d796244fb1
WebKit was blocking the portal helper from being ported to Gtk4 together with other external tools. Now that WebKit6 is about to become stable, the port can go ahead. Part-of: <https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/2690>
366 lines
12 KiB
JavaScript
366 lines
12 KiB
JavaScript
/* exported main */
|
|
imports.gi.versions.Pango = '1.0';
|
|
imports.gi.versions.Gtk = '4.0';
|
|
imports.gi.versions.WebKit = '6.0';
|
|
|
|
const Gettext = imports.gettext;
|
|
const {Gio, GLib, GObject, Gtk, Pango, WebKit} = imports.gi;
|
|
|
|
const _ = Gettext.gettext;
|
|
|
|
const Config = imports.misc.config;
|
|
const {loadInterfaceXML} = imports.misc.fileUtils;
|
|
|
|
const PortalHelperResult = {
|
|
CANCELLED: 0,
|
|
COMPLETED: 1,
|
|
RECHECK: 2,
|
|
};
|
|
|
|
const PortalHelperSecurityLevel = {
|
|
NOT_YET_DETERMINED: 0,
|
|
SECURE: 1,
|
|
INSECURE: 2,
|
|
};
|
|
|
|
const HTTP_URI_FLAGS =
|
|
GLib.UriFlags.HAS_PASSWORD |
|
|
GLib.UriFlags.ENCODED_PATH |
|
|
GLib.UriFlags.ENCODED_QUERY |
|
|
GLib.UriFlags.ENCODED_FRAGMENT |
|
|
GLib.UriFlags.SCHEME_NORMALIZE |
|
|
GLib.UriFlags.PARSE_RELAXED;
|
|
|
|
const CONNECTIVITY_CHECK_HOST = 'nmcheck.gnome.org';
|
|
const CONNECTIVITY_CHECK_URI = `http://${CONNECTIVITY_CHECK_HOST}`;
|
|
const CONNECTIVITY_RECHECK_RATELIMIT_TIMEOUT = 30 * GLib.USEC_PER_SEC;
|
|
|
|
const HelperDBusInterface = loadInterfaceXML('org.gnome.Shell.PortalHelper');
|
|
|
|
var PortalHeaderBar = GObject.registerClass(
|
|
class PortalHeaderBar extends Gtk.HeaderBar {
|
|
_init() {
|
|
super._init();
|
|
|
|
// See ephy-title-box.c in epiphany for the layout
|
|
const vbox = new Gtk.Box({
|
|
orientation: Gtk.Orientation.VERTICAL,
|
|
valign: Gtk.Align.CENTER,
|
|
spacing: 0,
|
|
});
|
|
this.set_title_widget(vbox);
|
|
|
|
/* TRANSLATORS: this is the title of the wifi captive portal login window */
|
|
const titleLabel = new Gtk.Label({
|
|
label: _('Hotspot Login'),
|
|
wrap: false,
|
|
single_line_mode: true,
|
|
ellipsize: Pango.EllipsizeMode.END,
|
|
});
|
|
titleLabel.add_css_class('title');
|
|
vbox.append(titleLabel);
|
|
|
|
const hbox = new Gtk.Box({
|
|
orientation: Gtk.Orientation.HORIZONTAL,
|
|
spacing: 4,
|
|
halign: Gtk.Align.CENTER,
|
|
valign: Gtk.Align.BASELINE,
|
|
});
|
|
hbox.add_css_class('subtitle');
|
|
vbox.append(hbox);
|
|
|
|
this._lockImage = new Gtk.Image({
|
|
valign: Gtk.Align.BASELINE,
|
|
});
|
|
hbox.append(this._lockImage);
|
|
|
|
this.subtitleLabel = new Gtk.Label({
|
|
wrap: false,
|
|
single_line_mode: true,
|
|
ellipsize: Pango.EllipsizeMode.END,
|
|
valign: Gtk.Align.BASELINE,
|
|
selectable: true,
|
|
});
|
|
this.subtitleLabel.add_css_class('subtitle');
|
|
hbox.append(this.subtitleLabel);
|
|
}
|
|
|
|
setSubtitle(label) {
|
|
this.subtitleLabel.set_text(label);
|
|
}
|
|
|
|
setSecurityIcon(securityLevel) {
|
|
switch (securityLevel) {
|
|
case PortalHelperSecurityLevel.NOT_YET_DETERMINED:
|
|
this._lockImage.hide();
|
|
break;
|
|
case PortalHelperSecurityLevel.SECURE:
|
|
this._lockImage.show();
|
|
this._lockImage.set_from_icon_name('channel-secure-symbolic');
|
|
this._lockImage.set_tooltip_text(null);
|
|
break;
|
|
case PortalHelperSecurityLevel.INSECURE:
|
|
this._lockImage.show();
|
|
this._lockImage.set_from_icon_name('channel-insecure-symbolic');
|
|
this._lockImage.set_tooltip_text(_('Your connection to this hotspot login is not secure. Passwords or other information you enter on this page can be viewed by people nearby.'));
|
|
break;
|
|
}
|
|
}
|
|
});
|
|
|
|
var PortalWindow = GObject.registerClass(
|
|
class PortalWindow extends Gtk.ApplicationWindow {
|
|
_init(application, url, timestamp, doneCallback) {
|
|
super._init({application});
|
|
|
|
this._headerBar = new PortalHeaderBar();
