|
|
|
|
|
|
|
|
use std::collections::HashMap; |
|
|
|
|
|
use anyhow::Result; |
|
|
use percent_encoding::{utf8_percent_encode, NON_ALPHANUMERIC}; |
|
|
use serde::Deserialize; |
|
|
|
|
|
use crate::config::Config; |
|
|
use crate::context::Context; |
|
|
use crate::provider; |
|
|
use crate::provider::Oauth2Authorizer; |
|
|
use crate::socks::Socks5Config; |
|
|
use crate::tools::time; |
|
|
|
|
|
const OAUTH2_GMAIL: Oauth2 = Oauth2 { |
|
|
|
|
|
client_id: "959970109878-4mvtgf6feshskf7695nfln6002mom908.apps.googleusercontent.com", |
|
|
get_code: "https://accounts.google.com/o/oauth2/auth?client_id=$CLIENT_ID&redirect_uri=$REDIRECT_URI&response_type=code&scope=https%3A%2F%2Fmail.google.com%2F%20email&access_type=offline", |
|
|
init_token: "https://accounts.google.com/o/oauth2/token?client_id=$CLIENT_ID&redirect_uri=$REDIRECT_URI&code=$CODE&grant_type=authorization_code", |
|
|
refresh_token: "https://accounts.google.com/o/oauth2/token?client_id=$CLIENT_ID&redirect_uri=$REDIRECT_URI&refresh_token=$REFRESH_TOKEN&grant_type=refresh_token", |
|
|
get_userinfo: Some("https://www.googleapis.com/oauth2/v1/userinfo?alt=json&access_token=$ACCESS_TOKEN"), |
|
|
}; |
|
|
|
|
|
const OAUTH2_YANDEX: Oauth2 = Oauth2 { |
|
|
|
|
|
client_id: "c4d0b6735fc8420a816d7e1303469341", |
|
|
get_code: "https://oauth.yandex.com/authorize?client_id=$CLIENT_ID&response_type=code&scope=mail%3Aimap_full%20mail%3Asmtp&force_confirm=true", |
|
|
init_token: "https://oauth.yandex.com/token?grant_type=authorization_code&code=$CODE&client_id=$CLIENT_ID&client_secret=58b8c6e94cf44fbe952da8511955dacf", |
|
|
refresh_token: "https://oauth.yandex.com/token?grant_type=refresh_token&refresh_token=$REFRESH_TOKEN&client_id=$CLIENT_ID&client_secret=58b8c6e94cf44fbe952da8511955dacf", |
|
|
get_userinfo: None, |
|
|
}; |
|
|
|
|
|
#[derive(Debug, Clone, PartialEq, Eq)] |
|
|
struct Oauth2 { |
|
|
client_id: &'static str, |
|
|
get_code: &'static str, |
|
|
init_token: &'static str, |
|
|
refresh_token: &'static str, |
|
|
get_userinfo: Option<&'static str>, |
|
|
} |
|
|
|
|
|
|
|
|
#[derive(Debug, Deserialize)] |
|
|
#[allow(dead_code)] |
|
|
struct Response { |
|
|
|
|
|
|
|
|
access_token: Option<String>, |
|
|
token_type: String, |
|
|
|
|
|
expires_in: Option<u64>, |
|
|
refresh_token: Option<String>, |
|
|
scope: Option<String>, |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
pub async fn get_oauth2_url( |
|
|
context: &Context, |
|
|
addr: &str, |
|
|
redirect_uri: &str, |
|
|
) -> Result<Option<String>> { |
|
|
let socks5_enabled = context.get_config_bool(Config::Socks5Enabled).await?; |
|
|
if let Some(oauth2) = Oauth2::from_address(context, addr, socks5_enabled).await { |
|
|
context |
|
|
.sql |
|
|
.set_raw_config("oauth2_pending_redirect_uri", Some(redirect_uri)) |
|
|
.await?; |
|
|
let oauth2_url = replace_in_uri(oauth2.get_code, "$CLIENT_ID", oauth2.client_id); |
|
|
let oauth2_url = replace_in_uri(&oauth2_url, "$REDIRECT_URI", redirect_uri); |
|
|
|
|
|
Ok(Some(oauth2_url)) |
|
|
} else { |
|
|
Ok(None) |
|
|
} |
|
|
} |
|
|
|
|
|
pub(crate) async fn get_oauth2_access_token( |
|
|
context: &Context, |
|
|
addr: &str, |
|
|
code: &str, |
|
|
regenerate: bool, |
|
|
) -> Result<Option<String>> { |
|
|
let socks5_enabled = context.get_config_bool(Config::Socks5Enabled).await?; |
|
|
