X-Git-Url: https://code.communitydata.science/nu-vpn-proxy.git/blobdiff_plain/6bbbe479043b1a5d5f75a7c6bbc88eada5ccd126..575dc5e17681890b6e7879e8fb330f5fa1b996c7:/gp-saml-gui.py?ds=inline diff --git a/gp-saml-gui.py b/gp-saml-gui.py index 4029a09..d6f8f15 100755 --- a/gp-saml-gui.py +++ b/gp-saml-gui.py @@ -1,6 +1,15 @@ #!/usr/bin/env python3 -import gi +try: + import gi +except ImportError: + try: + import pgi as gi + except ImportError: + gi = None +if gi is None: + raise ImportError("Either gi (PyGObject) or pgi module is required.") + import argparse import pprint import urllib @@ -122,8 +131,9 @@ class SAMLLoginView: Gtk.main_quit() def parse_args(args = None): - clientos_map = dict(linux='Linux', darwin='Mac', win32='Windows', cygwin='Windows') - default_clientos = clientos_map.get(platform, 'Windows') + pf2clientos = dict(linux='Linux', darwin='Mac', win32='Windows', cygwin='Windows') + clientos2ocos = dict(Linux='linux-64', Mac='mac-intel', Windows='win') + default_clientos = pf2clientos.get(platform, 'Windows') p = argparse.ArgumentParser() p.add_argument('server', help='GlobalProtect server (portal or gateway)') @@ -142,13 +152,16 @@ def parse_args(args = None): g.add_argument('-c','--cert', help='PEM file containing client certificate (and optionally private key)') g.add_argument('--key', help='PEM file containing client private key (if not included in same file as certificate)') g = p.add_argument_group('Debugging and advanced options') - g.add_argument('-v','--verbose', default=0, action='count') + x = p.add_mutually_exclusive_group() + x.add_argument('-v','--verbose', default=1, action='count', help='Increase verbosity of explanatory output to stderr') + x.add_argument('-q','--quiet', dest='verbose', action='store_const', const=0, help='Reduce verbosity to a minimum') g.add_argument('-x','--external', action='store_true', help='Launch external browser (for debugging)') g.add_argument('-u','--uri', action='store_true', help='Treat server as the complete URI of the SAML entry point, rather than GlobalProtect server') - g.add_argument('--clientos', choices=set(clientos_map.values()), default=default_clientos, help="clientos value to send (default is %(default)s)") + g.add_argument('--clientos', choices=set(pf2clientos.values()), default=default_clientos, help="clientos value to send (default is %(default)s)") p.add_argument('extra', nargs='*', help='Extra form field(s) to pass to include in the login query string (e.g. "magic-cookie-value=deadbeef01234567")') args = p.parse_args(args = None) + args.ocos = clientos2ocos[args.clientos] args.extra = dict(x.split('=', 1) for x in args.extra) if args.cookies: @@ -253,22 +266,22 @@ if __name__ == "__main__": if args.verbose: # Warn about ambiguities if server != args.server and not args.uri: - print('''IMPORTANT: During the SAML auth, you were redirected from {} to {1}. This probably ''' + print('''IMPORTANT: During the SAML auth, you were redirected from {0} to {1}. This probably ''' '''means you should specify {1} as the server for final connection, but we're not 100% ''' '''sure about this. You should probably try both.\n'''.format(args.server, server), file=stderr) if ifh != args.interface and not args.uri: print('''IMPORTANT: We started with SAML auth to the {} interface, but received a cookie ''' - '''that's associated with the {} interface. You should probably try both.\n'''.format(args.interface, ifh), + '''that's often associated with the {} interface. You should probably try both.\n'''.format(args.interface, ifh), file=stderr) print('''\nSAML response converted to OpenConnect command line invocation:\n''', file=stderr) - print(''' echo {} |\n openconnect --protocol=gp --user={} --usergroup={}:{} --passwd-on-stdin {}'''.format( - quote(cv), quote(un), quote(ifh), quote(cn), quote(server)), file=stderr) + print(''' echo {} |\n openconnect --protocol=gp --user={} --os={} --usergroup={}:{} --passwd-on-stdin {}'''.format( + quote(cv), quote(un), quote(args.ocos), quote(args.interface), quote(cn), quote(server)), file=stderr) print('''\nSAML response converted to test-globalprotect-login.py invocation:\n''', file=stderr) - print(''' test-globalprotect-login.py --user={} -p '' \\\n https://{}/{} {}={}\n'''.format( - quote(un), quote(server), quote(if2auth[ifh]), quote(cn), quote(cv)), file=stderr) + print(''' test-globalprotect-login.py --user={} --clientos={} -p '' \\\n https://{}/{} {}={}\n'''.format( + quote(un), quote(args.clientos), quote(server), quote(if2auth[args.interface]), quote(cn), quote(cv)), file=stderr) varvals = { - 'HOST': quote('https://%s/%s:%s' % (server, if2auth[ifh], cn)), - 'USER': quote(un), 'COOKIE': quote(cv), + 'HOST': quote('https://%s/%s:%s' % (server, if2auth[args.interface], cn)), + 'USER': quote(un), 'COOKIE': quote(cv), 'OS': quote(args.ocos), } print('\n'.join('%s=%s' % pair for pair in varvals.items()))