events.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. package qr
  2. import (
  3. "crypto/rand"
  4. "crypto/rsa"
  5. "crypto/sha256"
  6. "crypto/x509"
  7. "encoding/base64"
  8. "encoding/json"
  9. "errors"
  10. "strings"
  11. "time"
  12. "github.com/ayn2op/discordo/internal/http"
  13. "github.com/ayn2op/tview"
  14. "github.com/diamondburned/arikawa/v3/utils/httputil"
  15. "github.com/gdamore/tcell/v3"
  16. "github.com/gorilla/websocket"
  17. "github.com/skip2/go-qrcode"
  18. )
  19. type TokenEvent struct {
  20. tcell.EventTime
  21. Token string
  22. }
  23. func newTokenEvent(token string) *TokenEvent {
  24. event := &TokenEvent{Token: token}
  25. event.SetEventNow()
  26. return event
  27. }
  28. const remoteAuthGatewayURL = "wss://remote-auth-gateway.discord.gg/?v=2"
  29. type connCreateEvent struct {
  30. tcell.EventTime
  31. conn *websocket.Conn
  32. }
  33. func newConnCreateEvent(conn *websocket.Conn) *connCreateEvent {
  34. event := &connCreateEvent{conn: conn}
  35. event.SetEventNow()
  36. return event
  37. }
  38. type connCloseEvent struct{ tcell.EventTime }
  39. func newConnCloseEvent() *connCloseEvent {
  40. event := &connCloseEvent{}
  41. event.SetEventNow()
  42. return event
  43. }
  44. func (m *Model) connect() tview.Command {
  45. return tview.EventCommand(func() tcell.Event {
  46. headers := http.Headers()
  47. headers.Set("User-Agent", http.BrowserUserAgent)
  48. conn, _, err := websocket.DefaultDialer.Dial(remoteAuthGatewayURL, headers)
  49. if err != nil {
  50. return tcell.NewEventError(err)
  51. }
  52. return newConnCreateEvent(conn)
  53. })
  54. }
  55. func (m *Model) close() tview.Command {
  56. return tview.EventCommand(func() tcell.Event {
  57. if m.conn != nil {
  58. if err := m.conn.Close(); err != nil {
  59. return tcell.NewEventError(err)
  60. }
  61. }
  62. return newConnCloseEvent()
  63. })
  64. }
  65. type helloEvent struct {
  66. tcell.EventTime
  67. heartbeatInterval int
  68. timeoutMS int
  69. }
  70. func newHelloEvent(heartbeatInterval, timeoutMS int) *helloEvent {
  71. event := &helloEvent{heartbeatInterval: heartbeatInterval, timeoutMS: timeoutMS}
  72. event.SetEventNow()
  73. return event
  74. }
  75. type nonceProofEvent struct {
  76. tcell.EventTime
  77. encryptedNonce string
  78. }
  79. func newNonceProofEvent(encryptedNonce string) *nonceProofEvent {
  80. event := &nonceProofEvent{encryptedNonce: encryptedNonce}
  81. event.SetEventNow()
  82. return event
  83. }
  84. type pendingRemoteInitEvent struct {
  85. tcell.EventTime
  86. fingerprint string
  87. }
  88. func newPendingRemoteInitEvent(fingerprint string) *pendingRemoteInitEvent {
  89. event := &pendingRemoteInitEvent{fingerprint: fingerprint}
  90. event.SetEventNow()
  91. return event
  92. }
  93. type pendingTicketEvent struct {
  94. tcell.EventTime
  95. encryptedUserPayload string
  96. }
  97. func newPendingTicketEvent(encryptedUserPayload string) *pendingTicketEvent {
  98. event := &pendingTicketEvent{encryptedUserPayload: encryptedUserPayload}
  99. event.SetEventNow()
  100. return event
  101. }
  102. type pendingLoginEvent struct {
  103. tcell.EventTime
  104. ticket string
  105. }
  106. func newPendingLoginEvent(ticket string) *pendingLoginEvent {
  107. event := &pendingLoginEvent{ticket: ticket}
  108. event.SetEventNow()
  109. return event
  110. }
  111. type cancelEvent struct{ tcell.EventTime }
  112. func newCancelEvent() *cancelEvent {
  113. event := &cancelEvent{}
  114. event.SetEventNow()
  115. return event
  116. }
  117. func (m *Model) listen() tview.Command {
  118. return tview.EventCommand(func() tcell.Event {
  119. if m.conn == nil {
