A package to interact with the PC Bio Unlock credentials module.
Project description
py-pcbu
This library automates interactions with PC Bio Unlock by implementing its protocol.
[!CAUTION] PCBU and this library handles your accounts passwords. This project's license includes a NO-LIABILITY disclaimer that I won't repeat here. Please handle your account passwords responsibly! And always inspect projects that handle such sensitive data, even if they're FOSS.
Installation
pip install py-pcbu
and if you plan on using the CLI, you also need to install the cli extra:
pip install py-pcbu[cli]
Usage
Pairing
- First, install PC Bio Unlock normally. Currently, versions >2.0.0 are supported, probably lower versions too.
- In the desktop app, click on
Pair device. Go through the wizard steps, until you reach the QR Code. - Get the JSON string out of the QR Code. On Android, I can only recommend using the FOSS app https://gitlab.com/Atharok/BarcodeScanner
Then we need to run the pair client using py-pcbu:
Option 1: py-pcbu as CLI
With a conf.local.json file similar to the conf.template.json, one can directly call:
python -m pcbu pair-client
Option 2: py-pcbu as library
Write a TCPPairClient as follows:
from pcbu.tcp.pair_client import TCPPairClient
from pcbu.models import PairingQRData
pairing_data = PairingQRData.from_json(your_qr_json_string_here)
client = TCPPairClient(pairing_qr_data=pairing_data, device_name="My unlock program")
await pair_response = client.pair()
print(pair_response)
This snippet prints in plaintext the payload received from the desktop. It contains sensitive informations such as your account password! So make sure to store it somewhere safe.
Unlocking
Option 1: py-pcbu as CLI
With a conf.local.json file similar to the conf.template.json, one can directly call:
python -m pcbu unlock-server
Option 2 py-pcbu as library
py-pcbu gives a simple TCPUnlockServer to run out of the box. It will automatically unlock any authenticated request matching a stored pairing_id:
from pcbu.models import PCPairing, PCPairingSecret
from pcbu.tcp.unlock_server import TCPUnlockServer
pairings_dicts = [
{
"server_ip_address": "192.168.1.Y",
"server_port": 43296,
"pairing_id": "abcdef",
"desktop_ip_address": "192.168.1.Y",
"encryption_key": "some_super_long_key",
"username": "user1@desktop",
"password": "pwd1"
},
{
"server_ip_address": "192.168.1.Y",
"server_port": 43297,
"pairing_id": "ghijk",
"desktop_ip_address": "192.168.2.Z",
"encryption_key": "another_super_long_key",
"username": "user2@desktop",
"password": "pwd2"
}
]
pc_pairings = [PCPairingSecret.from_dict(d) for d in pairing_dicts]
async with TCPUnlockServer(pc_pairings) as server:
await server.start()
This snippet will start a TCPUnlockServer listening on each of the server_ip_address:server_port from the PCPairingSecret list (i.e. on both ports 43296 and 43297).
When the server receives an unlocking request, it will validate that the requesting's ip address matches one of the PCPairingSecret instances, decrypt the unlock request, and call the callback method TCPUnlockServerBase.on_valid_unlock_request which automatically accepts the unlocking request in this TCPUnlockServer implementation.
For more advanced use cases, one can also extend TCPUnlockServerBase from pcbu.tcp.unlock_server. The following methods can be overriden to react to events on the unlock server:
on_enter(self): called when the server's context is entered.on_start(self): called upon starting the server.on_valid_unlock_request(self, pairing: PCPairing): called when an unlock request has been authenticated and matches one of the registered PC pairings. The match is passed to the method. The basicTCPUnlockServerimplementation directly callsself.unlock(pairing)in this method, but one can add other checks or defer the unlocking to a later time.on_invalid_unlock_request(self, ip: str): called when an unlock request could not be authenticated or matched against the registerd pairings. The requesting ip address is passed.on_exit(self): called when the server's context is exited, but just before exiting the individual TCP servers.
Development
For easier development, we include several VSCode launch configuration to allow easier debugging:
Pair Server: runs thepair-serverCLI command. Emulates a pairing server (i.e. emulates the desktop's PCBU app showing you the QR Code). Automatically binds to the host's ip address, ignoring the.confone.Pair Client: runs thepair-clientCLI command. Expects a pairing server to be up, and initiates the pairing process.Unlock Server: runs theunlock-serverCLI command. Waits for unlock requests. Automatically binds to the host's ip address, ignoring the.confone.
All commands expect a gitignored conf.local.json file at the root of the repository. You can cp conf.template.json conf.local.json to get a base file to start from. Some conf options can be overwritten via CLI options, see
python -m pcbu --help
for more info.
TODOs
- Rewrite
TCPPairServerwithasyncio - Rewrite
TCPPairClientwithasyncio - Rewrite
TCPUnlockServerwithasyncio - Write a
TCPUnlockClient(i.e. emulating a Desktop requesting an unlock) withasyncio - Add
pair-clientcommand (removingscripts/test_pair.py) - Add
unlock-clientcommand
Releasing
Releases are automatically created when a change to version in pyproject.toml is detected. The new files are automatically uploaded to PyPI and the signed release is uploaded to GitHub Releases.
The current steps to release are:
- Make sure
pyproject.tomlis updated with the new version - Using cucumber/changelog, add the changes and update
CHANGELOG.mdwith the new version
./changelog -o CHANGELOG.md added "Add this and that"
./changelog -o CHANGELOG.md release 0.1.2
- Commit the pyproject.toml and CHANGELOG.md changes
- Push the changes to GitHub
- Wait for the release to be published on PyPI
- Wait for the release to be published on GitHub Releases
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file py_pcbu-0.3.0.tar.gz.
File metadata
- Download URL: py_pcbu-0.3.0.tar.gz
- Upload date:
- Size: 23.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/5.1.1 CPython/3.12.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e87d6c80066a16c96773545f785e05713abcc8c40ab33e366cb8ce347313b2a6
|
|
| MD5 |
98d119fe5255b51f0b4f55475ee7ce0f
|
|
| BLAKE2b-256 |
753693a5a9ff18f81df8b74468d3aacde85b1294e67313523ad0ea494ee0832d
|
File details
Details for the file py_pcbu-0.3.0-py3-none-any.whl.
File metadata
- Download URL: py_pcbu-0.3.0-py3-none-any.whl
- Upload date:
- Size: 25.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/5.1.1 CPython/3.12.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
dcafb4aa751509b2acd9aee183e5c1d6ed24650c292d3a204d81b1b839aa45a8
|
|
| MD5 |
a56f92d6a337b1786d4bbf945c694b9c
|
|
| BLAKE2b-256 |
12d0878d017d7a0d946c370c3c1bafb2c0c50a1855076763870b03d9c79faf94
|