add working login process
This commit is contained in:
parent
23257ee615
commit
fe6a51030f
5 changed files with 158 additions and 25 deletions
1
Cargo.lock
generated
1
Cargo.lock
generated
|
@ -1276,6 +1276,7 @@ version = "0.2.0"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"base64",
|
"base64",
|
||||||
"clap",
|
"clap",
|
||||||
|
"cookie",
|
||||||
"hmac-sha1",
|
"hmac-sha1",
|
||||||
"log",
|
"log",
|
||||||
"rand 0.7.3",
|
"rand 0.7.3",
|
||||||
|
|
|
@ -20,3 +20,4 @@ standback = "0.2.17" # required to fix a compilation error on a transient depend
|
||||||
clap = "2.33.3"
|
clap = "2.33.3"
|
||||||
log = "0.4.14"
|
log = "0.4.14"
|
||||||
stderrlog = "0.4"
|
stderrlog = "0.4"
|
||||||
|
cookie = "0.14"
|
|
@ -1,7 +1,7 @@
|
||||||
use std::convert::TryInto;
|
use std::convert::TryInto;
|
||||||
use serde::{Serialize, Deserialize};
|
use serde::{Serialize, Deserialize};
|
||||||
|
|
||||||
mod steamapi;
|
pub mod steamapi;
|
||||||
|
|
||||||
// const STEAMAPI_BASE: String = "https://api.steampowered.com";
|
// const STEAMAPI_BASE: String = "https://api.steampowered.com";
|
||||||
// const COMMUNITY_BASE: String = "https://steamcommunity.com";
|
// const COMMUNITY_BASE: String = "https://steamcommunity.com";
|
||||||
|
@ -12,6 +12,7 @@ mod steamapi;
|
||||||
|
|
||||||
extern crate hmacsha1;
|
extern crate hmacsha1;
|
||||||
extern crate base64;
|
extern crate base64;
|
||||||
|
extern crate cookie;
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
pub struct SteamGuardAccount {
|
pub struct SteamGuardAccount {
|
||||||
|
|
58
src/main.rs
58
src/main.rs
|
@ -4,11 +4,10 @@ use io::Write;
|
||||||
use steamguard_cli::*;
|
use steamguard_cli::*;
|
||||||
use ::std::*;
|
use ::std::*;
|
||||||
use text_io::read;
|
use text_io::read;
|
||||||
use std::path::Path;
|
use std::{io::stdin, path::Path};
|
||||||
use clap::{App, Arg, crate_version};
|
use clap::{App, Arg, crate_version};
|
||||||
use log::*;
|
use log::*;
|
||||||
|
|
||||||
mod steamapi;
|
|
||||||
mod accountmanager;
|
mod accountmanager;
|
||||||
|
|
||||||
fn main() {
|
fn main() {
|
||||||
|
@ -103,10 +102,55 @@ fn main() {
|
||||||
|
|
||||||
debug!("selected accounts: {:?}", selected_accounts.iter().map(|a| a.account_name.clone()).collect::<Vec<String>>());
|
debug!("selected accounts: {:?}", selected_accounts.iter().map(|a| a.account_name.clone()).collect::<Vec<String>>());
|
||||||
|
|
||||||
let server_time = steamapi::get_server_time();
|
if matches.is_present("trade") {
|
||||||
for account in selected_accounts {
|
info!("trade");
|
||||||
trace!("{:?}", account);
|
for account in selected_accounts.iter_mut() {
|
||||||
let code = account.generate_code(server_time);
|
let _ = std::io::stdout().flush();
|
||||||
println!("{}", code);
|
let password = rpassword::prompt_password_stdout("Password: ").unwrap();
|
||||||
|
trace!("password: {}", password);
|
||||||
|
let mut login = steamapi::UserLogin::new(account.account_name.clone(), password);
|
||||||
|
let mut loops = 0;
|
||||||
|
loop {
|
||||||
|
match login.login() {
|
||||||
|
steamapi::LoginResult::Ok(s) => {
|
||||||
|
account.session = Option::Some(s);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
steamapi::LoginResult::Need2FA => {
|
||||||
|
let server_time = steamapi::get_server_time();
|
||||||
|
login.twofactor_code = account.generate_code(server_time);
|
||||||
|
}
|
||||||
|
steamapi::LoginResult::NeedCaptcha{ captcha_gid } => {
|
||||||
|
// example captchas:
|
||||||
|
// - 3982844815370620954
|
||||||
|
// - 3982844815370767244
|
||||||
|
// - 3982844815370804220
|
||||||
|
// - 3982844815370819607
|
||||||
|
println!("Captcha required. Open this link in your web browser: https://steamcommunity.com/public/captcha.php?gid={}", captcha_gid);
|
||||||
|
print!("Enter captcha text: ");
|
||||||
|
let _ = std::io::stdout().flush();
|
||||||
|
let mut captcha_text = String::new();