if let Some(oauth2) = Oauth2::from_address(context, addr, socks5_enabled).await { |
|
|
let lock = context.oauth2_mutex.lock().await; |
|
|
|
|
|
|
|
|
if !regenerate && !is_expired(context).await? { |
|
|
let access_token = context.sql.get_raw_config("oauth2_access_token").await?; |
|
|
if access_token.is_some() { |
|
|
|
|
|
return Ok(access_token); |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
let refresh_token = context.sql.get_raw_config("oauth2_refresh_token").await?; |
|
|
let refresh_token_for = context |
|
|
.sql |
|
|
.get_raw_config("oauth2_refresh_token_for") |
|
|
.await? |
|
|
.unwrap_or_else(|| "unset".into()); |
|
|
|
|
|
let (redirect_uri, token_url, update_redirect_uri_on_success) = |
|
|
if refresh_token.is_none() || refresh_token_for != code { |
|
|
info!(context, "Generate OAuth2 refresh_token and access_token...",); |
|
|
( |
|
|
context |
|
|
.sql |
|
|
.get_raw_config("oauth2_pending_redirect_uri") |
|
|
.await? |
|
|
.unwrap_or_else(|| "unset".into()), |
|
|
oauth2.init_token, |
|
|
true, |
|
|
) |
|
|
} else { |
|
|
info!( |
|
|
context, |
|
|
"Regenerate OAuth2 access_token by refresh_token...", |
|
|
); |
|
|
( |
|
|
context |
|
|
.sql |
|
|
.get_raw_config("oauth2_redirect_uri") |
|
|
.await? |
|
|
.unwrap_or_else(|| "unset".into()), |
|
|
oauth2.refresh_token, |
|
|
false, |
|
|
) |
|
|
}; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let mut parts = token_url.splitn(2, '?'); |
|
|
let post_url = parts.next().unwrap_or_default(); |
|
|
let post_args = parts.next().unwrap_or_default(); |
|
|
let mut post_param = HashMap::new(); |
|
|
for key_value_pair in post_args.split('&') { |
|
|
let mut parts = key_value_pair.splitn(2, '='); |
|
|
let key = parts.next().unwrap_or_default(); |
|
|
let mut value = parts.next().unwrap_or_default(); |
|
|
|
|
|
if value == "$CLIENT_ID" { |
|
|
value = oauth2.client_id; |
|
|
} else if value == "$REDIRECT_URI" { |
|
|
value = &redirect_uri; |
|
|
} else if value == "$CODE" { |
|
|
value = code; |
|
|
} else if value == "$REFRESH_TOKEN" { |
|
|
if let Some(refresh_token) = refresh_token.as_ref() { |
|
|
value = refresh_token; |
|
|
} |
|
|
} |
|
|
|
|
|
post_param.insert(key, value); |
|
|
} |
|
|
|
|
|
|
|
|
let socks5_config = Socks5Config::from_database(&context.sql).await?; |
|
|
let client = crate::net::http::get_client(socks5_config)?; |
|
|
|
|
|
let response: Response = match client.post(post_url).form(&post_param).send().await { |
|
|
Ok(resp) => match resp.json().await { |
|
|
Ok(response) => response, |
|
|
Err(err) => { |
|
|
warn!( |
|
|
context, |
|
|
"Failed to parse OAuth2 JSON response from {}: error: {}", token_url, err |
|
|
); |
|
|
return Ok(None); |
|
|
} |
|
|
}, |
|
|
Err(err) => { |
|
|
warn!(context, "Error calling OAuth2 at {}: {:?}", token_url, err); |
|
|
return Ok(None); |
|
|
} |
|
|
}; |
|
|
|
|
|
|
|
|
if let Some(ref token) = response.refresh_token { |
|
|
context |
|
|
.sql |
|
|
.set_raw_config("oauth2_refresh_token", Some(token)) |
|
|
.await?; |
|
|
context |
|
|
.sql |
|
|
.set_raw_config("oauth2_refresh_token_for", Some(code)) |
|
|
.await?; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
if let Some(ref token) = response.access_token { |
|
|
context |
|
|
.sql |
|
|
.set_raw_config("oauth2_access_token", Some(token)) |
|
|
.await?; |
|
|
let expires_in = response |
|
|
.expires_in |
|
|
|
|
|
