempfile::NamedTempFile; | use tempfile::NamedTempFile; | ||||||
|  | use version_compare::{compare_to, Cmp}; | ||||||
|  |  | ||||||
| pub fn openssl_conf() -> String { | pub fn openssl_conf() -> String { | ||||||
|   let option = "UnsafeLegacyServerConnect"; |   let option = get_openssl_option(); | ||||||
|  |  | ||||||
|   format!( |   format!( | ||||||
|     "openssl_conf = openssl_init |     "openssl_conf = openssl_init | ||||||
| @@ -47,3 +50,58 @@ pub fn fix_openssl_env() -> anyhow::Result<NamedTempFile> { | |||||||
|  |  | ||||||
|   Ok(openssl_conf) |   Ok(openssl_conf) | ||||||
| } | } | ||||||
|  |  | ||||||
|  | // See: https://stackoverflow.com/questions/75763525/curl-35-error0a000152ssl-routinesunsafe-legacy-renegotiation-disabled | ||||||
|  | fn get_openssl_option() -> &'static str { | ||||||
|  |   let version_str = openssl::version::version(); | ||||||
|  |   let default_option = "UnsafeLegacyServerConnect"; | ||||||
|  |  | ||||||
|  |   let Some(version) = extract_openssl_version(version_str) else { | ||||||
|  |     warn!("Failed to extract OpenSSL version from '{}'", version_str); | ||||||
|  |     return default_option; | ||||||
|  |   }; | ||||||
|  |  | ||||||
|  |   let older_than_3_0_4 = match compare_to(version, "3.0.4", Cmp::Lt) { | ||||||
|  |     Ok(result) => result, | ||||||
|  |     Err(_) => { | ||||||
|  |       warn!("Failed to compare OpenSSL version: {}", version); | ||||||
|  |       return default_option; | ||||||
|  |     } | ||||||
|  |   }; | ||||||
|  |  | ||||||
|  |   if older_than_3_0_4 { | ||||||
|  |     info!("Using 'UnsafeLegacyRenegotiation' option"); | ||||||
|  |     "UnsafeLegacyRenegotiation" | ||||||
|  |   } else { | ||||||
|  |     info!("Using 'UnsafeLegacyServerConnect' option"); | ||||||
|  |     default_option | ||||||
|  |   } | ||||||
|  | } | ||||||
|  |  | ||||||
|  | fn extract_openssl_version(version: &str) -> Option<&str> { | ||||||
|  |   let re = Regex::new(r"OpenSSL (\d+\.\d+\.\d+[^\s]*)").unwrap(); | ||||||
|  |   re.captures(version).and_then(|caps| caps.get(1)).map(|m| m.as_str()) | ||||||
|  | } | ||||||
|  |  | ||||||
|  | #[cfg(test)] | ||||||
|  | mod tests { | ||||||
|  |   use super::*; | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_extract_version() { | ||||||
|  |     let input = "OpenSSL 3.4.0 22 Oct 2024 (Library: OpenSSL 3.4.0 22 Oct 2024)"; | ||||||
|  |     assert_eq!(extract_openssl_version(input), Some("3.4.0")); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_different_format() { | ||||||
|  |     let input = "OpenSSL 1.1.1t  7 Feb 2023"; | ||||||
|  |     assert_eq!(extract_openssl_version(input), Some("1.1.1t")); | ||||||
|  |   } | ||||||
|  |  | ||||||
|  |   #[test] | ||||||
|  |   fn test_invalid_input() { | ||||||
|  |     let input = "Invalid string without version"; | ||||||
|  |     assert_eq!(extract_openssl_version(input), None); | ||||||
|  |   } | ||||||
|  | } | ||||||
|   | |||||||
| @@ -6,15 +6,21 @@ pub async fn shutdown_signal() { | |||||||
|   }; |   }; | ||||||
|  |  | ||||||
|   #[cfg(unix)] |   #[cfg(unix)] | ||||||
|  |   { | ||||||
|     let terminate = async { |     let terminate = async { | ||||||
