add working login process
This commit is contained in:
parent
23257ee615
commit
fe6a51030f
5 changed files with 158 additions and 25 deletions
1
Cargo.lock
generated
1
Cargo.lock
generated
|
@ -1276,6 +1276,7 @@ version = "0.2.0"
|
|||
dependencies = [
|
||||
"base64",
|
||||
"clap",
|
||||
"cookie",
|
||||
"hmac-sha1",
|
||||
"log",
|
||||
"rand 0.7.3",
|
||||
|
|
|
@ -20,3 +20,4 @@ standback = "0.2.17" # required to fix a compilation error on a transient depend
|
|||
clap = "2.33.3"
|
||||
log = "0.4.14"
|
||||
stderrlog = "0.4"
|
||||
cookie = "0.14"
|
|
@ -1,7 +1,7 @@
|
|||
use std::convert::TryInto;
|
||||
use serde::{Serialize, Deserialize};
|
||||
|
||||
mod steamapi;
|
||||
pub mod steamapi;
|
||||
|
||||
// const STEAMAPI_BASE: String = "https://api.steampowered.com";
|
||||
// const COMMUNITY_BASE: String = "https://steamcommunity.com";
|
||||
|
@ -12,6 +12,7 @@ mod steamapi;
|
|||
|
||||
extern crate hmacsha1;
|
||||
extern crate base64;
|
||||
extern crate cookie;
|
||||
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct SteamGuardAccount {
|
||||
|
|
48
src/main.rs
48
src/main.rs
|
@ -4,11 +4,10 @@ use io::Write;
|
|||
use steamguard_cli::*;
|
||||
use ::std::*;
|
||||
use text_io::read;
|
||||
use std::path::Path;
|
||||
use std::{io::stdin, path::Path};
|
||||
use clap::{App, Arg, crate_version};
|
||||
use log::*;
|
||||
|
||||
mod steamapi;
|
||||
mod accountmanager;
|
||||
|
||||
fn main() {
|
||||
|
@ -103,10 +102,55 @@ fn main() {
|
|||
|
||||
debug!("selected accounts: {:?}", selected_accounts.iter().map(|a| a.account_name.clone()).collect::<Vec<String>>());
|
||||
|
||||
if matches.is_present("trade") {
|
||||
info!("trade");
|
||||
for account in selected_accounts.iter_mut() {
|
||||
let _ = std::io::stdout().flush();
|
||||
let password = rpassword::prompt_password_stdout("Password: ").unwrap();
|
||||
trace!("password: {}", password);
|
||||
let mut login = steamapi::UserLogin::new(account.account_name.clone(), password);
|
||||
let mut loops = 0;
|
||||
loop {
|
||||
match login.login() {
|
||||
steamapi::LoginResult::Ok(s) => {
|
||||
account.session = Option::Some(s);
|
||||
break;
|
||||
}
|
||||
steamapi::LoginResult::Need2FA => {
|
||||
let server_time = steamapi::get_server_time();
|
||||
login.twofactor_code = account.generate_code(server_time);
|
||||
}
|
||||
steamapi::LoginResult::NeedCaptcha{ captcha_gid } => {
|
||||
// example captchas:
|
||||
// - 3982844815370620954
|
||||
// - 3982844815370767244
|
||||
// - 3982844815370804220
|
||||
// - 3982844815370819607
|
||||
println!("Captcha required. Open this link in your web browser: https://steamcommunity.com/public/captcha.php?gid={}", captcha_gid);
|
||||
print!("Enter captcha text: ");
|
||||
let _ = std::io::stdout().flush();
|
||||
let mut captcha_text = String::new();
|
||||
stdin().read_line(&mut captcha_text).expect("Did not enter a correct string");
|
||||
login.captcha_text = String::from(captcha_text.strip_suffix('\n').unwrap());
|
||||
}
|
||||
r => {
|
||||
error!("Fatal login result: {:?}", r);
|
||||
return;
|
||||
}
|
||||
}
|
||||
loops += 1;
|
||||
if loops > 2 {
|
||||
error!("Too many loops. Aborting login process, to avoid getting rate limited.");
|
||||
return;
|
||||
}
|
||||
}
|
||||
}
|
||||
} else {
|
||||
let server_time = steamapi::get_server_time();
|
||||
for account in selected_accounts {
|
||||
trace!("{:?}", account);
|
||||
let code = account.generate_code(server_time);
|
||||
println!("{}", code);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
120
src/steamapi.rs
120
src/steamapi.rs
|
@ -1,19 +1,20 @@
|
|||
use std::collections::HashMap;
|
||||
use reqwest::{Url, cookie::CookieStore, header::COOKIE, header::USER_AGENT};
|
||||
use reqwest::{Url, cookie::{CookieStore}, header::COOKIE, header::{SET_COOKIE, USER_AGENT}};
|
||||
use rsa::{PublicKey, RSAPublicKey};
|
||||
use std::time::{SystemTime, UNIX_EPOCH};
|
||||
use serde::{Serialize, Deserialize};
|
||||
use serde::de::{Visitor};
|
||||
use rand::rngs::OsRng;
|
||||
use std::fmt;
|
||||
use log::*;
|
||||
|
||||
#[derive(Debug, Clone, Deserialize)]
|
||||
struct LoginResponse {
|
||||
success: bool,
|
||||
#[serde(default)]
|
||||
login_complete: bool,
|
||||
