Compare commits

..

No commits in common. "master" and "steamguard-v0.12.4" have entirely different histories.

26 changed files with 1225 additions and 1609 deletions

View file

@ -5,13 +5,12 @@ on:
- cron: "32 5 */3 * *" - cron: "32 5 */3 * *"
push: push:
branches: [ master, main ] branches: [ master, main ]
workflow_dispatch:
jobs: jobs:
test-install: test-install:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- name: Checkout - name: Checkout
uses: actions/checkout@v4 uses: actions/checkout@v2
- name: Install AUR package - name: Install AUR package
run: ./scripts/check-aur.sh run: ./scripts/check-aur.sh

View file

@ -15,9 +15,9 @@ jobs:
steps: steps:
- run: rustup component add clippy rustfmt - run: rustup component add clippy rustfmt
- uses: actions/checkout@v4 - uses: actions/checkout@v3
- name: Rust Cache - name: Rust Cache
uses: Swatinem/rust-cache@v2 uses: Swatinem/rust-cache@v2.5.0
- name: Check format - name: Check format
run: cargo fmt --all -- --check run: cargo fmt --all -- --check
- name: Check - name: Check
@ -34,13 +34,13 @@ jobs:
matrix: matrix:
target: [x86_64-unknown-linux-musl, x86_64-pc-windows-gnu] target: [x86_64-unknown-linux-musl, x86_64-pc-windows-gnu]
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v3
- name: Rust Cache - name: Rust Cache
uses: Swatinem/rust-cache@v2 uses: Swatinem/rust-cache@v2.5.0
with: with:
prefix-key: v0-rust-${{ matrix.target }} prefix-key: v0-rust-${{ matrix.target }}
- name: Install Cross - name: Install Cross
uses: baptiste0928/cargo-install@v2 uses: baptiste0928/cargo-install@v1
with: with:
crate: cross crate: cross
- name: Check - name: Check

2107
Cargo.lock generated

File diff suppressed because it is too large Load diff

View file

@ -4,9 +4,9 @@ members = ["steamguard"]
[package] [package]
name = "steamguard-cli" name = "steamguard-cli"
version = "0.14.0" version = "0.12.4"
authors = ["dyc3 (Carson McManus) <carson.mcmanus1@gmail.com>"] authors = ["dyc3 (Carson McManus) <carson.mcmanus1@gmail.com>"]
edition = "2021" edition = "2018"
description = "A command line utility to generate Steam 2FA codes and respond to confirmations." description = "A command line utility to generate Steam 2FA codes and respond to confirmations."
keywords = ["steam", "2fa", "steamguard", "authentication", "cli"] keywords = ["steam", "2fa", "steamguard", "authentication", "cli"]
categories = ["command-line-utilities"] categories = ["command-line-utilities"]
@ -27,43 +27,38 @@ keyring = ["dep:keyring"]
name = "steamguard" name = "steamguard"
path = "src/main.rs" path = "src/main.rs"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
anyhow = "^1.0" anyhow = "^1.0"
base64 = "0.22.1" base64 = "0.21.2"
text_io = "0.1.8" text_io = "0.1.8"
rpassword = "7.2.0" rpassword = "7.2.0"
reqwest = { version = "0.12", default-features = false, features = [ reqwest = { version = "0.11", default-features = false, features = ["blocking", "json", "cookies", "gzip", "rustls-tls"] }
"blocking",
"json",
"cookies",
"gzip",
"rustls-tls",
] }
serde = { version = "1.0", features = ["derive"] } serde = { version = "1.0", features = ["derive"] }
serde_json = "1.0" serde_json = "1.0"
rsa = "0.9.2" rsa = "0.9.2"
rand = "0.8.5" rand = "0.8.5"
clap = { version = "4.5.4", features = ["derive", "cargo", "env"] } standback = "0.2.17" # required to fix a compilation error on a transient dependency
clap_complete = "4.5.2" clap = { version = "3.1.18", features = ["derive", "cargo", "env"] }
clap_complete = "3.2.1"
log = "0.4.19" log = "0.4.19"
stderrlog = "0.6" stderrlog = "0.4"
cookie = "0.18" cookie = "0.14"
regex = "1" regex = "1"
lazy_static = "1.4.0" lazy_static = "1.4.0"
uuid = { version = "1.8", features = ["v4"] } uuid = { version = "0.8", features = ["v4"] }
steamguard = { version = "^0.14.0", path = "./steamguard" } steamguard = { version = "^0.12.4", path = "./steamguard" }
dirs = "5.0.1" dirs = "3.0.2"
aes = { version = "0.8.3", features = ["zeroize"] } aes = { version = "0.8.3", features = ["zeroize"] }
thiserror = "1.0.61" thiserror = "1.0.26"
crossterm = { version = "0.23.2", features = ["event-stream"] } crossterm = { version = "0.23.2", features = ["event-stream"] }
qrcode = { version = "0.14.0", optional = true } qrcode = { version = "0.12.0", optional = true }
gethostname = "0.4.3" gethostname = "0.4.3"
secrecy = { version = "0.8", features = ["serde"] } secrecy = { version = "0.8", features = ["serde"] }
zeroize = { version = "^1.6.0", features = ["std", "zeroize_derive"] } zeroize = { version = "^1.6.0", features = ["std", "zeroize_derive"] }
serde_path_to_error = "0.1.11" serde_path_to_error = "0.1.11"
update-informer = { version = "1.0.0", optional = true, default-features = false, features = [ update-informer = { version = "1.0.0", optional = true, default-features = false, features = ["github"] }
"github",
] }
phonenumber = "0.3" phonenumber = "0.3"
cbc = { version = "0.1.2", features = ["std", "zeroize"] } cbc = { version = "0.1.2", features = ["std", "zeroize"] }
inout = { version = "0.1.3", features = ["std"] } inout = { version = "0.1.3", features = ["std"] }
@ -72,11 +67,9 @@ argon2 = { version = "0.5.0", features = ["std", "zeroize"] }
pbkdf2 = { version = "0.12.1", features = ["parallel"] } pbkdf2 = { version = "0.12.1", features = ["parallel"] }
sha1 = "0.10.5" sha1 = "0.10.5"
rayon = "1.7.0" rayon = "1.7.0"
rqrr = "0.7.1"
image = "0.25"
[dev-dependencies] [dev-dependencies]
tempfile = "3" tempdir = "0.3"
proptest = "1" proptest = "1"
[profile.release] [profile.release]

View file

@ -3,7 +3,7 @@
_pkgname=steamguard-cli _pkgname=steamguard-cli
pkgname=${_pkgname}-git pkgname=${_pkgname}-git
pkgver=0.14.0.r1.602acc66 pkgver=0.8.1.r1.fe0d6e9a
pkgrel=1 pkgrel=1
pkgdesc="A command line utility to generate Steam 2FA codes and respond to confirmations." pkgdesc="A command line utility to generate Steam 2FA codes and respond to confirmations."
arch=('i686' 'x86_64' 'armv6h' 'armv7h') arch=('i686' 'x86_64' 'armv6h' 'armv7h')
@ -12,7 +12,6 @@ license=('GPL3')
makedepends=('rust' 'cargo' 'git') makedepends=('rust' 'cargo' 'git')
source=("git+https://github.com/dyc3/steamguard-cli.git") source=("git+https://github.com/dyc3/steamguard-cli.git")
sha256sums=('SKIP') sha256sums=('SKIP')
options=(!lto)
pkgver() { pkgver() {
cd "${srcdir}/${_pkgname}" cd "${srcdir}/${_pkgname}"

