diff --git a/src/client.rs b/src/client.rs index df4f635..fad981e 100644 --- a/src/client.rs +++ b/src/client.rs @@ -7,11 +7,12 @@ use libflate::gzip; use once_cell::sync::Lazy; use percent_encoding::{percent_encode, CONTROLS}; use serde_json::Value; -use std::sync::RwLock; +use std::sync::Arc; use std::{io, result::Result}; +use tokio::sync::RwLock; use crate::dbg_msg; -use crate::oauth::{Oauth, USER_AGENT}; +use crate::oauth::Oauth; use crate::server::RequestExt; const REDDIT_URL_BASE: &str = "https://oauth.reddit.com"; @@ -21,7 +22,7 @@ pub(crate) static CLIENT: Lazy>> = Lazy::ne client::Client::builder().build(https) }); -pub(crate) static OAUTH_CLIENT: Lazy> = Lazy::new(|| RwLock::new(Oauth::new())); +pub(crate) static OAUTH_CLIENT: Lazy>> = Lazy::new(|| Arc::new(RwLock::new(Oauth::new()))); /// Gets the canonical path for a resource on Reddit. This is accomplished by /// making a `HEAD` request to Reddit at the path given in `path`. @@ -135,12 +136,14 @@ fn request(method: &'static Method, path: String, redirect: bool, quarantine: bo // Construct the hyper client from the HTTPS connector. let client: client::Client<_, hyper::Body> = CLIENT.clone(); - let (token, vendor_id, device_id) = { - let client = OAUTH_CLIENT.read().unwrap(); + let (token, vendor_id, device_id, user_agent, loid) = { + let client = OAUTH_CLIENT.blocking_read(); ( client.token.clone(), client.headers_map.get("Client-Vendor-Id").unwrap().clone(), client.headers_map.get("X-Reddit-Device-Id").unwrap().clone(), + client.headers_map.get("User-Agent").unwrap().clone(), + client.headers_map.get("x-reddit-loid").unwrap().clone(), ) }; // Build request to Reddit. When making a GET, request gzip compression. @@ -148,9 +151,10 @@ fn request(method: &'static Method, path: String, redirect: bool, quarantine: bo let builder = Request::builder() .method(method) .uri(&url) - .header("User-Agent", USER_AGENT) + .header("User-Agent", user_agent) .header("Client-Vendor-Id", vendor_id) .header("X-Reddit-Device-Id", device_id) + .header("x-reddit-loid", loid) .header("Host", "oauth.reddit.com") .header("Authorization", &format!("Bearer {}", token)) .header("Accept-Encoding", if method == Method::GET { "gzip" } else { "identity" }) diff --git a/src/main.rs b/src/main.rs index 671117d..6662e45 100644 --- a/src/main.rs +++ b/src/main.rs @@ -26,8 +26,6 @@ use once_cell::sync::Lazy; use server::RequestExt; use utils::{error, redirect, ThemeAssets}; -use crate::client::OAUTH_CLIENT; - mod server; // Create Services @@ -111,6 +109,12 @@ async fn style() -> Result, String> { #[tokio::main] async fn main() { + // Load environment variables + dotenvy::dotenv().unwrap(); + + // Initialize logger + pretty_env_logger::init(); + let matches = Command::new("Libreddit") .version(env!("CARGO_PKG_VERSION")) .about("Private front-end for Reddit written in Rust ") @@ -170,10 +174,8 @@ async fn main() { Lazy::force(&config::CONFIG); Lazy::force(&instance_info::INSTANCE_INFO); - // Force login of Oauth client - #[allow(clippy::await_holding_lock)] - // We don't care if we are awaiting a lock here - it's just locked once at init. - OAUTH_CLIENT.write().unwrap().login().await; + // Initialize OAuth client spoofing + oauth::initialize().await; // Define default headers (added to all responses) app.default_headers = headers! { diff --git a/src/oauth.rs b/src/oauth.rs index bdc44cd..ef5be7e 100644 --- a/src/oauth.rs +++ b/src/oauth.rs @@ -1,53 +1,194 @@ -use std::collections::HashMap; +use std::{collections::HashMap, time::Duration}; -use crate::client::CLIENT; +use crate::client::{CLIENT, OAUTH_CLIENT}; use base64::{engine::general_purpose, Engine as _}; use hyper::{client, Body, Method, Request}; +use log::info; use serde_json::json; static