#[serde(default)]
|
||||
oauth: String,
|
||||
// #[serde(default)]
|
||||
// oauth: String,
|
||||
#[serde(default)]
|
||||
captcha_needed: bool,
|
||||
#[serde(default)]
|
||||
|
@ -24,7 +25,19 @@ struct LoginResponse {
|
|||
emailauth_needed: bool,
|
||||
#[serde(default)]
|
||||
requires_twofactor: bool,
|
||||
#[serde(default)]
|
||||
message: String,
|
||||
transfer_urls: Option<Vec<String>>,
|
||||
transfer_parameters: Option<LoginTransferParameters>,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
struct LoginTransferParameters {
|
||||
steamid: String,
|
||||
token_secure: String,
|
||||
auth: String,
|
||||
remember_login: bool,
|
||||
webcookie: String,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, Deserialize)]
|
||||
|
@ -38,7 +51,7 @@ struct RsaResponse {
|
|||
|
||||
#[derive(Debug)]
|
||||
pub enum LoginResult {
|
||||
Ok{ session: Session },
|
||||
Ok(Session),
|
||||
BadRSA,
|
||||
BadCredentials,
|
||||
NeedCaptcha{ captcha_gid: String },
|
||||
|
@ -85,6 +98,7 @@ impl UserLogin {
|
|||
}
|
||||
|
||||
fn update_session(&self) {
|
||||
trace!("UserLogin::update_session");
|
||||
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||
self.cookies.add_cookie_str("mobileClientVersion=0 (2.1.3)", &url);
|
||||
self.cookies.add_cookie_str("mobileClient=android", &url);
|
||||
|
@ -99,9 +113,12 @@ impl UserLogin {
|
|||
// .header(COOKIE, "Steam_Language=english")
|
||||
.header(COOKIE, self.cookies.cookies(&url).unwrap())
|
||||
.send();
|
||||
|
||||
trace!("cookies: {:?}", self.cookies);
|
||||
}
|
||||
|
||||
pub fn login(&mut self) -> LoginResult {
|
||||
trace!("UserLogin::login");
|
||||
if self.captcha_required && self.captcha_text.len() == 0 {
|
||||
return LoginResult::NeedCaptcha{captcha_gid: self.captcha_gid.clone()};
|
||||
}
|
||||
|
@ -132,15 +149,19 @@ impl UserLogin {
|
|||
let mut rng = OsRng;
|
||||
let padding = rsa::PaddingScheme::new_pkcs1v15_encrypt();
|
||||
encrypted_password = base64::encode(public_key.encrypt(&mut rng, padding, self.password.as_bytes()).unwrap());
|
||||
println!("encrypted_password: {:?}", encrypted_password);
|
||||
// trace!("encrypted_password: {:?}", encrypted_password);
|
||||
rsa_timestamp = rsa_resp.timestamp;
|
||||
}
|
||||
Err(error) => {
|
||||
println!("rsa error: {:?}", error);
|
||||
error!("rsa error: {:?}", error);
|
||||
return LoginResult::BadRSA
|
||||
}
|
||||
}
|
||||
|
||||
debug!("captchagid: {}", self.captcha_gid);
|
||||
debug!("captcha_text: {}", self.captcha_text);
|
||||
debug!("twofactorcode: {}", self.twofactor_code);
|
||||
debug!("emailauth: {}", self.email_code);
|
||||
let mut params = HashMap::new();
|
||||
params.insert("donotcache", format!("{}", SystemTime::now().duration_since(UNIX_EPOCH).unwrap().as_secs() * 1000));
|
||||
params.insert("username", self.username.clone());
|
||||
|
@ -160,20 +181,23 @@ impl UserLogin {
|
|||
.form(¶ms)
|
||||
.send() {
|
||||
Ok(resp) => {
|
||||
// println!("login resp: {:?}", &resp.text());
|
||||
match resp.json::<LoginResponse>() {
|
||||
// https://stackoverflow.com/questions/49928648/rubys-mechanize-error-401-while-sending-a-post-request-steam-trade-offer-send
|
||||
let text = resp.text().unwrap();
|
||||
trace!("resp content: {}", text);
|
||||
match serde_json::from_str(text.as_str()) {
|
||||
Ok(lr) => {
|
||||
println!("login resp: {:?}", lr);
|
||||
info!("login resp: {:?}", lr);
|
||||
login_resp = lr;
|
||||
}
|
||||
Err(error) => {
|
||||
println!("login parse error: {:?}", error);
|
||||
debug!("login response did not have normal schema");
|
||||
error!("login parse error: {:?}", error);
|
||||
return LoginResult::OtherFailure;
|
||||
}
|
||||
}
|
||||
}
|
||||
Err(error) => {
|
||||
println!("login request error: {:?}", error);
|
||||
error!("login request error: {:?}", error);
|
||||
return LoginResult::OtherFailure;
|
||||
}
|
||||
}
|
||||
|
@ -204,22 +228,84 @@ impl UserLogin {
|
|||
return LoginResult::BadCredentials;
|
||||
}
|
||||
|
||||
let oauth: OAuthData = serde_json::from_str(login_resp.oauth.as_str()).unwrap();
|
||||
let session = self.build_session(oauth);
|
||||
|
||||
return LoginResult::Ok{session};
|
||||
// transfer login parameters? Not completely sure what this is for.
