pusk/bin/twitter.ml

83 lines
2.4 KiB
OCaml
Raw Normal View History

2023-05-13 19:58:48 +02:00
open Pusk.Net
open Pusk.Utils
2023-05-14 20:39:24 +02:00
type credentials =
{ username : string
; password : string
}
2023-05-14 22:52:36 +02:00
let inject_username session_id creds =
2023-05-13 22:13:26 +02:00
(* Find username input *)
2023-05-14 22:52:36 +02:00
let strat = CSS "input[name='text']" in
2023-05-14 01:44:11 +02:00
let input_username =
2023-05-14 22:52:36 +02:00
match find session_id strat with
| [] -> raise (Any (fmt "Username input not found"))
2023-05-13 22:13:26 +02:00
| _ as l ->
if List.length l > 1
2023-05-14 22:52:36 +02:00
then raise (Any "Too many elements found as the username input")
2023-05-13 22:13:26 +02:00
else List.nth l 0
in
(* Insert the username *)
2023-05-14 20:39:24 +02:00
send_keys session_id input_username creds.username;
2023-05-14 01:44:11 +02:00
Unix.sleep 1;
2023-05-14 20:39:24 +02:00
send_keys session_id input_username Keys.return;
Unix.sleep 3
;;
let rec _inject_password session_id creds try_count =
if try_count == 0 then raise (Any "Password input not found");
2023-05-14 01:44:11 +02:00
let input_password =
2023-05-14 22:52:36 +02:00
match find session_id (CSS "input[name='password']") with
2023-05-14 20:39:24 +02:00
| [] ->
(* Retry to inject username with the second page *)
2023-05-14 22:52:36 +02:00
inject_username session_id creds;
2023-05-14 20:39:24 +02:00
_inject_password session_id creds (try_count - 1);
None
2023-05-14 01:44:11 +02:00
| _ as l ->
if List.length l > 1
2023-05-14 22:52:36 +02:00
then raise (Any "Too many elements found as the password input")
2023-05-14 20:39:24 +02:00
else Some (List.nth l 0)
2023-05-14 01:44:11 +02:00
in
2023-05-14 20:39:24 +02:00
match input_password with
| Some input ->
(* Insert password *)
send_keys session_id input creds.password;
Unix.sleep 1;
send_keys session_id input Keys.return;
2023-05-14 22:37:00 +02:00
Unix.sleep 3
2023-05-14 20:39:24 +02:00
| None -> ()
;;
let inject_password session_id creds = _inject_password session_id creds 1
2023-05-14 22:37:00 +02:00
let inject_2fa session_id secret input =
let code =
2023-05-14 22:16:20 +02:00
match secret with
| Some seed -> Twostep.TOTP.code ~secret:seed ()
2023-05-14 22:52:36 +02:00
| None -> raise (Any "No TOTP code given, but 2FA code required")
2023-05-14 22:16:20 +02:00
in
2023-05-14 22:37:00 +02:00
(* Insert 2FA code *)
send_keys session_id input code;
Unix.sleep 1;
send_keys session_id input Keys.return;
Unix.sleep 5
2023-05-14 22:16:20 +02:00
;;
let login_twitter ctx username password secret =
2023-05-14 20:39:24 +02:00
(* Navigate to login page and wait for page loaded*)
ignore (navigate ctx.session_id "https://twitter.com/i/flow/login");
2023-05-14 01:57:29 +02:00
Unix.sleep 5;
2023-05-14 20:39:24 +02:00
let creds = { username; password } in
(* Insert the username *)
2023-05-14 22:52:36 +02:00
inject_username ctx.session_id creds;
2023-05-14 20:39:24 +02:00
(* Find password input *)
inject_password ctx.session_id creds;
2023-05-14 22:55:18 +02:00
(* Detection and injection of 2FA code if needed *)
2023-05-14 22:52:36 +02:00
match find ctx.session_id (CSS "input[name='text']") with
| [] -> print_endline "Doesn't use 2FA as no input found"
2023-05-14 22:16:20 +02:00
| _ as l ->
if List.length l > 1
2023-05-14 22:52:36 +02:00
then raise (Any "Too many elements found as 2FA input")
2023-05-14 22:16:20 +02:00
else inject_2fa ctx.session_id secret (List.nth l 0)
2023-05-13 19:58:48 +02:00
;;