REDDIT_ANDROID_OAUTH_CLIENT_ID: &str = "ohXpoqrZYub1kg"; +static REDDIT_IOS_OAUTH_CLIENT_ID: &str = "LNDo9k1o8UAEUw"; static AUTH_ENDPOINT: &str = "https://accounts.reddit.com"; -pub(crate) static USER_AGENT: &str = "Reddit/Version 2023.21.0/Build 956283/Android 13"; + +// Various Android user agents - build numbers from valid APK variants +pub(crate) static ANDROID_USER_AGENT: [&str; 3] = [ + "Reddit/Version 2023.21.0/Build 956283/Android 13", + "Reddit/Version 2023.21.0/Build 968223/Android 10", + "Reddit/Version 2023.21.0/Build 946732/Android 12", +]; + +// Various iOS user agents - iOS versions. +pub(crate) static IOS_USER_AGENT: [&str; 3] = [ + "Reddit/Version 2023.22.0/Build 613580/iOS Version 17.0 (Build 21A5248V)", + "Reddit/Version 2023.22.0/Build 613580/iOS Version 16.0 (Build 20A5328h)", + "Reddit/Version 2023.22.0/Build 613580/iOS Version 16.5", +]; +// Various iOS device codes. iPhone 11 displays as `iPhone12,1` +// This is a bit of a hack, but I just changed the number a few times +pub(crate) static IOS_DEVICES: [&str; 5] = ["iPhone8,1", "iPhone11,1", "iPhone12,1", "iPhone13,1", "iPhone14,1"]; pub(crate) struct Oauth { // Currently unused, may be necessary if we decide to support GQL in the future pub(crate) headers_map: HashMap, pub(crate) token: String, + expires_in: u64, + device: Device, } impl Oauth { - pub fn new() -> Self { - let uuid = uuid::Uuid::new_v4().to_string(); + pub(crate) fn new() -> Self { + // Generate a random device to spoof + let device = Device::random(); + let headers = device.headers.clone(); + // For now, just insert headers - no token request Oauth { - headers_map: HashMap::from([ - ("Client-Vendor-Id".into(), uuid.clone()), - ("X-Reddit-Device-Id".into(), uuid), - ("User-Agent".into(), USER_AGENT.to_string()), - ]), + headers_map: headers, token: String::new(), + expires_in: 0, + device, } } - pub async fn login(&mut self) -> Option<()> { + async fn login(&mut self) -> Option<()> { + // Construct URL for OAuth token let url = format!("{}/api/access_token", AUTH_ENDPOINT); let mut builder = Request::builder().method(Method::POST).uri(&url); - for (key, value) in self.headers_map.iter() { - builder = builder.header(key, value); - } - let auth = general_purpose::STANDARD.encode(format!("{REDDIT_ANDROID_OAUTH_CLIENT_ID}:")); + // Add headers from spoofed client + for (key, value) in self.headers_map.iter() { + // Skip Authorization header - won't be present in `Device` struct + // and will only be there in subsequent token refreshes. + // Sending a bearer auth token when requesting one is a bad idea + // Normally, you'd want to send it along to authenticate a refreshed token, + // but neither Android nor iOS does this - it just requests a new token. + // We try to match behavior as closely as possible. + if key != "Authorization" { + builder = builder.header(key, value); + } + } + // Set up HTTP Basic Auth - basically just the const OAuth ID's with no password, + // Base64-encoded. https://en.wikipedia.org/wiki/Basic_access_authentication + // This could be constant, but I don't think it's worth it. OAuth ID's can change + // over time and we want to be flexible. + let auth = general_purpose::STANDARD.encode(format!("{}:", self.device.oauth_id)); builder = builder.header("Authorization", format!("Basic {auth}")); + + // Set JSON body. I couldn't tell you what this means. But that's what the client sends let json = json!({ "scopes": ["*","email","pii"] }); let body = Body::from(json.to_string()); + + // Build request let request = builder.body(body).unwrap(); + info!("Request: {request:?