|       signal::unix::signal(signal::unix::SignalKind::terminate()) |       signal::unix::signal(signal::unix::SignalKind::terminate()) | ||||||
|         .expect("failed to install signal handler") |         .expect("failed to install signal handler") | ||||||
|         .recv() |         .recv() | ||||||
|         .await; |         .await; | ||||||
|     }; |     }; | ||||||
|  |  | ||||||
|     tokio::select! { |     tokio::select! { | ||||||
|         _ = ctrl_c => {}, |         _ = ctrl_c => {}, | ||||||
|         _ = terminate => {}, |         _ = terminate => {}, | ||||||
|     } |     } | ||||||
|   } |   } | ||||||
|  |  | ||||||
|  |   #[cfg(not(unix))] | ||||||
|  |   { | ||||||
|  |     ctrl_c.await; | ||||||
|  |   } | ||||||
|  | } | ||||||
|   | |||||||
| @@ -2,25 +2,20 @@ use std::{process::ExitStatus, time::Duration}; | |||||||
|  |  | ||||||
| use anyhow::bail; | use anyhow::bail; | ||||||
| use log::info; | use log::info; | ||||||
| use tauri::Window; | use tauri::WebviewWindow; | ||||||
| use tokio::process::Command; | use tokio::process::Command; | ||||||
|  |  | ||||||
| pub trait WindowExt { | pub trait WindowExt { | ||||||
|   fn raise(&self) -> anyhow::Result<()>; |   fn raise(&self) -> anyhow::Result<()>; | ||||||
|   fn hide_menu(&self); |  | ||||||
| } | } | ||||||
|  |  | ||||||
| impl WindowExt for Window { | impl WindowExt for WebviewWindow { | ||||||
|   fn raise(&self) -> anyhow::Result<()> { |   fn raise(&self) -> anyhow::Result<()> { | ||||||
|     raise_window(self) |     raise_window(self) | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   fn hide_menu(&self) { |  | ||||||
|     hide_menu(self); |  | ||||||
|   } |  | ||||||
| } | } | ||||||
|  |  | ||||||
| pub fn raise_window(win: &Window) -> anyhow::Result<()> { | pub fn raise_window(win: &WebviewWindow) -> anyhow::Result<()> { | ||||||
|   let is_wayland = std::env::var("XDG_SESSION_TYPE").unwrap_or_default() == "wayland"; |   let is_wayland = std::env::var("XDG_SESSION_TYPE").unwrap_or_default() == "wayland"; | ||||||
|  |  | ||||||
|   if is_wayland { |   if is_wayland { | ||||||
| @@ -40,7 +35,7 @@ pub fn raise_window(win: &Window) -> anyhow::Result<()> { | |||||||
|  |  | ||||||
|   // Calling window.show() on Windows will cause the menu to be shown. |   // Calling window.show() on Windows will cause the menu to be shown. | ||||||
|   // We need to hide it again. |   // We need to hide it again. | ||||||
|   hide_menu(win); |   win.hide_menu()?; | ||||||
|  |  | ||||||
|   Ok(()) |   Ok(()) | ||||||
| } | } | ||||||
| @@ -76,22 +71,3 @@ async fn wmctrl_try_raise_window(title: &str) -> anyhow::Result<ExitStatus> { | |||||||
|  |  | ||||||
|   Ok(exit_status) |   Ok(exit_status) | ||||||
| } | } | ||||||
|  |  | ||||||
| fn hide_menu(win: &Window) { |  | ||||||
|   let menu_handle = win.menu_handle(); |  | ||||||
|  |  | ||||||
|   tokio::spawn(async move { |  | ||||||
|     loop { |  | ||||||
|       let menu_visible = menu_handle.is_visible().unwrap_or(false); |  | ||||||
|  |  | ||||||
|       if !menu_visible { |  | ||||||
|         break; |  | ||||||
|       } |  | ||||||
|  |  | ||||||
|       if menu_visible { |  | ||||||
|         let _ = menu_handle.hide(); |  | ||||||
