# ruff: noqa: T201, D103, S101 import json import logging from pathlib import Path from findmy import KeyPair from findmy.reports import ( AppleAccount, LoginState, RemoteAnisetteProvider, SmsSecondFactorMethod, ) # URL to (public or local) anisette server ANISETTE_SERVER = "http://localhost:6969" # Apple account details ACCOUNT_EMAIL = "test@test.com" ACCOUNT_PASS = "" # Private base64-encoded key to look up KEY_PRIV = "" # Optional, to verify that advertisement key derivation works for your key KEY_ADV = "" logging.basicConfig(level=logging.DEBUG) def login(account: AppleAccount) -> None: state = account.login(ACCOUNT_EMAIL, ACCOUNT_PASS) if state == LoginState.REQUIRE_2FA: # Account requires 2FA # This only supports SMS methods for now methods = account.get_2fa_methods() # Print the (masked) phone numbers for method in methods: if isinstance(method, SmsSecondFactorMethod): print(method.phone_number) # Just take the first one to keep things simple method = methods[0] method.request() code = input("Code: ") # This automatically finishes the post-2FA login flow method.submit(code) def fetch_reports(lookup_key: KeyPair) -> None: anisette = RemoteAnisetteProvider(ANISETTE_SERVER) acc = AppleAccount(anisette) # Save / restore account logic acc_store = Path("account.json") try: with acc_store.open() as f: acc.restore(json.load(f)) except FileNotFoundError: login(acc) with acc_store.open("w+") as f: json.dump(acc.export(), f) print(f"Logged in as: {acc.account_name} ({acc.first_name} {acc.last_name})") # It's that simple! reports = acc.fetch_last_reports([lookup_key]) print(reports) if __name__ == "__main__": key = KeyPair.from_b64(KEY_PRIV) if KEY_ADV: # verify that your adv key is correct :D assert key.adv_key_b64 == KEY_ADV fetch_reports(key)