update.c 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. #include "update.h"
  2. #include <stdlib.h>
  3. #include <lib/toolbox/args.h>
  4. #include "../../../types/token_info.h"
  5. #include "../../../services/config/config.h"
  6. #include "../../../services/convert/convert.h"
  7. #include "../../cli_helpers.h"
  8. #include "../../../ui/scene_director.h"
  9. #include "../../common_command_arguments.h"
  10. #define TOTP_CLI_COMMAND_UPDATE_ARG_SECRET_PREFIX "-s"
  11. struct TotpUpdateContext {
  12. FuriString* args;
  13. Cli* cli;
  14. uint8_t* iv;
  15. uint8_t crypto_version;
  16. uint8_t crypto_key_slot;
  17. };
  18. enum TotpIteratorUpdateTokenResultsEx {
  19. TotpIteratorUpdateTokenResultInvalidSecret = 1,
  20. TotpIteratorUpdateTokenResultCancelled = 2,
  21. TotpIteratorUpdateTokenResultInvalidArguments = 3
  22. };
  23. static bool totp_cli_try_read_name(
  24. TokenInfo* token_info,
  25. const FuriString* arg,
  26. FuriString* args,
  27. bool* parsed) {
  28. if(furi_string_cmpi_str(arg, TOTP_CLI_COMMAND_ARG_NAME_PREFIX) == 0) {
  29. if(!args_read_probably_quoted_string_and_trim(args, token_info->name) ||
  30. furi_string_empty(token_info->name)) {
  31. totp_cli_printf_missed_argument_value(TOTP_CLI_COMMAND_ARG_NAME_PREFIX);
  32. } else {
  33. *parsed = true;
  34. }
  35. return true;
  36. }
  37. return false;
  38. }
  39. static bool totp_cli_try_read_change_secret_flag(const FuriString* arg, bool* parsed, bool* flag) {
  40. if(furi_string_cmpi_str(arg, TOTP_CLI_COMMAND_UPDATE_ARG_SECRET_PREFIX) == 0) {
  41. *flag = true;
  42. *parsed = true;
  43. return true;
  44. }
  45. return false;
  46. }
  47. static TotpIteratorUpdateTokenResult
  48. update_token_handler(TokenInfo* token_info, const void* context) {
  49. const struct TotpUpdateContext* context_t = context;
  50. // Read optional arguments
  51. FuriString* temp_str = furi_string_alloc();
  52. bool mask_user_input = true;
  53. bool update_token_secret = false;
  54. PlainTokenSecretEncoding token_secret_encoding = PlainTokenSecretEncodingBase32;
  55. while(args_read_string_and_trim(context_t->args, temp_str)) {
  56. bool parsed = false;
  57. if(!totp_cli_try_read_name(token_info, temp_str, context_t->args, &parsed) &&
  58. !totp_cli_try_read_algo(token_info, temp_str, context_t->args, &parsed) &&
  59. !totp_cli_try_read_digits(token_info, temp_str, context_t->args, &parsed) &&
  60. !totp_cli_try_read_duration(token_info, temp_str, context_t->args, &parsed) &&
  61. !totp_cli_try_read_unsecure_flag(temp_str, &parsed, &mask_user_input) &&
  62. !totp_cli_try_read_change_secret_flag(temp_str, &parsed, &update_token_secret) &&
  63. !totp_cli_try_read_automation_features(token_info, temp_str, context_t->args, &parsed) &&
  64. !totp_cli_try_read_plain_token_secret_encoding(
  65. temp_str, context_t->args, &parsed, &token_secret_encoding)) {
  66. totp_cli_printf_unknown_argument(temp_str);
  67. }
  68. if(!parsed) {
  69. furi_string_free(temp_str);
  70. return TotpIteratorUpdateTokenResultInvalidArguments;
  71. }
  72. }
  73. if(update_token_secret) {
  74. // Reading token secret
  75. furi_string_reset(temp_str);
  76. TOTP_CLI_PRINTF("Enter token secret and confirm with [ENTER]\r\n");
  77. bool token_secret_read = totp_cli_read_line(context_t->cli, temp_str, mask_user_input);
  78. totp_cli_delete_last_line();
  79. if(!token_secret_read) {
  80. furi_string_secure_free(temp_str);
  81. return TotpIteratorUpdateTokenResultCancelled;
  82. }
  83. if(!token_info_set_secret(
  84. token_info,
  85. furi_string_get_cstr(temp_str),
  86. furi_string_size(temp_str),
  87. token_secret_encoding,
  88. context_t->iv,
  89. context_t->crypto_version,
  90. context_t->crypto_key_slot)) {
  91. furi_string_secure_free(temp_str);
  92. return TotpIteratorUpdateTokenResultInvalidSecret;
  93. }
  94. }
  95. furi_string_secure_free(temp_str);
