4 Commits

10 changed files with 91 additions and 48 deletions

View File

@ -1,6 +1,6 @@
{ {
"name": "creddy", "name": "creddy",
"version": "0.3.0", "version": "0.3.1",
"scripts": { "scripts": {
"dev": "vite", "dev": "vite",
"build": "vite build", "build": "vite build",

2
src-tauri/Cargo.lock generated
View File

@ -1040,7 +1040,7 @@ dependencies = [
[[package]] [[package]]
name = "creddy" name = "creddy"
version = "0.2.3" version = "0.3.1"
dependencies = [ dependencies = [
"argon2", "argon2",
"auto-launch", "auto-launch",

View File

@ -1,6 +1,6 @@
[package] [package]
name = "creddy" name = "creddy"
version = "0.3.0" version = "0.3.1"
description = "A friendly AWS credentials manager" description = "A friendly AWS credentials manager"
authors = ["Joseph Montanaro"] authors = ["Joseph Montanaro"]
license = "" license = ""

View File

@ -98,7 +98,7 @@ pub fn exec(args: &ArgMatches) -> Result<(), CliError> {
let name: OsString = cmd_name.into(); let name: OsString = cmd_name.into();
Err(ExecError::NotFound(name).into()) Err(ExecError::NotFound(name).into())
} }
e => Err(ExecError::ExecutionFailed(e).into()), _ => Err(ExecError::ExecutionFailed(e).into()),
} }
} }

View File

@ -116,6 +116,8 @@ pub enum SendResponseError {
NotFound, NotFound,
#[error("The specified request was already closed by the client")] #[error("The specified request was already closed by the client")]
Abandoned, Abandoned,
#[error("A response has already been received for the specified request")]
Fulfilled,
#[error("Could not renew AWS sesssion: {0}")] #[error("Could not renew AWS sesssion: {0}")]
SessionRenew(#[from] GetSessionError), SessionRenew(#[from] GetSessionError),
} }

View File

@ -10,7 +10,7 @@ use tokio::net::{
TcpStream, TcpStream,
}; };
use tokio::io::{AsyncReadExt, AsyncWriteExt}; use tokio::io::{AsyncReadExt, AsyncWriteExt};
use tokio::sync::oneshot; use tokio::sync::oneshot::{self, Sender, Receiver};
use tokio::time::sleep; use tokio::time::sleep;
use tauri::{AppHandle, Manager}; use tauri::{AppHandle, Manager};
@ -23,24 +23,55 @@ use crate::ipc::{Request, Approval};
use crate::state::AppState; use crate::state::AppState;
#[derive(Debug)]
pub struct RequestWaiter {
pub rehide_after: bool,
pub sender: Option<Sender<Approval>>,
}
impl RequestWaiter {
pub fn notify(&mut self, approval: Approval) -> Result<(), SendResponseError> {
let chan = self.sender
.take()
.ok_or(SendResponseError::Fulfilled)?;
chan.send(approval)
.map_err(|_| SendResponseError::Abandoned)
}
}
struct Handler { struct Handler {
request_id: u64, request_id: u64,
stream: TcpStream, stream: TcpStream,
receiver: Option<oneshot::Receiver<Approval>>, rehide_after: bool,
receiver: Option<Receiver<Approval>>,
app: AppHandle, app: AppHandle,
} }
impl Handler { impl Handler {
async fn new(stream: TcpStream, app: AppHandle) -> Self { async fn new(stream: TcpStream, app: AppHandle) -> Result<Self, HandlerError> {