}"); + + // Send request let client: client::Client<_, hyper::Body> = CLIENT.clone(); let resp = client.request(request).await.ok()?; + + // Parse headers - loid header _should_ be saved sent on subsequent token refreshes. + // Technically it's not needed, but it's easy for Reddit API to check for this. + // It's some kind of header that uniquely identifies the device. + if let Some(header) = resp.headers().get("x-reddit-loid") { + self.headers_map.insert("x-reddit-loid".to_owned(), header.to_str().ok()?.to_string()); + } + + info!("OAuth response: {resp:?}"); + // Serialize response let body_bytes = hyper::body::to_bytes(resp.into_body()).await.ok()?; let json: serde_json::Value = serde_json::from_slice(&body_bytes).ok()?; + + // Save token and expiry self.token = json.get("access_token")?.as_str()?.to_string(); + self.expires_in = json.get("expires_in")?.as_u64()?; self.headers_map.insert("Authorization".to_owned(), format!("Bearer {}", self.token)); + + info!("Retrieved token {}, expires in {}", self.token, self.expires_in); + Some(()) } + + async fn refresh(&mut self) -> Option<()> { + // Refresh is actually just a subsequent login with the same headers (without the old token + // or anything). This logic is handled in login, so we just call login again. + let refresh = self.login().await; + info!("Refreshing OAuth token... {}", if refresh.is_some() { "success" } else { "failed" }); + refresh + } +} +// Initialize the OAuth client and launch a thread to monitor subsequent token refreshes. +pub(crate) async fn initialize() { + // Initial login + OAUTH_CLIENT.write().await.login().await.unwrap(); + // Spawn token daemon in background - we want the initial login to be blocked upon, but the + // daemon to be launched in the background. + // Initial login blocks libreddit start-up because we _need_ the oauth token. + tokio::spawn(token_daemon()); +} +async fn token_daemon() { + // Monitor for refreshing token + loop { + // Get expiry time - be sure to not hold the read lock + let expires_in = OAUTH_CLIENT.read().await.expires_in; + + // sleep for the expiry time minus 2 minutes + let duration = Duration::from_secs(expires_in - 120); + tokio::time::sleep(duration).await; + + info!("[{duration:?} ELAPSED] Refreshing OAuth token..."); + + // Refresh token - in its own scope + { + let mut client = OAUTH_CLIENT.write().await; + client.refresh().await; + } + } +} +#[derive(Debug)] +struct Device { + oauth_id: String, + headers: HashMap, +} + +impl Device { + fn android() -> Self { + let uuid = uuid::Uuid::new_v4().to_string(); + let android_user_agent = ANDROID_USER_AGENT[fastrand::usize(..ANDROID_USER_AGENT.len())].to_string(); + let headers = HashMap::from([ + ("Client-Vendor-Id".into(), uuid.clone()), + ("X-Reddit-Device-Id".into(), uuid.clone()), + ("User-Agent".into(), android_user_agent), + ]); + info!("Spoofing Android client with headers: {headers:?}, uuid: \"{uuid}\", and OAuth ID \"{REDDIT_ANDROID_OAUTH_CLIENT_ID}\""); + Device { + oauth_id: REDDIT_ANDROID_OAUTH_CLIENT_ID.to_string(), + headers, + } + } + fn ios() -> Self { + let uuid = uuid::Uuid::new_v4().to_string(); + let ios_user_agent = IOS_USER_AGENT[fastrand::usize(..IOS_USER_AGENT.len())].to_string(); + let ios_device = IOS_DEVICES[fastrand::usize(..IOS_DEVICES.len())].to_string(); + let headers = HashMap::from([ + ("X-Reddit-DPR".into(), "2".into()), + ("Device-Name".into(), ios_device.clone()), + ("X-Reddit-Device-Id".into(), uuid.clone()), + ("User-Agent".into(), ios_user_agent), + ("Client-Vendor-Id".into(), uuid.clone()), + ]); + info!("Spoofing iOS client {ios_device} with headers: {headers:?}, uuid: \"{uuid}\", and OAuth ID \"{REDDIT_IOS_OAUTH_CLIENT_ID}\""); + Device { + oauth_id: REDDIT_IOS_OAUTH_CLIENT_ID.to_string(), + headers, + } + } + // Randomly choose a device + fn random() -> Self { + if fastrand::bool() { + Device::android() + } else { + Device::ios() + } + } }