View file

@ -3,7 +3,7 @@
[![Lint, Build, Test](https://github.com/dyc3/steamguard-cli/actions/workflows/rust.yml/badge.svg)](https://github.com/dyc3/steamguard-cli/actions/workflows/rust.yml) [![Lint, Build, Test](https://github.com/dyc3/steamguard-cli/actions/workflows/rust.yml/badge.svg)](https://github.com/dyc3/steamguard-cli/actions/workflows/rust.yml)
[![AUR Tester](https://github.com/dyc3/steamguard-cli/actions/workflows/aur-checker.yml/badge.svg)](https://github.com/dyc3/steamguard-cli/actions/workflows/aur-checker.yml) [![AUR Tester](https://github.com/dyc3/steamguard-cli/actions/workflows/aur-checker.yml/badge.svg)](https://github.com/dyc3/steamguard-cli/actions/workflows/aur-checker.yml)
A command line utility for setting up and using Steam Mobile Authenticator (AKA Steam 2FA). It can also be used to respond to trade, market, and any other steam mobile confirmations that you would normally get in the app. A command line utility for setting up and using Steam Mobile Authenticator (AKA Steam 2FA). It can also be used to respond to trade and market confirmations.
**The only legitimate place to download steamguard-cli binaries is through this repo's releases, or by any package manager that is linked in this document.** **The only legitimate place to download steamguard-cli binaries is through this repo's releases, or by any package manager that is linked in this document.**

View file

@ -54,18 +54,7 @@ This will do everything needed to release a new version:
""" """
echo "Previewing changes..." echo "Previewing changes..."
params=() cargo smart-release --update-crates-index --no-changelog --no-tag --no-push --no-publish
if [[ $BUMP != "" ]]; then
params+=(--bump "$BUMP")
params+=(--bump-dependencies "$BUMP")
fi
if [[ $SKIP_CRATE_PUBLISH == true ]]; then
params+=(--no-publish)
fi
if [[ $ALLOW_DIRTY == true ]]; then
params+=(--allow-dirty)
fi
cargo smart-release --update-crates-index --no-changelog --no-tag --no-push --no-publish "${params[@]}"
if [ "$DRY_RUN" = true ]; then if [ "$DRY_RUN" = true ]; then
echo "This is a dry run, nothing will be done. Artifacts will be built, but not published. Use --execute to do it for real." echo "This is a dry run, nothing will be done. Artifacts will be built, but not published. Use --execute to do it for real."
@ -75,10 +64,20 @@ fi
echo "Press any key to continue..." echo "Press any key to continue..."
read -n 1 -s -r read -n 1 -s -r
params=()
if [[ $DRY_RUN == false ]]; then if [[ $DRY_RUN == false ]]; then
params+=(--execute) params+=(--execute)
fi fi
if [[ $BUMP != "" ]]; then
params+=(--bump "$BUMP")
params+=(--bump-dependencies "$BUMP")
fi
if [[ $SKIP_CRATE_PUBLISH == true ]]; then
params+=(--no-publish)
fi
if [[ $ALLOW_DIRTY == true ]]; then
params+=(--allow-dirty)
fi
cargo smart-release --update-crates-index --no-changelog --no-tag --no-push --no-publish "${params[@]}" cargo smart-release --update-crates-index --no-changelog --no-tag --no-push --no-publish "${params[@]}"
#echo "Verify that the publish succeeded, and Press any key to continue..." #echo "Verify that the publish succeeded, and Press any key to continue..."

View file

@ -339,9 +339,8 @@ impl AccountManager {
debug!("Adding missing account names"); debug!("Adding missing account names");
for i in 0..self.manifest.entries.len() { for i in 0..self.manifest.entries.len() {
let account = self.load_account_by_entry(&self.manifest.entries[i].clone())?; let account = self.load_account_by_entry(&self.manifest.entries[i].clone())?;
self.manifest.entries[i] self.manifest.entries[i].account_name =
.account_name account.lock().unwrap().account_name.clone();
.clone_from(&account.lock().unwrap().account_name);
} }
upgraded = true; upgraded = true;
} }
@ -471,11 +470,11 @@ pub enum ManifestAccountImportError {
mod tests { mod tests {
use super::*; use super::*;
use steamguard::ExposeSecret; use steamguard::ExposeSecret;
use tempfile::TempDir; use tempdir::TempDir;
#[test] #[test]
fn test_should_save_new_manifest() { fn test_should_save_new_manifest() {
let tmp_dir = TempDir::new().unwrap(); let tmp_dir = TempDir::new("steamguard-cli-test").unwrap();
let manifest_path = tmp_dir.path().join("manifest.json"); let manifest_path = tmp_dir.path().join("manifest.json");
let manager = AccountManager::new(manifest_path.as_path()); let manager = AccountManager::new(manifest_path.as_path());
assert!(manager.save().is_ok()); assert!(manager.save().is_ok());
@ -483,7 +482,7 @@ mod tests {
#[test] #[test]
fn test_should_save_and_load_manifest() -> anyhow::Result<()> { fn test_should_save_and_load_manifest() -> anyhow::Result<()> {
let tmp_dir = TempDir::new()?; let tmp_dir = TempDir::new("steamguard-cli-test")?;
let manifest_path = tmp_dir.path().join("manifest.json"); let manifest_path = tmp_dir.path().join("manifest.json");
println!("tempdir: {}", manifest_path.display()); println!("tempdir: {}", manifest_path.display());
let mut manager = AccountManager::new(manifest_path.as_path()); let mut manager = AccountManager::new(manifest_path.as_path());
@ -519,7 +518,7 @@ mod tests {
#[test] #[test]
fn test_should_save_and_load_manifest_encrypted() -> anyhow::Result<()> { fn test_should_save_and_load_manifest_encrypted() -> anyhow::Result<()> {
let passkey = Some(SecretString::new("password".into())); let passkey = Some(SecretString::new("password".into()));
let tmp_dir = TempDir::new()?; let tmp_dir = TempDir::new("steamguard-cli-test")?;
let manifest_path = tmp_dir.path().join("manifest.json"); let manifest_path = tmp_dir.path().join("manifest.json");
let mut manager = AccountManager::new(manifest_path.as_path()); let mut manager = AccountManager::new(manifest_path.as_path());
let mut account = SteamGuardAccount::new(); let mut account = SteamGuardAccount::new();
@ -568,7 +567,7 @@ mod tests {
#[test] #[test]
fn test_should_save_and_load_manifest_encrypted_longer() -> anyhow::Result<()> { fn test_should_save_and_load_manifest_encrypted_longer() -> anyhow::Result<()> {
let passkey = Some(SecretString::new("password".into())); let passkey = Some(SecretString::new("password".into()));
let tmp_dir = TempDir::new()?; let tmp_dir = TempDir::new("steamguard-cli-test")?;
let manifest_path = tmp_dir.path().join("manifest.json"); let manifest_path = tmp_dir.path().join("manifest.json");
let mut manager = AccountManager::new(manifest_path.as_path()); let mut manager = AccountManager::new(manifest_path.as_path());
let mut account = SteamGuardAccount::new(); let mut account = SteamGuardAccount::new();
@ -615,7 +614,7 @@ mod tests {
#[test] #[test]
fn test_should_import() -> anyhow::Result<()> { fn test_should_import() -> anyhow::Result<()> {
let tmp_dir = TempDir::new()?; let tmp_dir = TempDir::new("steamguard-cli-test")?;
let manifest_path = tmp_dir.path().join("manifest.json"); let manifest_path = tmp_dir.path().join("manifest.json");
let mut manager = AccountManager::new(manifest_path.as_path()); let mut manager = AccountManager::new(manifest_path.as_path());
let mut account = SteamGuardAccount::new(); let mut account = SteamGuardAccount::new();