  120. return nil
  121. }
  122. _, data, err := m.conn.ReadMessage()
  123. if err != nil {
  124. return tcell.NewEventError(err)
  125. }
  126. var payload struct {
  127. Op string `json:"op"`
  128. }
  129. if err := json.Unmarshal(data, &payload); err != nil {
  130. return tcell.NewEventError(err)
  131. }
  132. switch payload.Op {
  133. case "hello":
  134. var payload struct {
  135. HeartbeatInterval int `json:"heartbeat_interval"`
  136. TimeoutMS int `json:"timeout_ms"`
  137. }
  138. if err := json.Unmarshal(data, &payload); err != nil {
  139. return tcell.NewEventError(err)
  140. }
  141. return newHelloEvent(payload.HeartbeatInterval, payload.TimeoutMS)
  142. case "nonce_proof":
  143. var payload struct {
  144. EncryptedNonce string `json:"encrypted_nonce"`
  145. }
  146. if err := json.Unmarshal(data, &payload); err != nil {
  147. return tcell.NewEventError(err)
  148. }
  149. return newNonceProofEvent(payload.EncryptedNonce)
  150. case "pending_remote_init":
  151. var payload struct {
  152. Fingerprint string `json:"fingerprint"`
  153. }
  154. if err := json.Unmarshal(data, &payload); err != nil {
  155. return tcell.NewEventError(err)
  156. }
  157. return newPendingRemoteInitEvent(payload.Fingerprint)
  158. case "pending_ticket":
  159. var payload struct {
  160. EncryptedUserPayload string `json:"encrypted_user_payload"`
  161. }
  162. if err := json.Unmarshal(data, &payload); err != nil {
  163. return tcell.NewEventError(err)
  164. }
  165. return newPendingTicketEvent(payload.EncryptedUserPayload)
  166. case "cancel":
  167. return newCancelEvent()
  168. case "pending_login":
  169. var payload struct {
  170. Ticket string `json:"ticket"`
  171. }
  172. if err := json.Unmarshal(data, &payload); err != nil {
  173. return tcell.NewEventError(err)
  174. }
  175. return newPendingLoginEvent(payload.Ticket)
  176. default:
  177. return nil
  178. }
  179. })
  180. }
  181. type heartbeatTickEvent struct{ tcell.EventTime }
  182. func newHeartbeatTickEvent() *heartbeatTickEvent {
  183. event := &heartbeatTickEvent{}
  184. event.SetEventNow()
  185. return event
  186. }
  187. func (m *Model) heartbeat() tview.Command {
  188. return tview.EventCommand(func() tcell.Event {
  189. time.Sleep(m.heartbeatInterval)
  190. return newHeartbeatTickEvent()
  191. })
  192. }
  193. func (m *Model) sendHeartbeat() tview.Command {
  194. return tview.EventCommand(func() tcell.Event {
  195. if m.conn == nil {
  196. return nil
  197. }
  198. data := struct {
  199. Op string `json:"op"`
  200. }{"heartbeat"}
  201. if err := m.conn.WriteJSON(data); err != nil {
  202. return tcell.NewEventError(err)
  203. }
  204. return nil
  205. })
  206. }
  207. type privateKeyEvent struct {
  208. tcell.EventTime
  209. privateKey *rsa.PrivateKey
  210. }
  211. func newPrivateKeyEvent(privateKey *rsa.PrivateKey) *privateKeyEvent {
  212. event := &privateKeyEvent{privateKey: privateKey}
  213. event.SetEventNow()
  214. return event
  215. }
  216. func (m *Model) generatePrivateKey() tview.Command {
  217. return tview.EventCommand(func() tcell.Event {
  218. privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
  219. if err != nil {
  220. return tcell.NewEventError(err)
  221. }
  222. return newPrivateKeyEvent(privateKey)
  223. })
  224. }
  225. func (m *Model) sendInit() tview.Command {
  226. return tview.EventCommand(func() tcell.Event {
  227. if m.privateKey == nil {
  228. return tcell.NewEventError(errors.New("missing private key"))
  229. }
  230. spki, err := x509.MarshalPKIXPublicKey(m.privateKey.Public())
  231. if err != nil {
  232. return tcell.NewEventError(err)
  233. }
  234. encodedPublicKey := base64.StdEncoding.EncodeToString(spki)