.map(|t| time() + t as i64 - 5) |
|
|
.unwrap_or_else(|| 0); |
|
|
context |
|
|
.sql |
|
|
.set_raw_config_int64("oauth2_timestamp_expires", expires_in) |
|
|
.await?; |
|
|
|
|
|
if update_redirect_uri_on_success { |
|
|
context |
|
|
.sql |
|
|
.set_raw_config("oauth2_redirect_uri", Some(redirect_uri.as_ref())) |
|
|
.await?; |
|
|
} |
|
|
} else { |
|
|
warn!(context, "Failed to find OAuth2 access token"); |
|
|
} |
|
|
|
|
|
drop(lock); |
|
|
|
|
|
Ok(response.access_token) |
|
|
} else { |
|
|
warn!(context, "Internal OAuth2 error: 2"); |
|
|
|
|
|
Ok(None) |
|
|
} |
|
|
} |
|
|
|
|
|
pub(crate) async fn get_oauth2_addr( |
|
|
context: &Context, |
|
|
addr: &str, |
|
|
code: &str, |
|
|
) -> Result<Option<String>> { |
|
|
let socks5_enabled = context.get_config_bool(Config::Socks5Enabled).await?; |
|
|
let oauth2 = match Oauth2::from_address(context, addr, socks5_enabled).await { |
|
|
Some(o) => o, |
|
|
None => return Ok(None), |
|
|
}; |
|
|
if oauth2.get_userinfo.is_none() { |
|
|
return Ok(None); |
|
|
} |
|
|
|
|
|
if let Some(access_token) = get_oauth2_access_token(context, addr, code, false).await? { |
|
|
let addr_out = oauth2.get_addr(context, &access_token).await; |
|
|
if addr_out.is_none() { |
|
|
|
|
|
if let Some(access_token) = get_oauth2_access_token(context, addr, code, true).await? { |
|
|
Ok(oauth2.get_addr(context, &access_token).await) |
|
|
} else { |
|
|
Ok(None) |
|
|
} |
|
|
} else { |
|
|
Ok(addr_out) |
|
|
} |
|
|
} else { |
|
|
Ok(None) |
|
|
} |
|
|
} |
|
|
|
|
|
impl Oauth2 { |
|
|
async fn from_address(context: &Context, addr: &str, skip_mx: bool) -> Option<Self> { |
|
|
let addr_normalized = normalize_addr(addr); |
|
|
if let Some(domain) = addr_normalized |
|
|
.find('@') |
|
|
.map(|index| addr_normalized.split_at(index + 1).1) |
|
|
{ |
|
|
if let Some(oauth2_authorizer) = provider::get_provider_info(context, domain, skip_mx) |
|
|
.await |
|
|
.and_then(|provider| provider.oauth2_authorizer.as_ref()) |
|
|
{ |
|
|
return Some(match oauth2_authorizer { |
|
|
Oauth2Authorizer::Gmail => OAUTH2_GMAIL, |
|
|
Oauth2Authorizer::Yandex => OAUTH2_YANDEX, |
|
|
}); |
|
|
} |
|
|
} |
|
|
None |
|
|
} |
|
|
|
|
|
async fn get_addr(&self, context: &Context, access_token: &str) -> Option<String> { |
|
|
let userinfo_url = self.get_userinfo.unwrap_or(""); |
|
|
let userinfo_url = replace_in_uri(userinfo_url, "$ACCESS_TOKEN", access_token); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let socks5_config = Socks5Config::from_database(&context.sql).await.ok()?; |
|
|
let client = match crate::net::http::get_client(socks5_config) { |
|
|
Ok(cl) => cl, |
|
|
Err(err) => { |
|
|
warn!(context, "failed to get HTTP client: {}", err); |
|
|
return None; |
|
|
} |
|
|
}; |
|
|
let response = match client.get(userinfo_url).send().await { |
|
|
Ok(response) => response, |
|
|
Err(err) => { |
|
|
warn!(context, "failed to get userinfo: {}", err); |
|
|
return None; |
|
|
} |
|
|
}; |
|
|
let response: Result<HashMap<String, serde_json::Value>, _> = response.json().await; |
|
|
let parsed = match response { |
|
|
Ok(parsed) => parsed, |
|
|
Err(err) => { |
|
|
warn!(context, "Error getting userinfo: {}", err); |
|
|
return None; |
|
|
} |
|
|
}; |
|
|
|
|
|
|
|
|
if let Some(addr) = parsed.get("email") { |
|
|
if let Some(s) = addr.as_str() { |
|
|
Some(s.to_string()) |
|