View file

@ -319,8 +319,6 @@ impl From<ExternalAccount> for SteamGuardAccount {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use tempfile::TempDir;
use crate::{accountmanager::CURRENT_MANIFEST_VERSION, AccountManager}; use crate::{accountmanager::CURRENT_MANIFEST_VERSION, AccountManager};
use super::*; use super::*;
@ -479,7 +477,7 @@ mod tests {
]; ];
for case in cases { for case in cases {
eprintln!("testing: {:?}", case); eprintln!("testing: {:?}", case);
let temp = TempDir::new()?; let temp = tempdir::TempDir::new("steamguard-cli-test")?;
for file in std::fs::read_dir(case.dir)? { for file in std::fs::read_dir(case.dir)? {
let file = file?; let file = file?;
let path = file.path(); let path = file.path();

View file

@ -1,6 +1,6 @@
use std::sync::{Arc, Mutex}; use std::sync::{Arc, Mutex};
use clap::{Parser, Subcommand, ValueEnum}; use clap::{clap_derive::ArgEnum, Parser};
use clap_complete::Shell; use clap_complete::Shell;
use secrecy::SecretString; use secrecy::SecretString;
use std::str::FromStr; use std::str::FromStr;
@ -10,7 +10,6 @@ use crate::AccountManager;
pub mod code; pub mod code;
pub mod completions; pub mod completions;
pub mod confirm;
pub mod debug; pub mod debug;
pub mod decrypt; pub mod decrypt;
pub mod encrypt; pub mod encrypt;
@ -20,10 +19,10 @@ pub mod qr;
pub mod qr_login; pub mod qr_login;
pub mod remove; pub mod remove;
pub mod setup; pub mod setup;
pub mod trade;
pub use code::CodeCommand; pub use code::CodeCommand;
pub use completions::CompletionsCommand; pub use completions::CompletionsCommand;
pub use confirm::ConfirmCommand;
pub use debug::DebugCommand; pub use debug::DebugCommand;
pub use decrypt::DecryptCommand; pub use decrypt::DecryptCommand;
pub use encrypt::EncryptCommand; pub use encrypt::EncryptCommand;
@ -33,6 +32,7 @@ pub use qr::QrCommand;
pub use qr_login::QrLoginCommand; pub use qr_login::QrLoginCommand;
pub use remove::RemoveCommand; pub use remove::RemoveCommand;
pub use setup::SetupCommand; pub use setup::SetupCommand;
pub use trade::TradeCommand;
/// A command that does not operate on the manifest or individual accounts. /// A command that does not operate on the manifest or individual accounts.
pub(crate) trait ConstCommand { pub(crate) trait ConstCommand {
@ -127,7 +127,7 @@ pub(crate) struct GlobalArgs {
help = "Specify your encryption passkey." help = "Specify your encryption passkey."
)] )]
pub passkey: Option<SecretString>, pub passkey: Option<SecretString>,
#[clap(short, long, value_enum, default_value_t=Verbosity::Info, help = "Set the log level. Be warned, trace is capable of printing sensitive data.")] #[clap(short, long, arg_enum, default_value_t=Verbosity::Info, help = "Set the log level. Be warned, trace is capable of printing sensitive data.")]
pub verbosity: Verbosity, pub verbosity: Verbosity,
#[cfg(feature = "updater")] #[cfg(feature = "updater")]
@ -160,14 +160,13 @@ pub(crate) struct GlobalArgs {
pub danger_accept_invalid_certs: bool, pub danger_accept_invalid_certs: bool,
} }
#[derive(Debug, Clone, Subcommand)] #[derive(Debug, Clone, Parser)]
pub(crate) enum Subcommands { pub(crate) enum Subcommands {
Debug(DebugCommand), Debug(DebugCommand),
Completion(CompletionsCommand), Completion(CompletionsCommand),
Setup(SetupCommand), Setup(SetupCommand),
Import(ImportCommand), Import(ImportCommand),
#[clap(alias = "trade")] Trade(TradeCommand),
Confirm(ConfirmCommand),
Remove(RemoveCommand), Remove(RemoveCommand),
Encrypt(EncryptCommand), Encrypt(EncryptCommand),
Decrypt(DecryptCommand), Decrypt(DecryptCommand),
@ -177,7 +176,7 @@ pub(crate) enum Subcommands {
QrLogin(QrLoginCommand), QrLogin(QrLoginCommand),
} }
#[derive(Debug, Clone, Copy, ValueEnum)] #[derive(Debug, Clone, Copy, ArgEnum)]
pub(crate) enum Verbosity { pub(crate) enum Verbosity {
Error = 0, Error = 0,
Warn = 1, Warn = 1,
@ -223,14 +222,3 @@ impl From<Args> for CodeCommand {
args.code args.code
} }
} }
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn verify_cli() {
use clap::CommandFactory;
Args::command().debug_assert()
}
}

View file

@ -5,12 +5,7 @@ use super::*;
#[derive(Debug, Clone, Parser)] #[derive(Debug, Clone, Parser)]
#[clap(about = "Generate shell completions")] #[clap(about = "Generate shell completions")]
pub struct CompletionsCommand { pub struct CompletionsCommand {
#[clap( #[clap(short, long, arg_enum, help = "The shell to generate completions for.")]
short,
long,
value_enum,
help = "The shell to generate completions for."
)]
pub shell: Shell, pub shell: Shell,
} }

View file

@ -1,10 +1,6 @@
use std::{ use std::sync::{Arc, Mutex};
path::{Path, PathBuf},
sync::{Arc, Mutex},
};
use log::*; use log::*;
use rqrr::PreparedImage;
use steamguard::{QrApprover, QrApproverError}; use steamguard::{QrApprover, QrApproverError};
use crate::AccountManager; use crate::AccountManager;
@ -14,8 +10,11 @@ use super::*;
#[derive(Debug, Clone, Parser)] #[derive(Debug, Clone, Parser)]
#[clap(about = "Log in to Steam on another device using the QR code that it's displaying.")] #[clap(about = "Log in to Steam on another device using the QR code that it's displaying.")]
pub struct QrLoginCommand { pub struct QrLoginCommand {
#[clap(flatten)] #[clap(
login_url_source: LoginUrlSource, long,
help = "The URL that would normally open in the Steam app. This is the URL that the QR code is displaying. It should start with \"https://s.team/...\""
)]
pub url: String,
} }
impl<T> AccountCommand<T> for QrLoginCommand impl<T> AccountCommand<T> for QrLoginCommand
@ -42,8 +41,6 @@ where
crate::do_login(transport.clone(), &mut account, args.password.clone())?; crate::do_login(transport.clone(), &mut account, args.password.clone())?;
} }
let url = self.login_url_source.url()?;
debug!("Using login URL to approve: {}", url);
loop { loop {
let Some(tokens) = account.tokens.as_ref() else { let Some(tokens) = account.tokens.as_ref() else {
error!( error!(
@ -54,7 +51,7 @@ where
}; };
let mut approver = QrApprover::new(transport.clone(), tokens); let mut approver = QrApprover::new(transport.clone(), tokens);
match approver.approve(&account, url.to_owned()) { match approver.approve(&account, &self.url) {
Ok(_) => { Ok(_) => {
info!("Login approved."); info!("Login approved.");
break; break;
@ -73,56 +70,3 @@ where
Ok(()) Ok(())
} }
} }
#[derive(Debug, Clone, clap::Args)]
#[group(required = true, multiple = false)]
pub struct LoginUrlSource {
/// The URL that would normally open in the Steam app. This is the URL that the QR code is displaying. It should start with \"https://s.team/...\"
#[clap(long)]
url: Option<String>,
/// Path to an image file containing the QR code. The QR code will be scanned from this image.
#[clap(long)]
image: Option<PathBuf>,
}
impl LoginUrlSource {
fn url(&self) -> anyhow::Result<String> {
match self {
Self { url: Some(url), .. } => Ok(url.clone()),
Self {
image: Some(path), ..
} => read_qr_image(path),
_ => Err(anyhow!(
"You must provide either a URL with --url or an image file with --image."
)),
}
}
}
fn read_qr_image(path: &Path) -> anyhow::Result<String> {
use image::io::Reader as ImageReader;
let image = ImageReader::open(path)?.decode()?.to_luma8();
let mut img = PreparedImage::prepare(image);
let grids = img.detect_grids();
for grid in grids {
let (_meta, text) = grid.decode()?;
// a rough validation that the QR code is a Steam login code
if text.contains("s.team") {
return Ok(text);
}
}
Err(anyhow!("No Steam login url found in the QR code"))
}
#[cfg(test)]
mod tests {
use super::*;
use std::path::Path;
#[test]
fn test_read_qr_image() {
let path = Path::new("src/fixtures/qr-codes/login-qr.png");
let url = read_qr_image(path).unwrap();
assert_eq!(url, "https://s.team/q/1/2372462679780599330");
}
}