|
||||||
|
stdin().read_line(&mut captcha_text).expect("Did not enter a correct string");
|
||||||
|
login.captcha_text = String::from(captcha_text.strip_suffix('\n').unwrap());
|
||||||
|
}
|
||||||
|
r => {
|
||||||
|
error!("Fatal login result: {:?}", r);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
loops += 1;
|
||||||
|
if loops > 2 {
|
||||||
|
error!("Too many loops. Aborting login process, to avoid getting rate limited.");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
let server_time = steamapi::get_server_time();
|
||||||
|
for account in selected_accounts {
|
||||||
|
trace!("{:?}", account);
|
||||||
|
let code = account.generate_code(server_time);
|
||||||
|
println!("{}", code);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
120
src/steamapi.rs
120
src/steamapi.rs
|
@ -1,19 +1,20 @@
|
||||||
use std::collections::HashMap;
|
use std::collections::HashMap;
|
||||||
use reqwest::{Url, cookie::CookieStore, header::COOKIE, header::USER_AGENT};
|
use reqwest::{Url, cookie::{CookieStore}, header::COOKIE, header::{SET_COOKIE, USER_AGENT}};
|
||||||
use rsa::{PublicKey, RSAPublicKey};
|
use rsa::{PublicKey, RSAPublicKey};
|
||||||
use std::time::{SystemTime, UNIX_EPOCH};
|
use std::time::{SystemTime, UNIX_EPOCH};
|
||||||
use serde::{Serialize, Deserialize};
|
use serde::{Serialize, Deserialize};
|
||||||
use serde::de::{Visitor};
|
use serde::de::{Visitor};
|
||||||
use rand::rngs::OsRng;
|
use rand::rngs::OsRng;
|
||||||
use std::fmt;
|
use std::fmt;
|
||||||
|
use log::*;
|
||||||
|
|
||||||
#[derive(Debug, Clone, Deserialize)]
|
#[derive(Debug, Clone, Deserialize)]
|
||||||
struct LoginResponse {
|
struct LoginResponse {
|
||||||
success: bool,
|
success: bool,
|
||||||
#[serde(default)]
|
#[serde(default)]
|
||||||
login_complete: bool,
|
login_complete: bool,
|
||||||
#[serde(default)]
|
// #[serde(default)]
|
||||||
oauth: String,
|
// oauth: String,
|
||||||
#[serde(default)]
|
#[serde(default)]
|
||||||
captcha_needed: bool,
|
captcha_needed: bool,
|
||||||
#[serde(default)]
|
#[serde(default)]
|
||||||
|
@ -24,7 +25,19 @@ struct LoginResponse {
|
||||||
emailauth_needed: bool,
|
emailauth_needed: bool,
|
||||||
#[serde(default)]
|
#[serde(default)]
|
||||||
requires_twofactor: bool,
|
requires_twofactor: bool,
|
||||||
|
#[serde(default)]
|
||||||
message: String,
|
message: String,
|
||||||
|
transfer_urls: Option<Vec<String>>,
|
||||||
|
transfer_parameters: Option<LoginTransferParameters>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
struct LoginTransferParameters {
|
||||||
|
steamid: String,
|
||||||
|
token_secure: String,
|
||||||
|
auth: String,
|
||||||
|
remember_login: bool,
|
||||||
|
webcookie: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Deserialize)]
|
#[derive(Debug, Clone, Deserialize)]
|
||||||
|
@ -38,7 +51,7 @@ struct RsaResponse {
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub enum LoginResult {
|
pub enum LoginResult {
|
||||||
Ok{ session: Session },
|
Ok(Session),
|
||||||
BadRSA,
|
BadRSA,
|
||||||
BadCredentials,
|
BadCredentials,
|
||||||
NeedCaptcha{ captcha_gid: String },
|
NeedCaptcha{ captcha_gid: String },
|
||||||
|
@ -85,6 +98,7 @@ impl UserLogin {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn update_session(&self) {
|
fn update_session(&self) {
|
||||||
|
trace!("UserLogin::update_session");
|
||||||
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||||
self.cookies.add_cookie_str("mobileClientVersion=0 (2.1.3)", &url);
|
self.cookies.add_cookie_str("mobileClientVersion=0 (2.1.3)", &url);
|
||||||
self.cookies.add_cookie_str("mobileClient=android", &url);
|
self.cookies.add_cookie_str("mobileClient=android", &url);
|
||||||
|
@ -99,9 +113,12 @@ impl UserLogin {
|
||||||
// .header(COOKIE, "Steam_Language=english")
|
// .header(COOKIE, "Steam_Language=english")
|
||||||
.header(COOKIE, self.cookies.cookies(&url).unwrap())