let state = app.state::<AppState>(); let state = app.state::<AppState>();
// determine whether we should re-hide the window after handling this request
let is_currently_visible = app.get_window("main")
.ok_or(HandlerError::NoMainWindow)?
.is_visible()?;
let rehide_after = state.current_rehide_status()
.await
.unwrap_or(!is_currently_visible);
let (chan_send, chan_recv) = oneshot::channel(); let (chan_send, chan_recv) = oneshot::channel();
let request_id = state.register_request(chan_send).await; let waiter = RequestWaiter {rehide_after, sender: Some(chan_send)};
Handler { let request_id = state.register_request(waiter).await;
let handler = Handler {
request_id, request_id,
stream, stream,
rehide_after,
receiver: Some(chan_recv), receiver: Some(chan_recv),
app app
} };
Ok(handler)
} }
async fn handle(mut self) { async fn handle(mut self) {
@ -62,7 +93,7 @@ impl Handler {
let req = Request {id: self.request_id, clients, base}; let req = Request {id: self.request_id, clients, base};
self.app.emit_all("credentials-request", &req)?; self.app.emit_all("credentials-request", &req)?;
let starting_visibility = self.show_window()?; self.show_window()?;
match self.wait_for_response().await? { match self.wait_for_response().await? {
Approval::Approved => { Approval::Approved => {
@ -94,9 +125,11 @@ impl Handler {
}; };
sleep(delay).await; sleep(delay).await;
if !starting_visibility && state.req_count().await == 0 { if self.rehide_after && state.req_count().await == 1 {
let window = self.app.get_window("main").ok_or(HandlerError::NoMainWindow)?; self.app
window.hide()?; .get_window("main")
.ok_or(HandlerError::NoMainWindow)?
.hide()?;
} }
Ok(()) Ok(())
@ -143,15 +176,14 @@ impl Handler {
false false
} }
fn show_window(&self) -> Result<bool, HandlerError> { fn show_window(&self) -> Result<(), HandlerError> {
let window = self.app.get_window("main").ok_or(HandlerError::NoMainWindow)?; let window = self.app.get_window("main").ok_or(HandlerError::NoMainWindow)?;
let starting_visibility = window.is_visible()?; if !window.is_visible()? {
if !starting_visibility {
window.unminimize()?; window.unminimize()?;
window.show()?; window.show()?;
} }
window.set_focus()?; window.set_focus()?;
Ok(starting_visibility) Ok(())
} }
async fn wait_for_response(&mut self) -> Result<Approval, HandlerError> { async fn wait_for_response(&mut self) -> Result<Approval, HandlerError> {
@ -231,12 +263,12 @@ impl Server {
loop { loop {
match listener.accept().await { match listener.accept().await {
Ok((stream, _)) => { Ok((stream, _)) => {
let handler = Handler::new(stream, app_handle.app_handle()).await; match Handler::new(stream, app_handle.app_handle()).await {
rt::spawn(handler.handle()); Ok(handler) => { rt::spawn(handler.handle()); }
Err(e) => { eprintln!("Error handling request: {e}"); }
}
}, },
Err(e) => { Err(e) => { eprintln!("Error accepting connection: {e}"); }
eprintln!("Error accepting connection: {e}");
}
} }
} }
} }