|
} else { |
|
|
warn!(context, "E-mail in userinfo is not a string: {}", addr); |
|
|
None |
|
|
} |
|
|
} else { |
|
|
warn!(context, "E-mail missing in userinfo."); |
|
|
None |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
async fn is_expired(context: &Context) -> Result<bool> { |
|
|
let expire_timestamp = context |
|
|
.sql |
|
|
.get_raw_config_int64("oauth2_timestamp_expires") |
|
|
.await? |
|
|
.unwrap_or_default(); |
|
|
|
|
|
if expire_timestamp <= 0 { |
|
|
return Ok(false); |
|
|
} |
|
|
if expire_timestamp > time() { |
|
|
return Ok(false); |
|
|
} |
|
|
|
|
|
Ok(true) |
|
|
} |
|
|
|
|
|
fn replace_in_uri(uri: &str, key: &str, value: &str) -> String { |
|
|
let value_urlencoded = utf8_percent_encode(value, NON_ALPHANUMERIC).to_string(); |
|
|
uri.replace(key, &value_urlencoded) |
|
|
} |
|
|
|
|
|
fn normalize_addr(addr: &str) -> &str { |
|
|
let normalized = addr.trim(); |
|
|
normalized.trim_start_matches("mailto:") |
|
|
} |
|
|
|
|
|
#[cfg(test)] |
|
|
mod tests { |
|
|
use super::*; |
|
|
use crate::test_utils::TestContext; |
|
|
|
|
|
#[test] |
|
|
fn test_normalize_addr() { |
|
|
assert_eq!(normalize_addr(" hello@mail.de "), "hello@mail.de"); |
|
|
assert_eq!(normalize_addr("mailto:hello@mail.de "), "hello@mail.de"); |
|
|
} |
|
|
|
|
|
#[test] |
|
|
fn test_replace_in_uri() { |
|
|
assert_eq!( |
|
|
replace_in_uri("helloworld", "world", "a-b c"), |
|
|
"helloa%2Db%20c" |
|
|
); |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_oauth_from_address() { |
|
|
let t = TestContext::new().await; |
|
|
assert_eq!( |
|
|
Oauth2::from_address(&t, "hello@gmail.com", false).await, |
|
|
Some(OAUTH2_GMAIL) |
|
|
); |
|
|
assert_eq!( |
|
|
Oauth2::from_address(&t, "hello@googlemail.com", false).await, |
|
|
Some(OAUTH2_GMAIL) |
|
|
); |
|
|
assert_eq!( |
|
|
Oauth2::from_address(&t, "hello@yandex.com", false).await, |
|
|
Some(OAUTH2_YANDEX) |
|
|
); |
|
|
assert_eq!( |
|
|
Oauth2::from_address(&t, "hello@yandex.ru", false).await, |
|
|
Some(OAUTH2_YANDEX) |
|
|
); |
|
|
assert_eq!(Oauth2::from_address(&t, "hello@web.de", false).await, None); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_get_oauth2_addr() { |
|
|
let ctx = TestContext::new().await; |
|
|
let addr = "dignifiedquire@gmail.com"; |
|
|
let code = "fail"; |
|
|
let res = get_oauth2_addr(&ctx.ctx, addr, code).await.unwrap(); |
|
|
|
|
|
assert_eq!(res, None); |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_get_oauth2_url() { |
|
|
let ctx = TestContext::new().await; |
|
|
let addr = "dignifiedquire@gmail.com"; |
|
|
let redirect_uri = "chat.delta:/com.b44t.messenger"; |
|
|
let res = get_oauth2_url(&ctx.ctx, addr, redirect_uri).await.unwrap(); |
|
|
|
|
|
assert_eq!(res, Some("https://accounts.google.com/o/oauth2/auth?client_id=959970109878%2D4mvtgf6feshskf7695nfln6002mom908%2Eapps%2Egoogleusercontent%2Ecom&redirect_uri=chat%2Edelta%3A%2Fcom%2Eb44t%2Emessenger&response_type=code&scope=https%3A%2F%2Fmail.google.com%2F%20email&access_type=offline".into())); |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_get_oauth2_token() { |
|
|
let ctx = TestContext::new().await; |
|
|
let addr = "dignifiedquire@gmail.com"; |
|
|
let code = "fail"; |
|
|
let res = get_oauth2_access_token(&ctx.ctx, addr, code, false) |
|
|
.await |
|
|
.unwrap(); |
|
|
|
|
|
assert_eq!(res, None); |
|
|
} |
|
|
} |
|
|
|