View file

@ -1,7 +1,7 @@
use std::sync::{Arc, Mutex}; use std::sync::{Arc, Mutex};
use log::*; use log::*;
use steamguard::{accountlinker::RemoveAuthenticatorError, transport::TransportError}; use steamguard::{steamapi::TwoFactorClient, transport::TransportError, RemoveAuthenticatorError};
use crate::{errors::UserError, tui, AccountManager}; use crate::{errors::UserError, tui, AccountManager};
@ -43,10 +43,11 @@ where
let mut successful = vec![]; let mut successful = vec![];
for a in accounts { for a in accounts {
let mut account = a.lock().unwrap(); let mut account = a.lock().unwrap();
let client = TwoFactorClient::new(transport.clone());
let mut revocation: Option<String> = None; let mut revocation: Option<String> = None;
loop { loop {
match account.remove_authenticator(transport.clone(), revocation.as_ref()) { match account.remove_authenticator(&client, revocation.as_ref()) {
Ok(_) => { Ok(_) => {
info!("Removed authenticator from {}", account.account_name); info!("Removed authenticator from {}", account.account_name);
successful.push(account.account_name.clone()); successful.push(account.account_name.clone());
@ -68,17 +69,17 @@ where
error!("No attempts remaining, aborting!"); error!("No attempts remaining, aborting!");
break; break;
} }
let code = tui::prompt_non_empty(format!( eprint!("Enter the revocation code for {}: ", account.account_name);
"Enter the revocation code for {}: ", let code = tui::prompt();
account.account_name
));
revocation = Some(code); revocation = Some(code);
} }
Err(RemoveAuthenticatorError::MissingRevocationCode) => { Err(RemoveAuthenticatorError::MissingRevocationCode) => {
let code = tui::prompt_non_empty(format!( error!(
"Enter the revocation code for {}: ", "Account {} does not have a revocation code",
account.account_name account.account_name
)); );
eprint!("Enter the revocation code for {}: ", account.account_name);
let code = tui::prompt();
revocation = Some(code); revocation = Some(code);
} }
Err(err) => { Err(err) => {