View File

@ -2,7 +2,6 @@ use std::collections::{HashMap, HashSet};
use std::time::Duration; use std::time::Duration;
use tokio::{ use tokio::{
sync::oneshot::Sender,
sync::RwLock, sync::RwLock,
time::sleep, time::sleep,
}; };
@ -20,7 +19,7 @@ use crate::{config, config::AppConfig};
use crate::ipc::{self, Approval}; use crate::ipc::{self, Approval};
use crate::clientinfo::Client; use crate::clientinfo::Client;
use crate::errors::*; use crate::errors::*;
use crate::server::Server; use crate::server::{Server, RequestWaiter};
#[derive(Debug)] #[derive(Debug)]
@ -28,7 +27,7 @@ pub struct AppState {
pub config: RwLock<AppConfig>, pub config: RwLock<AppConfig>,
pub session: RwLock<Session>, pub session: RwLock<Session>,
pub request_count: RwLock<u64>, pub request_count: RwLock<u64>,
pub open_requests: RwLock<HashMap<u64, Sender<ipc::Approval>>>, pub waiting_requests: RwLock<HashMap<u64, RequestWaiter>>,
pub pending_terminal_request: RwLock<bool>, pub pending_terminal_request: RwLock<bool>,
pub bans: RwLock<std::collections::HashSet<Option<Client>>>, pub bans: RwLock<std::collections::HashSet<Option<Client>>>,
server: RwLock<Server>, server: RwLock<Server>,
@ -41,7 +40,7 @@ impl AppState {
config: RwLock::new(config), config: RwLock::new(config),
session: RwLock::new(session), session: RwLock::new(session),
request_count: RwLock::new(0), request_count: RwLock::new(0),
open_requests: RwLock::new(HashMap::new()), waiting_requests: RwLock::new(HashMap::new()),
pending_terminal_request: RwLock::new(false), pending_terminal_request: RwLock::new(false),
bans: RwLock::new(HashSet::new()), bans: RwLock::new(HashSet::new()),
server: RwLock::new(server), server: RwLock::new(server),
@ -84,26 +83,33 @@ impl AppState {
Ok(()) Ok(())
} }
pub async fn register_request(&self, chan: Sender<ipc::Approval>) -> u64 { pub async fn register_request(&self, waiter: RequestWaiter) -> u64 {
let count = { let count = {
let mut c = self.request_count.write().await; let mut c = self.request_count.write().await;
*c += 1; *c += 1;
c c
}; };
let mut open_requests = self.open_requests.write().await; let mut waiting_requests = self.waiting_requests.write().await;
open_requests.insert(*count, chan); // `count` is the request id waiting_requests.insert(*count, waiter); // `count` is the request id
*count *count
} }
pub async fn unregister_request(&self, id: u64) { pub async fn unregister_request(&self, id: u64) {
let mut open_requests = self.open_requests.write().await; let mut waiting_requests = self.waiting_requests.write().await;
open_requests.remove(&id); waiting_requests.remove(&id);
} }
pub async fn req_count(&self) -> usize { pub async fn req_count(&self) -> usize {
let open_requests = self.open_requests.read().await; let waiting_requests = self.waiting_requests.read().await;
open_requests.len() waiting_requests.len()
}
pub async fn current_rehide_status(&self) -> Option<bool> {
// since all requests that are pending at a given time should have the same
// value for rehide_after, it doesn't matter which one we use
let waiting_requests = self.waiting_requests.read().await;
waiting_requests.iter().next().map(|(_id, w)| w.rehide_after)
} }
pub async fn send_response(&self, response: ipc::RequestResponse) -> Result<(), SendResponseError> { pub async fn send_response(&self, response: ipc::RequestResponse) -> Result<(), SendResponseError> {
@ -112,14 +118,11 @@ impl AppState {
session.renew_if_expired().await?; session.renew_if_expired().await?;
} }
let mut open_requests = self.open_requests.write().await; let mut waiting_requests = self.waiting_requests.write().await;
let chan = open_requests waiting_requests
.remove(&response.id) .get_mut(&response.id)
.ok_or(SendResponseError::NotFound) .ok_or(SendResponseError::NotFound)?
?; .notify(response.approval)
chan.send(response.approval)
.map_err(|_e| SendResponseError::Abandoned)
} }
pub async fn add_ban(&self, client: Option<Client>) { pub async fn add_ban(&self, client: Option<Client>) {

View File

@ -8,7 +8,7 @@
}, },
"package": { "package": {
"productName": "creddy", "productName": "creddy",
"version": "0.3.0" "version": "0.3.1"
}, },
"tauri": { "tauri": {
"allowlist": { "allowlist": {

View File

@ -7,6 +7,7 @@
const id = Math.random().toString().slice(2); const id = Math.random().toString().slice(2);
const dispatch = createEventDispatcher(); const dispatch = createEventDispatcher();
const modifierKeys = new Set(['Alt', 'AltGraph', 'Control', 'Fn', 'FnLock', 'Meta', 'Shift', 'Super', ]);
let listening = false; let listening = false;
function listen() { function listen() {
@ -20,12 +21,15 @@
} }
function setKeybind(event) { function setKeybind(event) {
console.log(event); // separate events fire for modifier keys, even when they are combined with a regular key
if (modifierKeys.has(event.key)) return;
let keys = []; let keys = [];
if (event.ctrlKey) keys.push('ctrl'); if (event.ctrlKey) keys.push('Ctrl');
if (event.altKey) keys.push('alt'); if (event.altKey) keys.push('Alt');
if (event.metaKey) keys.push('meta'); if (event.metaKey) keys.push('Meta');
if (event.shiftKey) keys.push('shift'); if (event.shiftKey) keys.push('Shift');
// capitalize
keys.push(event.key); keys.push(event.key);
value.keys = keys.join('+'); value.keys = keys.join('+');

View File

@ -6,6 +6,7 @@
* Additional hotkey configuration (approve/deny at the very least) * Additional hotkey configuration (approve/deny at the very least)
* Logging * Logging
* Icon * Icon
* Auto-updates
* SSH key handling * SSH key handling
## Maybe ## Maybe
@ -14,3 +15,4 @@
* Rehide after terminal launch from locked * Rehide after terminal launch from locked
* Generalize Request across both credentials and terminal launch? * Generalize Request across both credentials and terminal launch?
* Make hotkey configuration a little more tolerant of slight mistiming * Make hotkey configuration a little more tolerant of slight mistiming
* Distinguish between request that was denied and request that was canceled (e.g. due to error)