|
.header(COOKIE, self.cookies.cookies(&url).unwrap())
|
||||||
.send();
|
.send();
|
||||||
|
|
||||||
|
trace!("cookies: {:?}", self.cookies);
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn login(&mut self) -> LoginResult {
|
pub fn login(&mut self) -> LoginResult {
|
||||||
|
trace!("UserLogin::login");
|
||||||
if self.captcha_required && self.captcha_text.len() == 0 {
|
if self.captcha_required && self.captcha_text.len() == 0 {
|
||||||
return LoginResult::NeedCaptcha{captcha_gid: self.captcha_gid.clone()};
|
return LoginResult::NeedCaptcha{captcha_gid: self.captcha_gid.clone()};
|
||||||
}
|
}
|
||||||
|
@ -132,15 +149,19 @@ impl UserLogin {
|
||||||
let mut rng = OsRng;
|
let mut rng = OsRng;
|
||||||
let padding = rsa::PaddingScheme::new_pkcs1v15_encrypt();
|
let padding = rsa::PaddingScheme::new_pkcs1v15_encrypt();
|
||||||
encrypted_password = base64::encode(public_key.encrypt(&mut rng, padding, self.password.as_bytes()).unwrap());
|
encrypted_password = base64::encode(public_key.encrypt(&mut rng, padding, self.password.as_bytes()).unwrap());
|
||||||
println!("encrypted_password: {:?}", encrypted_password);
|
// trace!("encrypted_password: {:?}", encrypted_password);
|
||||||
rsa_timestamp = rsa_resp.timestamp;
|
rsa_timestamp = rsa_resp.timestamp;
|
||||||
}
|
}
|
||||||
Err(error) => {
|
Err(error) => {
|
||||||
println!("rsa error: {:?}", error);
|
error!("rsa error: {:?}", error);
|
||||||
return LoginResult::BadRSA
|
return LoginResult::BadRSA
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
debug!("captchagid: {}", self.captcha_gid);
|
||||||
|
debug!("captcha_text: {}", self.captcha_text);
|
||||||
|
debug!("twofactorcode: {}", self.twofactor_code);
|
||||||
|
debug!("emailauth: {}", self.email_code);
|
||||||
let mut params = HashMap::new();
|
let mut params = HashMap::new();
|
||||||
params.insert("donotcache", format!("{}", SystemTime::now().duration_since(UNIX_EPOCH).unwrap().as_secs() * 1000));
|
params.insert("donotcache", format!("{}", SystemTime::now().duration_since(UNIX_EPOCH).unwrap().as_secs() * 1000));
|
||||||
params.insert("username", self.username.clone());
|
params.insert("username", self.username.clone());
|
||||||
|
@ -160,20 +181,23 @@ impl UserLogin {
|
||||||
.form(¶ms)
|
.form(¶ms)
|
||||||
.send() {
|
.send() {
|
||||||
Ok(resp) => {
|
Ok(resp) => {
|
||||||
// println!("login resp: {:?}", &resp.text());
|
// https://stackoverflow.com/questions/49928648/rubys-mechanize-error-401-while-sending-a-post-request-steam-trade-offer-send
|
||||||
match resp.json::<LoginResponse>() {
|
let text = resp.text().unwrap();
|
||||||
|
trace!("resp content: {}", text);
|
||||||
|
match serde_json::from_str(text.as_str()) {
|
||||||
Ok(lr) => {
|
Ok(lr) => {
|
||||||
println!("login resp: {:?}", lr);
|
info!("login resp: {:?}", lr);
|
||||||
login_resp = lr;
|
login_resp = lr;
|
||||||
}
|
}
|
||||||
Err(error) => {
|
Err(error) => {
|
||||||
println!("login parse error: {:?}", error);
|
debug!("login response did not have normal schema");
|
||||||
|
error!("login parse error: {:?}", error);
|
||||||
return LoginResult::OtherFailure;
|
return LoginResult::OtherFailure;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Err(error) => {
|
Err(error) => {
|
||||||
println!("login request error: {:?}", error);
|
error!("login request error: {:?}", error);
|
||||||
return LoginResult::OtherFailure;
|
return LoginResult::OtherFailure;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -204,22 +228,84 @@ impl UserLogin {
|
||||||
return LoginResult::BadCredentials;
|
return LoginResult::BadCredentials;
|
||||||
}
|
}
|
||||||
|
|
||||||
let oauth: OAuthData = serde_json::from_str(login_resp.oauth.as_str()).unwrap();
|
|
||||||
let session = self.build_session(oauth);
|
|
||||||
|
|
||||||
return LoginResult::Ok{session};
|
// transfer login parameters? Not completely sure what this is for.