View file

@ -2,7 +2,7 @@ use log::*;
use phonenumber::PhoneNumber; use phonenumber::PhoneNumber;
use secrecy::ExposeSecret; use secrecy::ExposeSecret;
use steamguard::{ use steamguard::{
accountlinker::{AccountLinkConfirmType, AccountLinkSuccess, RemoveAuthenticatorError}, accountlinker::{AccountLinkConfirmType, AccountLinkSuccess},
phonelinker::PhoneLinker, phonelinker::PhoneLinker,
steamapi::PhoneClient, steamapi::PhoneClient,
token::Tokens, token::Tokens,
@ -43,10 +43,12 @@ where
info!("Adding authenticator..."); info!("Adding authenticator...");
let mut linker = AccountLinker::new(transport.clone(), tokens); let mut linker = AccountLinker::new(transport.clone(), tokens);
let link: AccountLinkSuccess;
loop { loop {
match linker.link() { match linker.link() {
Ok(link) => { Ok(a) => {
return Self::add_new_account(link, manager, account_name, linker); link = a;
break;
} }
Err(AccountLinkError::MustProvidePhoneNumber) => { Err(AccountLinkError::MustProvidePhoneNumber) => {
// As of Dec 12, 2023, Steam no longer appears to require a phone number to add an authenticator. Keeping this code here just in case. // As of Dec 12, 2023, Steam no longer appears to require a phone number to add an authenticator. Keeping this code here just in case.
@ -57,49 +59,6 @@ where
println!("Check your email and click the link."); println!("Check your email and click the link.");
tui::pause(); tui::pause();
} }
Err(AccountLinkError::AuthenticatorPresent) => {
eprintln!("It looks like there's already an authenticator on this account. If you want to link it to steamguard-cli, you'll need to remove it first. If you remove it using your revocation code (R#####), you'll get a 15 day trade ban.");
eprintln!("However, you can \"transfer\" the authenticator to steamguard-cli if you have access to the phone number associated with your account. This will cause you to get only a 2 day trade ban.");
eprintln!("If you were using SDA or WinAuth, you can import it into steamguard-cli with the `import` command, and have no trade ban.");
eprintln!("You can't have the same authenticator on steamguard-cli and the steam mobile app at the same time.");
eprintln!("\nHere are your options:");
eprintln!("[T] Transfer authenticator to steamguard-cli (2 day trade ban)");
eprintln!("[R] Revoke authenticator with revocation code (15 day trade ban)");
eprintln!("[A] Abort setup");
let answer = tui::prompt_char("What would you like to do?", "Tra");
match answer {
't' => return Self::transfer_new_account(linker, manager),
'r' => {
loop {
let revocation_code =
tui::prompt_non_empty("Enter your revocation code (R#####): ");
match linker.remove_authenticator(Some(&revocation_code)) {
Ok(_) => break,
Err(RemoveAuthenticatorError::IncorrectRevocationCode {
attempts_remaining,
}) => {
error!(
"Revocation code was incorrect ({} attempts remaining)",
attempts_remaining
);
if attempts_remaining == 0 {
error!("No attempts remaining, aborting!");
bail!("Failed to remove authenticator: no attempts remaining")
}
}
Err(err) => {
error!("Failed to remove authenticator: {}", err);
}
}
}
}
_ => {
info!("Aborting account linking.");
return Err(AccountLinkError::AuthenticatorPresent.into());
}
}
}
Err(err) => { Err(err) => {
error!( error!(
"Failed to link authenticator. Account has not been linked. {}", "Failed to link authenticator. Account has not been linked. {}",
@ -109,20 +68,6 @@ where
} }
} }
} }
}
}
impl SetupCommand {
/// Add a new account to the manifest after linking has started.
fn add_new_account<T>(
link: AccountLinkSuccess,
manager: &mut AccountManager,
account_name: String,
mut linker: AccountLinker<T>,
) -> Result<(), anyhow::Error>
where
T: Transport + Clone,
{
let mut server_time = link.server_time(); let mut server_time = link.server_time();
let phone_number_hint = link.phone_number_hint().to_owned(); let phone_number_hint = link.phone_number_hint().to_owned();
let confirm_type = link.confirm_type(); let confirm_type = link.confirm_type();
@ -138,12 +83,15 @@ impl SetupCommand {
return Err(err); return Err(err);
} }
} }
let account_arc = manager let account_arc = manager
.get_account(&account_name) .get_account(&account_name)
.expect("account was not present in manifest"); .expect("account was not present in manifest");
let mut account = account_arc.lock().unwrap(); let mut account = account_arc.lock().unwrap();
eprintln!("Authenticator has not yet been linked. Before continuing with finalization, please take the time to write down your revocation code: {}", account.revocation_code.expose_secret()); eprintln!("Authenticator has not yet been linked. Before continuing with finalization, please take the time to write down your revocation code: {}", account.revocation_code.expose_secret());
tui::pause(); tui::pause();
debug!("attempting link finalization"); debug!("attempting link finalization");
let confirm_code = match confirm_type { let confirm_code = match confirm_type {
AccountLinkConfirmType::Email => { AccountLinkConfirmType::Email => {
@ -164,6 +112,7 @@ impl SetupCommand {
bail!("Unknown link confirm type: {}", t); bail!("Unknown link confirm type: {}", t);
} }
}; };
let mut tries = 0; let mut tries = 0;
loop { loop {
match linker.finalize(server_time, &mut account, confirm_code.clone()) { match linker.finalize(server_time, &mut account, confirm_code.clone()) {
@ -184,7 +133,8 @@ impl SetupCommand {
} }
} }
let revocation_code = account.revocation_code.clone(); let revocation_code = account.revocation_code.clone();
drop(account); drop(account); // explicitly drop the lock so we don't hang on the mutex
info!("Verifying authenticator status..."); info!("Verifying authenticator status...");
let status = let status =
linker.query_status(&manager.get_account(&account_name).unwrap().lock().unwrap())?; linker.query_status(&manager.get_account(&account_name).unwrap().lock().unwrap())?;
@ -193,11 +143,11 @@ impl SetupCommand {
"authenticator state: {} -- did not actually finalize", "authenticator state: {} -- did not actually finalize",
status.state() status.state()
); );
debug!("full status: {:#?}", status);
manager.remove_account(&account_name); manager.remove_account(&account_name);
manager.save()?; manager.save()?;
bail!("Authenticator finalization was unsuccessful. You may have entered the wrong confirm code in the previous step. Try again."); bail!("Authenticator finalization was unsuccessful. You may have entered the wrong confirm code in the previous step. Try again.");
} }
info!("Authenticator finalized."); info!("Authenticator finalized.");
match manager.save() { match manager.save() {
Ok(_) => {} Ok(_) => {}
@ -209,52 +159,12 @@ impl SetupCommand {
return Err(err); return Err(err);
} }
} }
eprintln!( eprintln!(
"Authenticator has been finalized. Please actually write down your revocation code: {}", "Authenticator has been finalized. Please actually write down your revocation code: {}",
revocation_code.expose_secret() revocation_code.expose_secret()
); );
Ok(())
}
/// Transfer an existing authenticator to steamguard-cli.
fn transfer_new_account<T>(
mut linker: AccountLinker<T>,
manager: &mut AccountManager,
) -> anyhow::Result<()>
where
T: Transport + Clone,
{
info!("Transferring authenticator to steamguard-cli");
linker.transfer_start()?;
let account: SteamGuardAccount;
loop {
let sms_code = tui::prompt_non_empty("Enter SMS code: ");
match linker.transfer_finish(sms_code) {
Ok(acc) => {
account = acc;
break;
}
Err(err) => {
error!("Failed to transfer authenticator: {}", err);
}
}
}
info!("Transfer successful, adding account to manifest");
let revocation_code = account.revocation_code.clone();
eprintln!(
"Take a moment to write down your revocation code: {}",
revocation_code.expose_secret()
);
manager.add_account(account);
manager.save()?;
eprintln!(
"Make sure you have your revocation code written down: {}",
revocation_code.expose_secret()
);
Ok(()) Ok(())
} }
} }

View file

@ -9,12 +9,12 @@ use crate::{tui, AccountManager};
use super::*; use super::*;
#[derive(Debug, Clone, Parser)] #[derive(Debug, Clone, Parser)]
#[clap(about = "Interactive interface for steam mobile confirmations")] #[clap(about = "Interactive interface for trade confirmations")]
pub struct ConfirmCommand { pub struct TradeCommand {
#[clap( #[clap(
short, short,
long, long,
help = "Accept all open mobile confirmations. Does not open interactive interface." help = "Accept all open trade confirmations. Does not open interactive interface."
)] )]
pub accept_all: bool, pub accept_all: bool,
#[clap( #[clap(
@ -25,7 +25,7 @@ pub struct ConfirmCommand {
pub fail_fast: bool, pub fail_fast: bool,
} }
impl<T> AccountCommand<T> for ConfirmCommand impl<T> AccountCommand<T> for TradeCommand
where where
T: Transport + Clone, T: Transport + Clone,
{ {
@ -44,12 +44,12 @@ where
crate::do_login(transport.clone(), &mut account, args.password.clone())?; crate::do_login(transport.clone(), &mut account, args.password.clone())?;
} }
info!("{}: Checking for confirmations", account.account_name); info!("{}: Checking for trade confirmations", account.account_name);
let confirmations: Vec<Confirmation>; let confirmations: Vec<Confirmation>;
loop { loop {
let confirmer = Confirmer::new(transport.clone(), &account); let confirmer = Confirmer::new(transport.clone(), &account);
match confirmer.get_confirmations() { match confirmer.get_trade_confirmations() {
Ok(confs) => { Ok(confs) => {
confirmations = confs; confirmations = confs;
break; break;
@ -59,7 +59,7 @@ where
crate::do_login(transport.clone(), &mut account, args.password.clone())?; crate::do_login(transport.clone(), &mut account, args.password.clone())?;
} }
Err(err) => { Err(err) => {
error!("Failed to get confirmations: {}", err); error!("Failed to get trade confirmations: {}", err);
return Err(err.into()); return Err(err.into());
} }
} }