|         tokio::time::sleep(Duration::from_millis(10)).await; |  | ||||||
|       } |  | ||||||
|     } |  | ||||||
|   }); |  | ||||||
| } |  | ||||||
|   | |||||||
| @@ -1,9 +1,14 @@ | |||||||
| fn main() { | fn main() { | ||||||
|   // Link to the native openconnect library |   // Link to the native openconnect library | ||||||
|   println!("cargo:rustc-link-lib=openconnect"); |   println!("cargo:rustc-link-lib=openconnect"); | ||||||
|  |   println!("cargo:rustc-link-search=/opt/homebrew/lib"); // Homebrew path | ||||||
|   println!("cargo:rerun-if-changed=src/ffi/vpn.c"); |   println!("cargo:rerun-if-changed=src/ffi/vpn.c"); | ||||||
|   println!("cargo:rerun-if-changed=src/ffi/vpn.h"); |   println!("cargo:rerun-if-changed=src/ffi/vpn.h"); | ||||||
|  |  | ||||||
|   // Compile the vpn.c file |   // Compile the vpn.c file | ||||||
|   cc::Build::new().file("src/ffi/vpn.c").include("src/ffi").compile("vpn"); |   cc::Build::new() | ||||||
|  |     .file("src/ffi/vpn.c") | ||||||
|  |     .include("src/ffi") | ||||||
|  |     .include("/opt/homebrew/include") // Homebrew path | ||||||
|  |     .compile("vpn"); | ||||||
| } | } | ||||||
|   | |||||||
| @@ -10,6 +10,10 @@ install: | |||||||
| 		install -Dm755 artifacts/usr/bin/gpgui $(DESTDIR)/usr/bin/gpgui; \ | 		install -Dm755 artifacts/usr/bin/gpgui $(DESTDIR)/usr/bin/gpgui; \ | ||||||
| 	fi | 	fi | ||||||
|  |  | ||||||
|  | 	# Install the disconnect hooks | ||||||
|  | 	install -Dm755 artifacts/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down | ||||||
|  | 	install -Dm755 artifacts/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook | ||||||
|  |  | ||||||
| 	install -Dm644 artifacts/usr/share/applications/gpgui.desktop $(DESTDIR)/usr/share/applications/gpgui.desktop | 	install -Dm644 artifacts/usr/share/applications/gpgui.desktop $(DESTDIR)/usr/share/applications/gpgui.desktop | ||||||
| 	install -Dm644 artifacts/usr/share/icons/hicolor/scalable/apps/gpgui.svg $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | 	install -Dm644 artifacts/usr/share/icons/hicolor/scalable/apps/gpgui.svg $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | ||||||
| 	install -Dm644 artifacts/usr/share/icons/hicolor/32x32/apps/gpgui.png $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | 	install -Dm644 artifacts/usr/share/icons/hicolor/32x32/apps/gpgui.png $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | ||||||
| @@ -26,6 +30,9 @@ uninstall: | |||||||
| 	rm -f $(DESTDIR)/usr/bin/gpgui-helper | 	rm -f $(DESTDIR)/usr/bin/gpgui-helper | ||||||
| 	rm -f $(DESTDIR)/usr/bin/gpgui | 	rm -f $(DESTDIR)/usr/bin/gpgui | ||||||
|  |  | ||||||
|  | 	rm -f $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down | ||||||
|  | 	rm -f $(DESTDIR)/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook | ||||||
|  |  | ||||||
| 	rm -f $(DESTDIR)/usr/share/applications/gpgui.desktop | 	rm -f $(DESTDIR)/usr/share/applications/gpgui.desktop | ||||||
| 	rm -f $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | 	rm -f $(DESTDIR)/usr/share/icons/hicolor/scalable/apps/gpgui.svg | ||||||
| 	rm -f $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | 	rm -f $(DESTDIR)/usr/share/icons/hicolor/32x32/apps/gpgui.png | ||||||
|   | |||||||
							