|
||||||
|
// i guess steam changed their authentication scheme slightly
|
||||||
|
let oauth;
|
||||||
|
match (login_resp.transfer_urls, login_resp.transfer_parameters) {
|
||||||
|
(Some(urls), Some(params)) => {
|
||||||
|
debug!("received transfer parameters, relaying data...");
|
||||||
|
for url in urls {
|
||||||
|
trace!("posting transfer to {}", url);
|
||||||
|
let result = self.client
|
||||||
|
.post(url)
|
||||||
|
.json(¶ms)
|
||||||
|
.send();
|
||||||
|
trace!("result: {:?}", result);
|
||||||
|
match result {
|
||||||
|
Ok(resp) => {
|
||||||
|
debug!("result status: {}", resp.status());
|
||||||
|
self.save_cookies_from_response(&resp);
|
||||||
|
}
|
||||||
|
Err(e) => {
|
||||||
|
error!("failed to transfer parameters: {:?}", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
oauth = OAuthData {
|
||||||
|
oauth_token: params.auth,
|
||||||
|
steamid: params.steamid.parse().unwrap(),
|
||||||
|
wgtoken: params.token_secure.clone(), // guessing
|
||||||
|
wgtoken_secure: params.token_secure,
|
||||||
|
webcookie: params.webcookie,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
_ => {
|
||||||
|
error!("did not receive transfer_urls and transfer_parameters");
|
||||||
|
return LoginResult::OtherFailure;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// let oauth: OAuthData = serde_json::from_str(login_resp.oauth.as_str()).unwrap();
|
||||||
|
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||||
|
let cookies = self.cookies.cookies(&url).unwrap();
|
||||||
|
let all_cookies = cookies.to_str().unwrap();
|
||||||
|
let mut session_id = String::from("");
|
||||||
|
for cookie in all_cookies.split(";").map(|s| cookie::Cookie::parse(s).unwrap()) {
|
||||||
|
if cookie.name() == "sessionid" {
|
||||||
|
session_id = String::from(cookie.value());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
trace!("cookies {:?}", cookies);
|
||||||
|
let session = self.build_session(oauth, session_id);
|
||||||
|
|
||||||
|
return LoginResult::Ok(session);
|
||||||
}
|
}
|
||||||
|
|
||||||
fn build_session(&self, data: OAuthData) -> Session {
|
fn build_session(&self, data: OAuthData, session_id: String) -> Session {
|
||||||
return Session{
|
return Session{
|
||||||
token: data.oauth_token,
|
token: data.oauth_token,
|
||||||
steam_id: data.steamid,
|
steam_id: data.steamid,
|
||||||
steam_login: format!("{}%7C%7C{}", data.steamid, data.wgtoken),
|
steam_login: format!("{}%7C%7C{}", data.steamid, data.wgtoken),
|
||||||
steam_login_secure: format!("{}%7C%7C{}", data.steamid, data.wgtoken_secure),
|
steam_login_secure: format!("{}%7C%7C{}", data.steamid, data.wgtoken_secure),
|
||||||
session_id: todo!(),
|
session_id: session_id,
|
||||||
web_cookie: todo!(),
|
web_cookie: data.webcookie,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn save_cookies_from_response(&mut self, response: &reqwest::blocking::Response) {
|
||||||
|
let set_cookie_iter = response.headers().get_all(SET_COOKIE);
|
||||||
|
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||||
|
|
||||||
|
for c in set_cookie_iter {
|
||||||
|
c.to_str()
|
||||||
|
.into_iter()
|
||||||
|
.for_each(|cookie_str| {
|
||||||
|
self.cookies.add_cookie_str(cookie_str, &url)
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Deserialize)]
|
#[derive(Debug, Clone, Deserialize)]
|
||||||
|
|
Loading…
Reference in a new issue