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.3 KiB

View file

@ -8,7 +8,6 @@ use steamguard::{
steamapi::{self, AuthenticationClient}, steamapi::{self, AuthenticationClient},
token::Tokens, token::Tokens,
transport::Transport, transport::Transport,
userlogin::UpdateAuthSessionError,
DeviceDetails, LoginError, SteamGuardAccount, UserLogin, DeviceDetails, LoginError, SteamGuardAccount, UserLogin,
}; };
@ -142,48 +141,21 @@ fn do_login_impl<T: Transport + Clone>(
eprintln!("Press enter when you have confirmed."); eprintln!("Press enter when you have confirmed.");
tui::pause(); tui::pause();
} }
EAuthSessionGuardType::k_EAuthSessionGuardType_DeviceCode EAuthSessionGuardType::k_EAuthSessionGuardType_DeviceCode => {
| EAuthSessionGuardType::k_EAuthSessionGuardType_EmailCode => {
let prompt = if method.confirmation_type
== EAuthSessionGuardType::k_EAuthSessionGuardType_DeviceCode
{
"Enter the 2fa code from your device: "
} else {
"Enter the 2fa code sent to your email: "
};
let mut attempts = 0;
loop {
let code = if let Some(account) = account { let code = if let Some(account) = account {
debug!("Generating 2fa code..."); debug!("Generating 2fa code...");
let time = steamapi::get_server_time(transport.clone())?.server_time(); let time = steamapi::get_server_time(transport)?.server_time();
account.generate_code(time) account.generate_code(time)
} else { } else {
tui::prompt_non_empty(prompt).trim().to_owned() eprint!("Enter the 2fa code from your device: ");
tui::prompt().trim().to_owned()
}; };
login.submit_steam_guard_code(method.confirmation_type, code)?;
match login.submit_steam_guard_code(method.confirmation_type, code) {
Ok(_) => break,
Err(err) => {
error!("Failed to submit code: {}", err);
match err {
UpdateAuthSessionError::TooManyAttempts
| UpdateAuthSessionError::SessionExpired
| UpdateAuthSessionError::InvalidGuardType => {
error!("Error is unrecoverable. Aborting.");
return Err(err.into());
}
_ => {}
}
attempts += 1;
debug!("Attempts: {}/3", attempts);
if attempts >= 3 {
error!("Too many failed attempts. Aborting.");
return Err(err.into());
}
}
}
} }
EAuthSessionGuardType::k_EAuthSessionGuardType_EmailCode => {
eprint!("Enter the 2fa code sent to your email: ");
let code = tui::prompt().trim().to_owned();
login.submit_steam_guard_code(method.confirmation_type, code)?;
} }
EAuthSessionGuardType::k_EAuthSessionGuardType_None => { EAuthSessionGuardType::k_EAuthSessionGuardType_None => {
debug!("No login confirmation required. Proceeding with login."); debug!("No login confirmation required. Proceeding with login.");

View file

@ -86,7 +86,7 @@ fn run(args: commands::Args) -> anyhow::Result<()> {
Subcommands::Import(args) => CommandType::Manifest(Box::new(args)), Subcommands::Import(args) => CommandType::Manifest(Box::new(args)),
Subcommands::Encrypt(args) => CommandType::Manifest(Box::new(args)), Subcommands::Encrypt(args) => CommandType::Manifest(Box::new(args)),
Subcommands::Decrypt(args) => CommandType::Manifest(Box::new(args)), Subcommands::Decrypt(args) => CommandType::Manifest(Box::new(args)),
Subcommands::Confirm(args) => CommandType::Account(Box::new(args)), Subcommands::Trade(args) => CommandType::Account(Box::new(args)),
Subcommands::Remove(args) => CommandType::Account(Box::new(args)), Subcommands::Remove(args) => CommandType::Account(Box::new(args)),
Subcommands::Code(args) => CommandType::Account(Box::new(args)), Subcommands::Code(args) => CommandType::Account(Box::new(args)),
#[cfg(feature = "qr")] #[cfg(feature = "qr")]

View file

@ -47,7 +47,6 @@ pub(crate) fn prompt_non_empty(prompt_text: impl AsRef<str>) -> String {
/// Prompt the user for a single character response. Useful for asking yes or no questions. /// Prompt the user for a single character response. Useful for asking yes or no questions.
/// ///
/// `chars` should be all lowercase characters, with at most 1 uppercase character. The uppercase character is the default answer if no answer is provided. /// `chars` should be all lowercase characters, with at most 1 uppercase character. The uppercase character is the default answer if no answer is provided.
/// The selected character returned will always be lowercase.
pub(crate) fn prompt_char(text: &str, chars: &str) -> char { pub(crate) fn prompt_char(text: &str, chars: &str) -> char {
loop { loop {
let _ = stderr().queue(Print(format!("{} [{}] ", text, chars))); let _ = stderr().queue(Print(format!("{} [{}] ", text, chars)));
@ -59,7 +58,10 @@ pub(crate) fn prompt_char(text: &str, chars: &str) -> char {
} }
} }
fn prompt_char_impl(input: impl Into<String>, chars: &str) -> anyhow::Result<char> { fn prompt_char_impl<T>(input: T, chars: &str) -> anyhow::Result<char>
where
T: Into<String>,
{
let uppers = chars.replace(char::is_lowercase, ""); let uppers = chars.replace(char::is_lowercase, "");
if uppers.len() > 1 { if uppers.len() > 1 {
panic!("Invalid chars for prompt_char. Maximum 1 uppercase letter is allowed."); panic!("Invalid chars for prompt_char. Maximum 1 uppercase letter is allowed.");

View file

@ -1,34 +1,31 @@
[package] [package]
name = "steamguard" name = "steamguard"
version = "0.14.0" version = "0.12.4"
authors = ["Carson McManus <carson.mcmanus1@gmail.com>"] authors = ["Carson McManus <carson.mcmanus1@gmail.com>"]
edition = "2021" edition = "2018"
description = "Library for generating 2fa codes for Steam and responding to mobile confirmations." description = "Library for generating 2fa codes for Steam and responding to mobile confirmations."
keywords = ["steam", "2fa", "steamguard", "authentication"] keywords = ["steam", "2fa", "steamguard", "authentication"]
repository = "https://github.com/dyc3/steamguard-cli/tree/master/steamguard" repository = "https://github.com/dyc3/steamguard-cli/tree/master/steamguard"
license = "MIT OR Apache-2.0" license = "MIT OR Apache-2.0"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
anyhow = "^1.0" anyhow = "^1.0"
sha1 = "^0.10" sha1 = "^0.10"
base64 = "^0.22.1" base64 = "^0.21"
reqwest = { version = "0.12", default-features = false, features = [ reqwest = { version = "0.11", default-features = false, features = ["blocking", "json", "cookies", "gzip", "rustls-tls", "multipart"] }
"blocking",
"json",
"cookies",
"gzip",
"rustls-tls",
"multipart",
] }
serde = { version = "1.0", features = ["derive"] } serde = { version = "1.0", features = ["derive"] }
serde_json = "1.0" serde_json = "1.0"
rsa = "0.9.2" rsa = "0.9.2"
rand = "0.8.4" rand = "0.8.4"
cookie = "0.18" standback = "0.2.17" # required to fix a compilation error on a transient dependency
cookie = "0.14"
regex = "1" regex = "1"
lazy_static = "1.4.0" lazy_static = "1.4.0"
uuid = { version = "1.8", features = ["v4"] } uuid = { version = "0.8", features = ["v4"] }
log = "0.4.19" log = "0.4.19"
scraper = "0.12.0"
maplit = "1.0.2" maplit = "1.0.2"
thiserror = "1.0.26" thiserror = "1.0.26"
secrecy = { version = "0.8", features = ["serde"] } secrecy = { version = "0.8", features = ["serde"] }
@ -39,7 +36,6 @@ phonenumber = "0.3"
serde_path_to_error = "0.1.11" serde_path_to_error = "0.1.11"
hmac = "^0.12" hmac = "^0.12"
sha2 = "^0.10" sha2 = "^0.10"
num_enum = "0.7.2"
[build-dependencies] [build-dependencies]
anyhow = "^1.0" anyhow = "^1.0"