|
||||
// i guess steam changed their authentication scheme slightly
|
||||
let oauth;
|
||||
match (login_resp.transfer_urls, login_resp.transfer_parameters) {
|
||||
(Some(urls), Some(params)) => {
|
||||
debug!("received transfer parameters, relaying data...");
|
||||
for url in urls {
|
||||
trace!("posting transfer to {}", url);
|
||||
let result = self.client
|
||||
.post(url)
|
||||
.json(¶ms)
|
||||
.send();
|
||||
trace!("result: {:?}", result);
|
||||
match result {
|
||||
Ok(resp) => {
|
||||
debug!("result status: {}", resp.status());
|
||||
self.save_cookies_from_response(&resp);
|
||||
}
|
||||
Err(e) => {
|
||||
error!("failed to transfer parameters: {:?}", e);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn build_session(&self, data: OAuthData) -> Session {
|
||||
oauth = OAuthData {
|
||||
oauth_token: params.auth,
|
||||
steamid: params.steamid.parse().unwrap(),
|
||||
wgtoken: params.token_secure.clone(), // guessing
|
||||
wgtoken_secure: params.token_secure,
|
||||
webcookie: params.webcookie,
|
||||
};
|
||||
}
|
||||
_ => {
|
||||
error!("did not receive transfer_urls and transfer_parameters");
|
||||
return LoginResult::OtherFailure;
|
||||
}
|
||||
}
|
||||
|
||||
// let oauth: OAuthData = serde_json::from_str(login_resp.oauth.as_str()).unwrap();
|
||||
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||
let cookies = self.cookies.cookies(&url).unwrap();
|
||||
let all_cookies = cookies.to_str().unwrap();
|
||||
let mut session_id = String::from("");
|
||||
for cookie in all_cookies.split(";").map(|s| cookie::Cookie::parse(s).unwrap()) {
|
||||
if cookie.name() == "sessionid" {
|
||||
session_id = String::from(cookie.value());
|
||||
}
|
||||
}
|
||||
trace!("cookies {:?}", cookies);
|
||||
let session = self.build_session(oauth, session_id);
|
||||
|
||||
return LoginResult::Ok(session);
|
||||
}
|
||||
|
||||
fn build_session(&self, data: OAuthData, session_id: String) -> Session {
|
||||
return Session{
|
||||
token: data.oauth_token,
|
||||
steam_id: data.steamid,
|
||||
steam_login: format!("{}%7C%7C{}", data.steamid, data.wgtoken),
|
||||
steam_login_secure: format!("{}%7C%7C{}", data.steamid, data.wgtoken_secure),
|
||||
session_id: todo!(),
|
||||
web_cookie: todo!(),
|
||||
session_id: session_id,
|
||||
web_cookie: data.webcookie,
|
||||
};
|
||||
}
|
||||
|
||||
fn save_cookies_from_response(&mut self, response: &reqwest::blocking::Response) {
|
||||
let set_cookie_iter = response.headers().get_all(SET_COOKIE);
|
||||
let url = "https://steamcommunity.com".parse::<Url>().unwrap();
|
||||
|
||||
for c in set_cookie_iter {
|
||||
c.to_str()
|
||||
.into_iter()
|
||||
.for_each(|cookie_str| {
|
||||
self.cookies.add_cookie_str(cookie_str, &url)
|
||||
});
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, Deserialize)]
|
||||
|
|
Loading…
Reference in a new issue