  96. return TotpIteratorUpdateTokenResultSuccess;
  97. }
  98. void totp_cli_command_update_docopt_commands() {
  99. TOTP_CLI_PRINTF(" " TOTP_CLI_COMMAND_UPDATE " Update existing token\r\n");
  100. }
  101. void totp_cli_command_update_docopt_usage() {
  102. TOTP_CLI_PRINTF(
  103. " " TOTP_CLI_COMMAND_NAME
  104. " " DOCOPT_REQUIRED(TOTP_CLI_COMMAND_UPDATE) " " DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_INDEX) " " DOCOPT_OPTIONAL(DOCOPT_OPTION(TOTP_CLI_COMMAND_ARG_ALGO_PREFIX, DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_ALGO))) " " DOCOPT_OPTIONAL(DOCOPT_OPTION(TOTP_CLI_COMMAND_ARG_SECRET_ENCODING_PREFIX, DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_SECRET_ENCODING))) " " DOCOPT_OPTIONAL(DOCOPT_OPTION(TOTP_CLI_COMMAND_ARG_NAME_PREFIX, DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_NAME))) " " DOCOPT_OPTIONAL(
  105. DOCOPT_OPTION(
  106. TOTP_CLI_COMMAND_ARG_DIGITS_PREFIX,
  107. DOCOPT_ARGUMENT(
  108. TOTP_CLI_COMMAND_ARG_DIGITS))) " " DOCOPT_OPTIONAL(DOCOPT_OPTION(TOTP_CLI_COMMAND_ARG_DURATION_PREFIX, DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_DURATION))) " " DOCOPT_OPTIONAL(DOCOPT_SWITCH(TOTP_CLI_COMMAND_ARG_UNSECURE_PREFIX)) " " DOCOPT_OPTIONAL(DOCOPT_SWITCH(TOTP_CLI_COMMAND_UPDATE_ARG_SECRET_PREFIX)) " " DOCOPT_MULTIPLE(DOCOPT_OPTIONAL(DOCOPT_OPTION(TOTP_CLI_COMMAND_ARG_AUTOMATION_FEATURE_PREFIX, DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_AUTOMATION_FEATURE)))) "\r\n");
  109. }
  110. void totp_cli_command_update_docopt_options() {
  111. TOTP_CLI_PRINTF(" " DOCOPT_OPTION(
  112. TOTP_CLI_COMMAND_ARG_NAME_PREFIX,
  113. DOCOPT_ARGUMENT(TOTP_CLI_COMMAND_ARG_NAME)) " Token name\r\n");
  114. TOTP_CLI_PRINTF(" " DOCOPT_SWITCH(
  115. TOTP_CLI_COMMAND_UPDATE_ARG_SECRET_PREFIX) " Update token secret\r\n");
  116. }
  117. void totp_cli_command_update_handle(PluginState* plugin_state, FuriString* args, Cli* cli) {
  118. if(!totp_cli_ensure_authenticated(plugin_state, cli)) {
  119. return;
  120. }
  121. TokenInfoIteratorContext* iterator_context =
  122. totp_config_get_token_iterator_context(plugin_state);
  123. int token_number;
  124. if(!args_read_int_and_trim(args, &token_number) || token_number <= 0 ||
  125. (size_t)token_number > totp_token_info_iterator_get_total_count(iterator_context)) {
  126. totp_cli_print_invalid_arguments();
  127. return;
  128. }
  129. TOTP_CLI_LOCK_UI(plugin_state);
  130. size_t previous_index = totp_token_info_iterator_get_current_token_index(iterator_context);
  131. totp_token_info_iterator_go_to(iterator_context, token_number - 1);
  132. struct TotpUpdateContext update_context = {
  133. .args = args,
  134. .cli = cli,
  135. .iv = &plugin_state->iv[0],
  136. .crypto_version = plugin_state->crypto_version,
  137. .crypto_key_slot = plugin_state->crypto_key_slot};
  138. TotpIteratorUpdateTokenResult update_result = totp_token_info_iterator_update_current_token(
  139. iterator_context, &update_token_handler, &update_context);
  140. if(update_result == TotpIteratorUpdateTokenResultSuccess) {
  141. TOTP_CLI_PRINTF_SUCCESS(
  142. "Token \"%s\" has been successfully updated\r\n",
  143. furi_string_get_cstr(
  144. totp_token_info_iterator_get_current_token(iterator_context)->name));
  145. } else if(update_result == TotpIteratorUpdateTokenResultInvalidArguments) {
  146. totp_cli_print_invalid_arguments();
  147. } else if(update_result == TotpIteratorUpdateTokenResultCancelled) {
  148. TOTP_CLI_PRINTF_INFO("Cancelled by user\r\n");
  149. } else if(update_result == TotpIteratorUpdateTokenResultInvalidSecret) {
  150. TOTP_CLI_PRINTF_ERROR("Token secret seems to be invalid and can not be parsed\r\n");
  151. } else if(update_result == TotpIteratorUpdateTokenResultFileUpdateFailed) {
  152. totp_cli_print_error_updating_config_file();
  153. }
  154. totp_token_info_iterator_go_to(iterator_context, previous_index);
  155. TOTP_CLI_UNLOCK_UI(plugin_state);
  156. }