View file

@ -1,12 +1,10 @@
use crate::protobufs::service_twofactor::{ use crate::protobufs::service_twofactor::{
CTwoFactor_AddAuthenticator_Request, CTwoFactor_FinalizeAddAuthenticator_Request, CTwoFactor_AddAuthenticator_Request, CTwoFactor_FinalizeAddAuthenticator_Request,
CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Request, CTwoFactor_Status_Request, CTwoFactor_Status_Response,
CTwoFactor_RemoveAuthenticatorViaChallengeStart_Request,
CTwoFactor_RemoveAuthenticator_Request, CTwoFactor_Status_Request, CTwoFactor_Status_Response,
}; };
use crate::steamapi::twofactor::TwoFactorClient; use crate::steamapi::twofactor::TwoFactorClient;
use crate::token::TwoFactorSecret; use crate::token::TwoFactorSecret;
use crate::transport::{Transport, TransportError}; use crate::transport::Transport;
use crate::{steamapi::EResult, token::Tokens, SteamGuardAccount}; use crate::{steamapi::EResult, token::Tokens, SteamGuardAccount};
use anyhow::Context; use anyhow::Context;
use base64::Engine; use base64::Engine;
@ -137,97 +135,13 @@ where
let mut req = CTwoFactor_Status_Request::new(); let mut req = CTwoFactor_Status_Request::new();
req.set_steamid(account.steam_id); req.set_steamid(account.steam_id);
let resp = self.client.query_status(req, self.tokens.access_token())?; let resp = self
.client
.query_status(req, self.tokens.access_token())
.unwrap();
Ok(resp.into_response_data()) Ok(resp.into_response_data())
} }
pub fn remove_authenticator(
&self,
revocation_code: Option<&String>,
) -> Result<(), RemoveAuthenticatorError> {
let Some(revocation_code) = revocation_code else {
return Err(RemoveAuthenticatorError::MissingRevocationCode);
};
if revocation_code.is_empty() {
return Err(RemoveAuthenticatorError::MissingRevocationCode);
}
let mut req = CTwoFactor_RemoveAuthenticator_Request::new();
req.set_revocation_code(revocation_code.clone());
let resp = self
.client
.remove_authenticator(req, self.tokens.access_token())?;
// returns EResult::TwoFactorCodeMismatch if the revocation code is incorrect
if resp.result != EResult::OK && resp.result != EResult::TwoFactorCodeMismatch {
return Err(resp.result.into());
}
let resp = resp.into_response_data();
if !resp.success() {
return Err(RemoveAuthenticatorError::IncorrectRevocationCode {
attempts_remaining: resp.revocation_attempts_remaining(),
});
}
Ok(())
}
/// Begin the process of "transfering" a mobile authenticator from a different device to this device.
///
/// "Transfering" does not actually literally transfer the secrets from one device to another. Instead, it generates a new set of secrets on this device, and invalidates the old secrets on the other device. Call [`Self::transfer_finish`] to complete the process.
pub fn transfer_start(&mut self) -> Result<(), TransferError> {
let req = CTwoFactor_RemoveAuthenticatorViaChallengeStart_Request::new();
let resp = self
.client
.remove_authenticator_via_challenge_start(req, self.tokens().access_token())?;
if resp.result != EResult::OK {
return Err(resp.result.into());
}
// the success field in the response is always None, so we can't check that
// it appears to not be used at all
Ok(())
}
/// Completes the process of "transfering" a mobile authenticator from a different device to this device.
pub fn transfer_finish(
&mut self,
sms_code: impl AsRef<str>,
) -> Result<SteamGuardAccount, TransferError> {
let access_token = self.tokens.access_token();
let steam_id = access_token
.decode()
.context("decoding access token")?
.steam_id();
let mut req = CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Request::new();
req.set_sms_code(sms_code.as_ref().to_owned());
req.set_generate_new_token(true);
let resp = self
.client
.remove_authenticator_via_challenge_continue(req, access_token)?;
if resp.result != EResult::OK {
return Err(resp.result.into());
}
let resp = resp.into_response_data();
let mut resp = resp.replacement_token.clone().unwrap();
let account = SteamGuardAccount {
account_name: resp.take_account_name(),
steam_id,
serial_number: resp.serial_number().to_string(),
revocation_code: resp.take_revocation_code().into(),
uri: resp.take_uri().into(),
shared_secret: TwoFactorSecret::from_bytes(resp.take_shared_secret()),
token_gid: resp.take_token_gid(),
identity_secret: base64::engine::general_purpose::STANDARD
.encode(resp.take_identity_secret())
.into(),
device_id: self.device_id.clone(),
secret_1: base64::engine::general_purpose::STANDARD
.encode(resp.take_secret_1())
.into(),
tokens: Some(self.tokens.clone()),
};
Ok(account)
}
} }
#[derive(Debug)] #[derive(Debug)]
@ -339,44 +253,3 @@ impl From<EResult> for FinalizeLinkError {
} }
} }
} }
#[derive(Debug, thiserror::Error)]
pub enum RemoveAuthenticatorError {
#[error("Missing revocation code")]
MissingRevocationCode,
#[error("Incorrect revocation code, {attempts_remaining} attempts remaining")]
IncorrectRevocationCode { attempts_remaining: u32 },
#[error("Transport error: {0}")]
TransportError(#[from] TransportError),
#[error("Steam returned an enexpected result: {0:?}")]
UnknownEResult(EResult),
#[error("Unexpected error: {0}")]
Unknown(#[from] anyhow::Error),
}
impl From<EResult> for RemoveAuthenticatorError {
fn from(e: EResult) -> Self {
Self::UnknownEResult(e)
}
}
#[derive(Error, Debug)]
pub enum TransferError {
#[error("Provided SMS code was incorrect.")]
BadSmsCode,
#[error("Failed to send request to Steam: {0:?}")]
Transport(#[from] crate::transport::TransportError),
#[error("Steam returned an unexpected error code: {0:?}")]
UnknownEResult(EResult),
#[error(transparent)]
Unknown(#[from] anyhow::Error),
}
impl From<EResult> for TransferError {
fn from(result: EResult) -> Self {
match result {
EResult::SMSCodeFailed => TransferError::BadSmsCode,
r => TransferError::UnknownEResult(r),
}
}
}

View file

@ -1,7 +1,6 @@
use serde::Deserialize; use serde::Deserialize;
#[derive(Debug, Clone, Deserialize)] #[derive(Debug, Clone, Deserialize)]
#[allow(dead_code)]
pub struct OAuthData { pub struct OAuthData {
pub oauth_token: String, pub oauth_token: String,
pub steamid: String, pub steamid: String,

View file

@ -3,3 +3,5 @@ mod login;
mod phone_ajax; mod phone_ajax;
pub use i_authentication_service::*; pub use i_authentication_service::*;
pub use login::*;
pub use phone_ajax::*;