  235. data := struct {
  236. Op string `json:"op"`
  237. EncodedPublicKey string `json:"encoded_public_key"`
  238. }{"init", encodedPublicKey}
  239. if err := m.conn.WriteJSON(data); err != nil {
  240. return tcell.NewEventError(err)
  241. }
  242. return nil
  243. })
  244. }
  245. func (m *Model) sendNonceProof(encryptedNonce string) tview.Command {
  246. return tview.EventCommand(func() tcell.Event {
  247. decodedNonce, err := base64.StdEncoding.DecodeString(encryptedNonce)
  248. if err != nil {
  249. return tcell.NewEventError(err)
  250. }
  251. decryptedNonce, err := rsa.DecryptOAEP(sha256.New(), nil, m.privateKey, decodedNonce, nil)
  252. if err != nil {
  253. return tcell.NewEventError(err)
  254. }
  255. encodedNonce := base64.RawURLEncoding.EncodeToString(decryptedNonce)
  256. data := struct {
  257. Op string `json:"op"`
  258. Nonce string `json:"nonce"`
  259. }{"nonce_proof", encodedNonce}
  260. if err := m.conn.WriteJSON(data); err != nil {
  261. return tcell.NewEventError(err)
  262. }
  263. return nil
  264. })
  265. }
  266. type qrCodeEvent struct {
  267. tcell.EventTime
  268. qrCode *qrcode.QRCode
  269. }
  270. func newQRCodeEvent(qrCode *qrcode.QRCode) *qrCodeEvent {
  271. event := &qrCodeEvent{qrCode: qrCode}
  272. event.SetEventNow()
  273. return event
  274. }
  275. func (m *Model) generateQRCode(fingerprint string) tview.Command {
  276. return tview.EventCommand(func() tcell.Event {
  277. content := "https://discord.com/ra/" + fingerprint
  278. qrCode, err := qrcode.New(content, qrcode.Low)
  279. if err != nil {
  280. return tcell.NewEventError(err)
  281. }
  282. qrCode.DisableBorder = true
  283. return newQRCodeEvent(qrCode)
  284. })
  285. }
  286. type userEvent struct {
  287. tcell.EventTime
  288. discriminator string
  289. username string
  290. }
  291. func newUserEvent(discriminator, username string) *userEvent {
  292. event := &userEvent{discriminator: discriminator, username: username}
  293. event.SetEventNow()
  294. return event
  295. }
  296. func (m *Model) decryptUserPayload(encryptedPayload string) tview.Command {
  297. return tview.EventCommand(func() tcell.Event {
  298. decodedPayload, err := base64.StdEncoding.DecodeString(encryptedPayload)
  299. if err != nil {
  300. return tcell.NewEventError(err)
  301. }
  302. decryptedPayload, err := rsa.DecryptOAEP(sha256.New(), nil, m.privateKey, decodedPayload, nil)
  303. if err != nil {
  304. return tcell.NewEventError(err)
  305. }
  306. parts := strings.Split(string(decryptedPayload), ":")
  307. if len(parts) != 4 {
  308. return tcell.NewEventError(errors.New("invalid user payload"))
  309. }
  310. return newUserEvent(parts[1], parts[3])
  311. })
  312. }
  313. func (m *Model) exchangeTicket(ticket string) tview.Command {
  314. return tview.EventCommand(func() tcell.Event {
  315. headers := http.Headers()
  316. headers.Set("Referer", "https://discord.com/login")
  317. if m.fingerprint != "" {
  318. headers.Set("X-Fingerprint", m.fingerprint)
  319. }
  320. client := http.NewClient("")
  321. client.OnRequest = append(client.OnRequest, httputil.WithHeaders(headers))
  322. encryptedToken, err := client.ExchangeRemoteAuthTicket(ticket)
  323. if err != nil {
  324. return tcell.NewEventError(err)
  325. }
  326. decodedToken, err := base64.StdEncoding.DecodeString(encryptedToken)
  327. if err != nil {
  328. return tcell.NewEventError(err)
  329. }
  330. decryptedToken, err := rsa.DecryptOAEP(sha256.New(), nil, m.privateKey, decodedToken, nil)
  331. if err != nil {
  332. return tcell.NewEventError(err)
  333. }
  334. return newTokenEvent(string(decryptedToken))
  335. })
  336. }