								
								
									
										1
									
								
								packaging/deb/compat
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								packaging/deb/compat
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | |||||||
|  | 10 | ||||||
| @@ -7,17 +7,24 @@ Build-Depends: debhelper (>= 9), | |||||||
|   pkg-config, |   pkg-config, | ||||||
|   jq (>= 1), |   jq (>= 1), | ||||||
|   make (>= 4), |   make (>= 4), | ||||||
|  |   libssl-dev, | ||||||
|   libxml2, |   libxml2, | ||||||
|   libsecret-1-0, |   libsecret-1-0, | ||||||
|   libayatana-appindicator3-1, |   libayatana-appindicator3-1, | ||||||
|   gnome-keyring, |   gnome-keyring, | ||||||
|   libwebkit2gtk-4.0-dev, |   libwebkit2gtk-4.1-dev, | ||||||
|   libopenconnect-dev (>= 8.20),@RUST@ |   libopenconnect-dev (>= 8.20),@RUST@ | ||||||
| Homepage: https://github.com/yuezk/GlobalProtect-openconnect | Homepage: https://github.com/yuezk/GlobalProtect-openconnect | ||||||
|  |  | ||||||
| Package: globalprotect-openconnect | Package: globalprotect-openconnect | ||||||
| Architecture: any | Architecture: any | ||||||
| Multi-Arch: foreign | Multi-Arch: foreign | ||||||
| Depends: ${misc:Depends}, ${shlibs:Depends}, openconnect (>=8.20), libxml2, libsecret-1-0, libayatana-appindicator3-1, gnome-keyring | Depends: ${misc:Depends}, | ||||||
|  |   ${shlibs:Depends}, | ||||||
|  |   openconnect (>=8.20), | ||||||
|  |   libxml2, | ||||||
|  |   libsecret-1-0, | ||||||
|  |   libayatana-appindicator3-1, | ||||||
|  |   gnome-keyring, | ||||||
| Description: A GUI for GlobalProtect VPN | Description: A GUI for GlobalProtect VPN | ||||||
|  A GUI for GlobalProtect VPN, based on OpenConnect, supports the SSO authentication method. |  A GUI for GlobalProtect VPN, based on OpenConnect, supports the SSO authentication method. | ||||||
|   | |||||||
| @@ -2,6 +2,11 @@ | |||||||
|  |  | ||||||
| export OFFLINE = @OFFLINE@ | export OFFLINE = @OFFLINE@ | ||||||
| export BUILD_FE = 0 | export BUILD_FE = 0 | ||||||
|  | export BUILD_GUI = @BUILD_GUI@ | ||||||
|  |  | ||||||
|  | export PATH := /usr/lib/rust-@RUST_VERSION@/bin:$(PATH) | ||||||
|  |  | ||||||
| %: | %: | ||||||
|  | 	which cargo | ||||||
|  | 	which rustc | ||||||
| 	dh $@ --no-parallel | 	dh $@ --no-parallel | ||||||
|   | |||||||
							
								
								
									
										26
									
								
								packaging/files/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										26
									
								
								packaging/files/usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook
									
									
									
									
									