View file

@ -82,7 +82,7 @@ where
cookies cookies
} }
pub fn get_confirmations(&self) -> Result<Vec<Confirmation>, ConfirmerError> { pub fn get_trade_confirmations(&self) -> Result<Vec<Confirmation>, ConfirmerError> {
let cookies = self.build_cookie_jar(); let cookies = self.build_cookie_jar();
let client = self.transport.innner_http_client()?; let client = self.transport.innner_http_client()?;
@ -367,27 +367,34 @@ impl Confirmation {
} }
} }
#[derive(Debug, Clone, Copy, PartialEq, Eq, Deserialize, num_enum::FromPrimitive)] #[derive(Debug, Clone, Copy, PartialEq, Eq, Deserialize)]
#[repr(u32)] #[repr(u32)]
#[serde(from = "u32")] #[serde(from = "u32")]
/// Source: https://github.com/SteamDatabase/SteamTracking/blob/6e7797e69b714c59f4b5784780b24753c17732ba/Structs/enums.steamd#L1607-L1616 /// Source: <https://github.com/SteamDatabase/SteamTracking/blob/6e7797e69b714c59f4b5784780b24753c17732ba/Structs/enums.steamd#L1607-L1616>
/// There are also some additional undocumented types.
pub enum ConfirmationType { pub enum ConfirmationType {
Test = 1, Test = 1,
/// Occurs when sending a trade offer or accepting a received trade offer, only when there is items on the user's side
Trade = 2, Trade = 2,
/// Occurs when selling an item on the Steam community market
MarketSell = 3, MarketSell = 3,
FeatureOptOut = 4, FeatureOptOut = 4,
/// Occurs when changing the phone number associated with the account
PhoneNumberChange = 5, PhoneNumberChange = 5,
AccountRecovery = 6, AccountRecovery = 6,
/// Occurs when a new web API key is created via https://steamcommunity.com/dev/apikey
ApiKeyCreation = 9,
#[num_enum(catch_all)]
Unknown(u32), Unknown(u32),
} }
impl From<u32> for ConfirmationType {
fn from(text: u32) -> Self {
match text {
1 => ConfirmationType::Test,
2 => ConfirmationType::Trade,
3 => ConfirmationType::MarketSell,
4 => ConfirmationType::FeatureOptOut,
5 => ConfirmationType::PhoneNumberChange,
6 => ConfirmationType::AccountRecovery,
v => ConfirmationType::Unknown(v),
}
}
}
#[derive(Debug, Deserialize)] #[derive(Debug, Deserialize)]
pub struct ConfirmationListResponse { pub struct ConfirmationListResponse {
pub success: bool, pub success: bool,

View file

@ -1,5 +1,6 @@
use crate::token::TwoFactorSecret; use crate::protobufs::service_twofactor::CTwoFactor_RemoveAuthenticator_Request;
use accountlinker::RemoveAuthenticatorError; use crate::steamapi::EResult;
use crate::{steamapi::twofactor::TwoFactorClient, token::TwoFactorSecret};
pub use accountlinker::{AccountLinkError, AccountLinker, FinalizeLinkError}; pub use accountlinker::{AccountLinkError, AccountLinker, FinalizeLinkError};
pub use confirmation::*; pub use confirmation::*;
pub use qrapprover::{QrApprover, QrApproverError}; pub use qrapprover::{QrApprover, QrApproverError};
@ -95,21 +96,58 @@ impl SteamGuardAccount {
/// Removes the mobile authenticator from the steam account. If this operation succeeds, this object can no longer be considered valid. /// Removes the mobile authenticator from the steam account. If this operation succeeds, this object can no longer be considered valid.
/// Returns whether or not the operation was successful. /// Returns whether or not the operation was successful.
/// pub fn remove_authenticator<T: Transport>(
/// A convenience method for [`AccountLinker::remove_authenticator`].
pub fn remove_authenticator(
&self, &self,
transport: impl Transport, client: &TwoFactorClient<T>,
revocation_code: Option<&String>, revocation_code: Option<&String>,
) -> Result<(), RemoveAuthenticatorError> { ) -> Result<(), RemoveAuthenticatorError> {
if revocation_code.is_none() && self.revocation_code.expose_secret().is_empty() {
return Err(RemoveAuthenticatorError::MissingRevocationCode);
}
let Some(tokens) = &self.tokens else { let Some(tokens) = &self.tokens else {
return Err(RemoveAuthenticatorError::TransportError( return Err(RemoveAuthenticatorError::TransportError(
TransportError::Unauthorized, TransportError::Unauthorized,
)); ));
}; };
let revocation_code = let mut req = CTwoFactor_RemoveAuthenticator_Request::new();
Some(revocation_code.unwrap_or_else(|| self.revocation_code.expose_secret())); req.set_revocation_code(
let linker = AccountLinker::new(transport, tokens.clone()); revocation_code
linker.remove_authenticator(revocation_code) .unwrap_or(self.revocation_code.expose_secret())
.to_owned(),
);
let resp = client.remove_authenticator(req, tokens.access_token())?;
// returns EResult::TwoFactorCodeMismatch if the revocation code is incorrect
if resp.result != EResult::OK && resp.result != EResult::TwoFactorCodeMismatch {
return Err(resp.result.into());
}
let resp = resp.into_response_data();
if !resp.success() {
return Err(RemoveAuthenticatorError::IncorrectRevocationCode {
attempts_remaining: resp.revocation_attempts_remaining(),
});
}
Ok(())
}
}
#[derive(Debug, thiserror::Error)]
pub enum RemoveAuthenticatorError {
#[error("Missing revocation code")]
MissingRevocationCode,
#[error("Incorrect revocation code, {attempts_remaining} attempts remaining")]
IncorrectRevocationCode { attempts_remaining: u32 },
#[error("Transport error: {0}")]
TransportError(#[from] TransportError),
#[error("Steam returned an enexpected result: {0:?}")]
UnknownEResult(EResult),
#[error("Unexpected error: {0}")]
Unknown(#[from] anyhow::Error),
}
impl From<EResult> for RemoveAuthenticatorError {
fn from(e: EResult) -> Self {
Self::UnknownEResult(e)
} }
} }

View file

@ -69,45 +69,6 @@ where
Ok(resp) Ok(resp)
} }
pub fn remove_authenticator_via_challenge_start(
&self,
req: CTwoFactor_RemoveAuthenticatorViaChallengeStart_Request,
access_token: &Jwt,
) -> Result<ApiResponse<CTwoFactor_RemoveAuthenticatorViaChallengeStart_Response>, TransportError>
{
let req = ApiRequest::new(SERVICE_NAME, "RemoveAuthenticatorViaChallengeStart", 1, req)
.with_access_token(access_token);
let resp = self
.transport
.send_request::<CTwoFactor_RemoveAuthenticatorViaChallengeStart_Request, CTwoFactor_RemoveAuthenticatorViaChallengeStart_Response>(
req,
)?;
Ok(resp)
}
pub fn remove_authenticator_via_challenge_continue(
&self,
req: CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Request,
access_token: &Jwt,
) -> Result<
ApiResponse<CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Response>,
TransportError,
> {
let req = ApiRequest::new(
SERVICE_NAME,
"RemoveAuthenticatorViaChallengeContinue",
1,
req,
)
.with_access_token(access_token);
let resp = self
.transport
.send_request::<CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Request, CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Response>(
req,
)?;
Ok(resp)
}
pub fn query_status( pub fn query_status(
&self, &self,
req: CTwoFactor_Status_Request, req: CTwoFactor_Status_Request,
@ -147,13 +108,5 @@ macro_rules! impl_buildable_req {
impl_buildable_req!(CTwoFactor_AddAuthenticator_Request, true); impl_buildable_req!(CTwoFactor_AddAuthenticator_Request, true);
impl_buildable_req!(CTwoFactor_FinalizeAddAuthenticator_Request, true); impl_buildable_req!(CTwoFactor_FinalizeAddAuthenticator_Request, true);
impl_buildable_req!(CTwoFactor_RemoveAuthenticator_Request, true); impl_buildable_req!(CTwoFactor_RemoveAuthenticator_Request, true);
impl_buildable_req!(
CTwoFactor_RemoveAuthenticatorViaChallengeStart_Request,
true
);
impl_buildable_req!(
CTwoFactor_RemoveAuthenticatorViaChallengeContinue_Request,
true
);
impl_buildable_req!(CTwoFactor_Status_Request, true); impl_buildable_req!(CTwoFactor_Status_Request, true);
impl_buildable_req!(CTwoFactor_Time_Request, false); impl_buildable_req!(CTwoFactor_Time_Request, false);