X-Git-Url: https://code.communitydata.science/nu-vpn-proxy.git/blobdiff_plain/66438abc7cf5d17c1093610266fcc9b8319cd9d6..25c91f73ec0279a15a614846476a1de0dfacb619:/gp-saml-gui.py?ds=inline diff --git a/gp-saml-gui.py b/gp-saml-gui.py index 09f0faa..d6f8f15 100755 --- a/gp-saml-gui.py +++ b/gp-saml-gui.py @@ -1,6 +1,15 @@ #!/usr/bin/env python3 -import gi +try: + import gi +except ImportError: + try: + import pgi as gi + except ImportError: + gi = None +if gi is None: + raise ImportError("Either gi (PyGObject) or pgi module is required.") + import argparse import pprint import urllib @@ -143,7 +152,9 @@ def parse_args(args = None): g.add_argument('-c','--cert', help='PEM file containing client certificate (and optionally private key)') g.add_argument('--key', help='PEM file containing client private key (if not included in same file as certificate)') g = p.add_argument_group('Debugging and advanced options') - g.add_argument('-v','--verbose', default=0, action='count') + x = p.add_mutually_exclusive_group() + x.add_argument('-v','--verbose', default=1, action='count', help='Increase verbosity of explanatory output to stderr') + x.add_argument('-q','--quiet', dest='verbose', action='store_const', const=0, help='Reduce verbosity to a minimum') g.add_argument('-x','--external', action='store_true', help='Launch external browser (for debugging)') g.add_argument('-u','--uri', action='store_true', help='Treat server as the complete URI of the SAML entry point, rather than GlobalProtect server') g.add_argument('--clientos', choices=set(pf2clientos.values()), default=default_clientos, help="clientos value to send (default is %(default)s)") @@ -255,20 +266,20 @@ if __name__ == "__main__": if args.verbose: # Warn about ambiguities if server != args.server and not args.uri: - print('''IMPORTANT: During the SAML auth, you were redirected from {} to {1}. This probably ''' + print('''IMPORTANT: During the SAML auth, you were redirected from {0} to {1}. This probably ''' '''means you should specify {1} as the server for final connection, but we're not 100% ''' '''sure about this. You should probably try both.\n'''.format(args.server, server), file=stderr) if ifh != args.interface and not args.uri: print('''IMPORTANT: We started with SAML auth to the {} interface, but received a cookie ''' - '''that's associated with the {} interface. You should probably try both.\n'''.format(args.interface, ifh), + '''that's often associated with the {} interface. You should probably try both.\n'''.format(args.interface, ifh), file=stderr) print('''\nSAML response converted to OpenConnect command line invocation:\n''', file=stderr) print(''' echo {} |\n openconnect --protocol=gp --user={} --os={} --usergroup={}:{} --passwd-on-stdin {}'''.format( - quote(cv), quote(un), quote(args.ocos), quote(ifh), quote(cn), quote(server)), file=stderr) + quote(cv), quote(un), quote(args.ocos), quote(args.interface), quote(cn), quote(server)), file=stderr) print('''\nSAML response converted to test-globalprotect-login.py invocation:\n''', file=stderr) print(''' test-globalprotect-login.py --user={} --clientos={} -p '' \\\n https://{}/{} {}={}\n'''.format( - quote(un), quote(args.clientos), quote(server), quote(if2auth[ifh]), quote(cn), quote(cv)), file=stderr) + quote(un), quote(args.clientos), quote(server), quote(if2auth[args.interface]), quote(cn), quote(cv)), file=stderr) varvals = { 'HOST': quote('https://%s/%s:%s' % (server, if2auth[args.interface], cn)), 'USER': quote(un), 'COOKIE': quote(cv), 'OS': quote(args.ocos),