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.NOT_YET_DETERMINED);
|
|
this.set_titlebar(this._headerBar);
|
|
|
|
if (!url) {
|
|
url = CONNECTIVITY_CHECK_URI;
|
|
this._originalUrlWasGnome = true;
|
|
} else {
|
|
this._originalUrlWasGnome = false;
|
|
}
|
|
this._uri = GLib.Uri.parse(url, HTTP_URI_FLAGS);
|
|
this._everSeenRedirect = false;
|
|
this._originalUrl = url;
|
|
this._doneCallback = doneCallback;
|
|
this._lastRecheck = 0;
|
|
this._recheckAtExit = false;
|
|
|
|
this._networkSession = WebKit.NetworkSession.new_ephemeral();
|
|
this._networkSession.set_proxy_settings(WebKit.NetworkProxyMode.NO_PROXY, null);
|
|
|
|
this._webContext = new WebKit.WebContext();
|
|
this._webContext.set_cache_model(WebKit.CacheModel.DOCUMENT_VIEWER);
|
|
|
|
this._webView = new WebKit.WebView({
|
|
networkSession: this._networkSession,
|
|
webContext: this._webContext,
|
|
});
|
|
this._webView.connect('decide-policy', this._onDecidePolicy.bind(this));
|
|
this._webView.connect('load-changed', this._onLoadChanged.bind(this));
|
|
this._webView.connect('insecure-content-detected', this._onInsecureContentDetected.bind(this));
|
|
this._webView.connect('load-failed-with-tls-errors', this._onLoadFailedWithTlsErrors.bind(this));
|
|
this._webView.load_uri(url);
|
|
this._webView.connect('notify::uri', this._syncUri.bind(this));
|
|
this._syncUri();
|
|
|
|
this.set_child(this._webView);
|
|
this.set_size_request(600, 450);
|
|
this.maximize();
|
|
this.present_with_time(timestamp);
|
|
|
|
this.application.set_accels_for_action('app.quit', ['<Primary>q', '<Primary>w']);
|
|
}
|
|
|
|
_syncUri() {
|
|
let uri = this._webView.uri;
|
|
if (uri)
|
|
this._headerBar.setSubtitle(GLib.uri_unescape_string(uri, null));
|
|
else
|
|
this._headerBar.setSubtitle('');
|
|
}
|
|
|
|
refresh() {
|
|
this._everSeenRedirect = false;
|
|
this._webView.load_uri(this._originalUrl);
|
|
}
|
|
|
|
vfunc_close_request() {
|
|
if (this._recheckAtExit)
|
|
this._doneCallback(PortalHelperResult.RECHECK);
|
|
else
|
|
this._doneCallback(PortalHelperResult.CANCELLED);
|
|
return false;
|
|
}
|
|
|
|
_onLoadChanged(view, loadEvent) {
|
|
if (loadEvent === WebKit.LoadEvent.STARTED) {
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.NOT_YET_DETERMINED);
|
|
} else if (loadEvent === WebKit.LoadEvent.COMMITTED) {
|
|
let tlsInfo = this._webView.get_tls_info();
|
|
let ret = tlsInfo[0];
|
|
let flags = tlsInfo[2];
|
|
if (ret && flags === 0)
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.SECURE);
|
|
else
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.INSECURE);
|
|
}
|
|
}
|
|
|
|
_onInsecureContentDetected() {
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.INSECURE);
|
|
}
|
|
|
|
_onLoadFailedWithTlsErrors(view, failingURI, certificate, _errors) {
|
|
this._headerBar.setSecurityIcon(PortalHelperSecurityLevel.INSECURE);
|
|
let uri = GLib.Uri.parse(failingURI, HTTP_URI_FLAGS);
|
|
this._webContext.allow_tls_certificate_for_host(certificate, uri.get_host());
|
|
this._webView.load_uri(failingURI);
|
|
return true;
|
|
}
|
|
|
|
_onDecidePolicy(view, decision, type) {
|
|
if (type === WebKit.PolicyDecisionType.RESPONSE)
|
|
return false;
|
|
|
|
const navigationAction = decision.get_navigation_action();
|
|
const request = navigationAction.get_request();
|
|
|
|
if (type === WebKit.PolicyDecisionType.NEW_WINDOW_ACTION) {
|
|
if (navigationAction.is_user_gesture()) {
|
|
// Even though the portal asks for a new window,
|
|
// perform the navigation in the current one. Some
|
|
// portals open a window as their last login step and
|
|
// ignoring that window causes them to not let the
|
|
// user go through. We don't risk popups taking over
|
|
// the page because we check that the navigation is
|
|
// user initiated.