										Executable file
									
								
							| @@ -0,0 +1,26 @@ | |||||||
|  | #!/bin/sh | ||||||
|  |  | ||||||
|  | # Resume the VPN connection if the network comes back up | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | PIDFILE=/tmp/gpservice_disconnected.pid | ||||||
|  |  | ||||||
|  | resume_vpn() { | ||||||
|  |   if [ -f $PIDFILE ]; then | ||||||
|  |     PID=$(cat $PIDFILE) | ||||||
|  |  | ||||||
|  |     # Always remove the PID file | ||||||
|  |     rm $PIDFILE | ||||||
|  |  | ||||||
|  |     # Ensure the PID is a gpservice process | ||||||
|  |     if ps -p $PID -o comm= | grep -q gpservice; then | ||||||
|  |       # Send a USR2 signal to the gpclient process to resume the VPN connection | ||||||
|  |       kill -USR2 $PID | ||||||
|  |     fi | ||||||
|  |   fi | ||||||
|  | } | ||||||
|  |  | ||||||
|  | if [ "$2" = "up" ]; then | ||||||
|  |   resume_vpn | ||||||
|  | fi | ||||||
| @@ -0,0 +1,6 @@ | |||||||
|  | #!/bin/sh | ||||||
|  |  | ||||||
|  | set -e | ||||||
|  |  | ||||||
|  | # Disconnect the VPN connection before the network goes down | ||||||
|  | /usr/bin/gpclient disconnect --wait 3 | ||||||
| @@ -8,8 +8,8 @@ pkgdesc="A GUI for GlobalProtect VPN, based on OpenConnect, supports the SSO aut | |||||||
| arch=('x86_64' 'aarch64') | arch=('x86_64' 'aarch64') | ||||||
| url="https://github.com/yuezk/GlobalProtect-openconnect" | url="https://github.com/yuezk/GlobalProtect-openconnect" | ||||||
| license=('GPL3') | license=('GPL3') | ||||||
| makedepends=('make' 'pkg-config' 'rust' 'cargo' 'jq' 'webkit2gtk' 'curl' 'wget' 'file' 'openssl' 'appmenu-gtk-module' 'gtk3' 'libappindicator-gtk3' 'librsvg' 'libvips' 'libayatana-appindicator' 'openconnect' 'libsecret') | makedepends=('make' 'pkg-config' 'rust' 'cargo' 'jq' 'webkit2gtk-4.1' 'curl' 'wget' 'file' 'openssl' 'appmenu-gtk-module' 'libappindicator-gtk3' 'librsvg' 'openconnect' 'libsecret') | ||||||
| depends=('openconnect>=8.20' webkit2gtk libappindicator-gtk3 libayatana-appindicator libsecret libxml2) | depends=('openconnect>=8.20' webkit2gtk-4.1 libappindicator-gtk3 libsecret libxml2) | ||||||
| optdepends=('wmctrl: for window management') | optdepends=('wmctrl: for window management') | ||||||
|  |  | ||||||
| provides=('globalprotect-openconnect' 'gpclient' 'gpservice' 'gpauth' 'gpgui') | provides=('globalprotect-openconnect' 'gpclient' 'gpservice' 'gpauth' 'gpgui') | ||||||
|   | |||||||
| @@ -6,7 +6,7 @@ Group:          Productivity/Networking/PPP | |||||||
|  |  | ||||||
| License:        GPL-3.0 | License:        GPL-3.0 | ||||||
| URL:            https://github.com/yuezk/GlobalProtect-openconnect | URL:            https://github.com/yuezk/GlobalProtect-openconnect | ||||||
| Source:         %{name}.tar.gz | Source:         @SOURCE@ | ||||||
|  |  | ||||||
| BuildRequires:  make | BuildRequires:  make | ||||||
| BuildRequires:  rust | BuildRequires:  rust | ||||||
| @@ -14,16 +14,21 @@ BuildRequires:  cargo | |||||||
| BuildRequires:  jq | BuildRequires:  jq | ||||||
| BuildRequires:  pkg-config | BuildRequires:  pkg-config | ||||||
| BuildRequires:  openconnect-devel | BuildRequires:  openconnect-devel | ||||||
| BuildRequires:  openssl-devel | BuildRequires:  (openssl-devel or libopenssl-devel) | ||||||
| BuildRequires:  wget | BuildRequires:  wget | ||||||
| BuildRequires:  file | BuildRequires:  file | ||||||
| BuildRequires:  perl | BuildRequires:  perl | ||||||
|  |  | ||||||
| BuildRequires:  (webkit2gtk4.0-devel or webkit2gtk3-soup2-devel) | %if 0%{?suse_version} | ||||||
|  | BuildRequires:  webkit2gtk3-devel | ||||||
|  | %else | ||||||
|  | BuildRequires:  webkit2gtk4.1-devel | ||||||
|  | %endif | ||||||
|  |  | ||||||
| BuildRequires:  (libappindicator-gtk3-devel or libappindicator3-1) | BuildRequires:  (libappindicator-gtk3-devel or libappindicator3-1) | ||||||
| BuildRequires:  (librsvg2-devel or librsvg-devel) | BuildRequires:  (librsvg2-devel or librsvg-devel) | ||||||
|  |  | ||||||
| Requires:       openconnect >= 8.20, (libayatana-appindicator or libappindicator-gtk3) | Requires:       openconnect >= 8.20, (libappindicator-gtk3 or libayatana-appindicator) | ||||||
| Conflicts:      globalprotect-openconnect-snapshot | Conflicts:      globalprotect-openconnect-snapshot | ||||||
|  |  | ||||||
| %global debug_package %{nil} | %global debug_package %{nil} | ||||||
| @@ -55,6 +60,13 @@ make build OFFLINE=@OFFLINE@ BUILD_FE=0 | |||||||
| %{_datadir}/icons/hicolor/scalable/apps/gpgui.svg | %{_datadir}/icons/hicolor/scalable/apps/gpgui.svg | ||||||
| %{_datadir}/polkit-1/actions/com.yuezk.gpgui.policy | %{_datadir}/polkit-1/actions/com.yuezk.gpgui.policy | ||||||
|  |  | ||||||
|  | %dir /usr/lib/NetworkManager | ||||||
|  | %dir /usr/lib/NetworkManager/dispatcher.d | ||||||
|  | %dir /usr/lib/NetworkManager/dispatcher.d/pre-down.d | ||||||
|  |  | ||||||
|  | /usr/lib/NetworkManager/dispatcher.d/pre-down.d/gpclient.down | ||||||
|  | /usr/lib/NetworkManager/dispatcher.d/gpclient-nm-hook | ||||||
|  |  | ||||||
| %dir %{_datadir}/icons/hicolor | %dir %{_datadir}/icons/hicolor | ||||||
| %dir %{_datadir}/icons/hicolor/32x32 | %dir %{_datadir}/icons/hicolor/32x32 | ||||||
| %dir %{_datadir}/icons/hicolor/32x32/apps | %dir %{_datadir}/icons/hicolor/32x32/apps | ||||||
|   | |||||||
							
