mirror of
https://github.com/malmeloo/FindMy.py.git
synced 2026-04-18 00:53:56 +02:00
78 lines
2.0 KiB
Python
78 lines
2.0 KiB
Python
# ruff: noqa: T201, D103, S101
|
|
import json
|
|
import logging
|
|
from pathlib import Path
|
|
|
|
from findmy import KeyPair
|
|
from findmy.reports import (
|
|
AppleAccount,
|
|
LoginState,
|
|
RemoteAnisetteProvider,
|
|
SmsSecondFactorMethod,
|
|
)
|
|
|
|
# URL to (public or local) anisette server
|
|
ANISETTE_SERVER = "http://localhost:6969"
|
|
|
|
# Apple account details
|
|
ACCOUNT_EMAIL = "test@test.com"
|
|
ACCOUNT_PASS = ""
|
|
|
|
# Private base64-encoded key to look up
|
|
KEY_PRIV = ""
|
|
|
|
# Optional, to verify that advertisement key derivation works for your key
|
|
KEY_ADV = ""
|
|
|
|
logging.basicConfig(level=logging.DEBUG)
|
|
|
|
|
|
def login(account: AppleAccount) -> None:
|
|
state = account.login(ACCOUNT_EMAIL, ACCOUNT_PASS)
|
|
|
|
if state == LoginState.REQUIRE_2FA: # Account requires 2FA
|
|
# This only supports SMS methods for now
|
|
methods = account.get_2fa_methods()
|
|
|
|
# Print the (masked) phone numbers
|
|
for method in methods:
|
|
if isinstance(method, SmsSecondFactorMethod):
|
|
print(method.phone_number)
|
|
|
|
# Just take the first one to keep things simple
|
|
method = methods[0]
|
|
method.request()
|
|
code = input("Code: ")
|
|
|
|
# This automatically finishes the post-2FA login flow
|
|
method.submit(code)
|
|
|
|
|
|
def fetch_reports(lookup_key: KeyPair) -> None:
|
|
anisette = RemoteAnisetteProvider(ANISETTE_SERVER)
|
|
acc = AppleAccount(anisette)
|
|
|
|
# Save / restore account logic
|
|
acc_store = Path("account.json")
|
|
try:
|
|
with acc_store.open() as f:
|
|
acc.restore(json.load(f))
|
|
except FileNotFoundError:
|
|
login(acc)
|
|
with acc_store.open("w+") as f:
|
|
json.dump(acc.export(), f)
|
|
|
|
print(f"Logged in as: {acc.account_name} ({acc.first_name} {acc.last_name})")
|
|
|
|
# It's that simple!
|
|
reports = acc.fetch_last_reports([lookup_key])
|
|
print(reports)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
key = KeyPair.from_b64(KEY_PRIV)
|
|
if KEY_ADV: # verify that your adv key is correct :D
|
|
assert key.adv_key_b64 == KEY_ADV
|
|
|
|
fetch_reports(key)
|