|
|
this._webView.load_request(request);
|
|
}
|
|
|
|
decision.ignore();
|
|
return true;
|
|
}
|
|
|
|
const uri = GLib.Uri.parse(request.get_uri(), HTTP_URI_FLAGS);
|
|
|
|
if (uri.get_host() !== this._uri.get_host() && this._originalUrlWasGnome) {
|
|
if (uri.get_host() === CONNECTIVITY_CHECK_HOST && this._everSeenRedirect) {
|
|
// Yay, we got to gnome!
|
|
decision.ignore();
|
|
this._doneCallback(PortalHelperResult.COMPLETED);
|
|
return true;
|
|
} else if (uri.get_host() !== CONNECTIVITY_CHECK_HOST) {
|
|
this._everSeenRedirect = true;
|
|
}
|
|
}
|
|
|
|
// We *may* have finished here, but we don't know for
|
|
// sure. Tell gnome-shell to run another connectivity check
|
|
// (but ratelimit the checks, we don't want to spam
|
|
// nmcheck.gnome.org for portals that have 10 or more internal
|
|
// redirects - and unfortunately they exist)
|
|
// If we hit the rate limit, we also queue a recheck
|
|
// when the window is closed, just in case we miss the
|
|
// final check and don't realize we're connected
|
|
// This should not be a problem in the cancelled logic,
|
|
// because if the user doesn't want to start the login,
|
|
// we should not see any redirect at all, outside this._uri
|
|
|
|
let now = GLib.get_monotonic_time();
|
|
let shouldRecheck = (now - this._lastRecheck) >
|
|
CONNECTIVITY_RECHECK_RATELIMIT_TIMEOUT;
|
|
|
|
if (shouldRecheck) {
|
|
this._lastRecheck = now;
|
|
this._recheckAtExit = false;
|
|
this._doneCallback(PortalHelperResult.RECHECK);
|
|
} else {
|
|
this._recheckAtExit = true;
|
|
}
|
|
|
|
// Update the URI, in case of chained redirects, so we still
|
|
// think we're doing the login until gnome-shell kills us
|
|
this._uri = uri;
|
|
|
|
decision.use();
|
|
return true;
|
|
}
|
|
});
|
|
|
|
var WebPortalHelper = GObject.registerClass(
|
|
class WebPortalHelper extends Gtk.Application {
|
|
_init() {
|
|
super._init({
|
|
application_id: 'org.gnome.Shell.PortalHelper',
|
|
flags: Gio.ApplicationFlags.IS_SERVICE,
|
|
inactivity_timeout: 30000,
|
|
});
|
|
|
|
this._dbusImpl = Gio.DBusExportedObject.wrapJSObject(HelperDBusInterface, this);
|
|
this._queue = [];
|
|
|
|
let action = new Gio.SimpleAction({name: 'quit'});
|
|
action.connect('activate', () => this.active_window.destroy());
|
|
this.add_action(action);
|
|
}
|
|
|
|
vfunc_dbus_register(connection, path) {
|
|
this._dbusImpl.export(connection, path);
|
|
super.vfunc_dbus_register(connection, path);
|
|
return true;
|
|
}
|
|
|
|
vfunc_dbus_unregister(connection, path) {
|
|
this._dbusImpl.unexport_from_connection(connection);
|
|
super.vfunc_dbus_unregister(connection, path);
|
|
}
|
|
|
|
vfunc_activate() {
|
|
// If launched manually (for example for testing), force a dummy authentication
|
|
// session with the default url
|
|
this.Authenticate('/org/gnome/dummy', '', 0);
|
|
}
|
|
|
|
Authenticate(connection, url, timestamp) {
|
|
this._queue.push({connection, url, timestamp});
|
|
|
|
this._processQueue();
|
|
}
|
|
|
|
Close(connection) {
|
|
for (let i = 0; i < this._queue.length; i++) {
|
|
let obj = this._queue[i];
|
|
|
|
if (obj.connection === connection) {
|
|
if (obj.window)
|
|
obj.window.destroy();
|
|
this._queue.splice(i, 1);
|
|
break;
|
|
}
|
|
}
|
|
|
|
this._processQueue();
|
|
}
|
|
|
|
Refresh(connection) {
|
|
for (let i = 0; i < this._queue.length; i++) {
|
|
let obj = this._queue[i];
|
|
|
|
if (obj.connection === connection) {
|
|
if (obj.window)
|
|
obj.window.refresh();
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
_processQueue() {
|
|
if (this._queue.length === 0)
|
|
return;
|
|
|
|
let top = this._queue[0];
|
|
if (top.window != null)
|
|
return;
|
|
|
|
top.window = new PortalWindow(this, top.url, top.timestamp, result => {
|
|
this._dbusImpl.emit_signal('Done', new GLib.Variant('(ou)', [top.connection, result]));
|
|
});
|
|
}
|
|
});
|
|
|
|
/**
|
|
* @param {string[]} argv - command line arguments
|
|
*/
|
|
function main(argv) {
|
|
Gettext.bindtextdomain(Config.GETTEXT_PACKAGE, Config.LOCALEDIR);
|
|
Gettext.textdomain(Config.GETTEXT_PACKAGE);
|
|
|
|
let app = new WebPortalHelper();
|
|
return app.run(argv);
|
|
}
|