								
								
									
										2
									
								
								rust-toolchain.toml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								rust-toolchain.toml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,2 @@ | |||||||
|  | [toolchain] | ||||||
|  | channel = "1.80.1" | ||||||
| @@ -28,7 +28,7 @@ release_snapshot() { | |||||||
|  |  | ||||||
|   echo "Uploading new assets..." |   echo "Uploading new assets..." | ||||||
|   gh -R "$REPO" release upload "$TAG" \ |   gh -R "$REPO" release upload "$TAG" \ | ||||||
|     "$PROJECT_DIR"/.build/artifacts/artifact-source/* \ |     "$PROJECT_DIR"/.build/artifacts/artifact-source*/* \ | ||||||
|     "$PROJECT_DIR"/.build/artifacts/artifact-gpgui-*/* |     "$PROJECT_DIR"/.build/artifacts/artifact-gpgui-*/* | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -40,7 +40,7 @@ release_tag() { | |||||||
|   gh -R "$REPO" release create $TAG \ |   gh -R "$REPO" release create $TAG \ | ||||||
|     --title "$TAG" \ |     --title "$TAG" \ | ||||||
|     --notes "$RELEASE_NOTES" \ |     --notes "$RELEASE_NOTES" \ | ||||||
|     "$PROJECT_DIR"/.build/artifacts/artifact-source/* \ |     "$PROJECT_DIR"/.build/artifacts/artifact-source*/* \ | ||||||
|     "$PROJECT_DIR"/.build/artifacts/artifact-gpgui-*/* |     "$PROJECT_DIR"/.build/artifacts/artifact-gpgui-*/* | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user