// Copyright (c) 2022 Proton AG // // This file is part of Proton Mail Bridge.Bridge. // // Proton Mail Bridge is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Proton Mail Bridge is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Proton Mail Bridge. If not, see . package grpc import ( "context" "encoding/base64" "errors" "runtime" "github.com/Masterminds/semver/v3" "github.com/ProtonMail/proton-bridge/v2/internal/bridge" "github.com/ProtonMail/proton-bridge/v2/internal/constants" "github.com/ProtonMail/proton-bridge/v2/internal/events" "github.com/ProtonMail/proton-bridge/v2/internal/frontend/theme" "github.com/ProtonMail/proton-bridge/v2/internal/safe" "github.com/ProtonMail/proton-bridge/v2/internal/updater" "github.com/ProtonMail/proton-bridge/v2/pkg/keychain" "github.com/ProtonMail/proton-bridge/v2/pkg/ports" "github.com/sirupsen/logrus" "gitlab.protontech.ch/go/liteapi" "golang.org/x/exp/maps" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "google.golang.org/protobuf/types/known/wrapperspb" ) // CheckTokens implements the CheckToken gRPC service call. func (s *Service) CheckTokens(ctx context.Context, clientConfigPath *wrapperspb.StringValue) (*wrapperspb.StringValue, error) { s.log.Debug("CheckTokens") path := clientConfigPath.Value logEntry := s.log.WithField("path", path) var clientConfig Config if err := clientConfig.load(path); err != nil { logEntry.WithError(err).Error("Could not read gRPC client config file") return nil, err } logEntry.Info("gRPC client config file was successfully loaded") return &wrapperspb.StringValue{Value: clientConfig.Token}, nil } func (s *Service) AddLogEntry(ctx context.Context, request *AddLogEntryRequest) (*emptypb.Empty, error) { entry := s.log if len(request.Package) > 0 { entry = entry.WithField("pkg", request.Package) } level := logrusLevelFromGrpcLevel(request.Level) // we do a special case for Panic and Fatal as using logrus.Entry.Log will not panic nor exit respectively. if level == logrus.PanicLevel { entry.Panic(request.Message) return &emptypb.Empty{}, nil } if level == logrus.FatalLevel { entry.Fatal(request.Message) return &emptypb.Empty{}, nil } entry.Log(level, request.Message) return &emptypb.Empty{}, nil } // GuiReady implement the GuiReady gRPC service call. func (s *Service) GuiReady(ctx context.Context, _ *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("GuiReady") s.initializationDone.Do(s.initializing.Done) return &emptypb.Empty{}, nil } // Quit implement the Quit gRPC service call. func (s *Service) Quit(ctx context.Context, empty *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("Quit") return &emptypb.Empty{}, s.quit() } func (s *Service) quit() error { // Windows is notably slow at Quitting. We do it in a goroutine to speed things up a bit. go func() { if s.parentPID >= 0 { s.parentPIDDoneCh <- struct{}{} } var err error if s.isStreamingEvents() { if err = s.stopEventStream(); err != nil { s.log.WithError(err).Error("Quit failed.") } } // The following call is launched as a goroutine, as it will wait for current calls to end, including this one. s.grpcServer.GracefulStop() }() return nil } // Restart implement the Restart gRPC service call. func (s *Service) Restart(ctx context.Context, empty *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("Restart") s.restarter.Set(true, false) return s.Quit(ctx, empty) } func (s *Service) ShowOnStartup(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("ShowOnStartup") return wrapperspb.Bool(s.showOnStartup), nil } func (s *Service) ShowSplashScreen(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("ShowSplashScreen") if s.bridge.GetFirstStart() { return wrapperspb.Bool(false), nil } // Current splash screen contains update on rebranding. Therefore, it // should be shown only if the last used version was less than 2.2.0. return wrapperspb.Bool(s.bridge.GetLastVersion().LessThan(semver.MustParse("2.2.0"))), nil } func (s *Service) IsFirstGuiStart(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsFirstGuiStart") return wrapperspb.Bool(s.bridge.GetFirstStartGUI()), nil } func (s *Service) SetIsAutostartOn(ctx context.Context, isOn *wrapperspb.BoolValue) (*emptypb.Empty, error) { s.log.WithField("show", isOn.Value).Debug("SetIsAutostartOn") defer func() { _ = s.SendEvent(NewToggleAutostartFinishedEvent()) }() if isOn.Value == s.bridge.GetAutostart() { s.initAutostart() return &emptypb.Empty{}, nil } s.initAutostart() if err := s.bridge.SetAutostart(isOn.Value); err != nil { s.log.WithField("makeItEnabled", isOn.Value).WithError(err).Error("Autostart change failed") return nil, status.Errorf(codes.Internal, "failed to set autostart: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) IsAutostartOn(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsAutostartOn") return wrapperspb.Bool(s.bridge.GetAutostart()), nil } func (s *Service) SetIsBetaEnabled(ctx context.Context, isEnabled *wrapperspb.BoolValue) (*emptypb.Empty, error) { s.log.WithField("isEnabled", isEnabled.Value).Debug("SetIsBetaEnabled") channel := updater.StableChannel if isEnabled.Value { channel = updater.EarlyChannel } if err := s.bridge.SetUpdateChannel(channel); err != nil { s.log.WithError(err).Error("Failed to set update channel") return nil, status.Errorf(codes.Internal, "failed to set update channel: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) IsBetaEnabled(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsBetaEnabled") return wrapperspb.Bool(s.bridge.GetUpdateChannel() == updater.EarlyChannel), nil } func (s *Service) SetIsAllMailVisible(ctx context.Context, isVisible *wrapperspb.BoolValue) (*emptypb.Empty, error) { s.log.WithField("isVisible", isVisible.Value).Debug("SetIsAllMailVisible") if err := s.bridge.SetShowAllMail(isVisible.Value); err != nil { s.log.WithError(err).Error("Failed to set show all mail") return nil, status.Errorf(codes.Internal, "failed to set show all mail: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) IsAllMailVisible(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsAllMailVisible") return wrapperspb.Bool(s.bridge.GetShowAllMail()), nil } func (s *Service) GoOs(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("GoOs") // TO-DO We can probably get rid of this and use QSysInfo::product name return wrapperspb.String(runtime.GOOS), nil } func (s *Service) TriggerReset(ctx context.Context, _ *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("TriggerReset") go func() { defer s.panicHandler.HandlePanic() s.triggerReset() }() return &emptypb.Empty{}, nil } func (s *Service) Version(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("Version") return wrapperspb.String(s.bridge.GetCurrentVersion().Original()), nil } func (s *Service) LogsPath(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("LogsPath") path, err := s.bridge.GetLogsPath() if err != nil { s.log.WithError(err).Error("Cannot determine logs path") return nil, err } return wrapperspb.String(path), nil } func (s *Service) LicensePath(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("LicensePath") return wrapperspb.String(s.bridge.GetLicenseFilePath()), nil } func (s *Service) DependencyLicensesLink(_ context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { return wrapperspb.String(s.bridge.GetDependencyLicensesLink()), nil } func (s *Service) ReleaseNotesPageLink(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.latestLock.RLock() defer s.latestLock.RUnlock() return wrapperspb.String(s.latest.ReleaseNotesPage), nil } func (s *Service) LandingPageLink(_ context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.latestLock.RLock() defer s.latestLock.RUnlock() return wrapperspb.String(s.latest.LandingPage), nil } func (s *Service) SetColorSchemeName(ctx context.Context, name *wrapperspb.StringValue) (*emptypb.Empty, error) { s.log.WithField("ColorSchemeName", name.Value).Debug("SetColorSchemeName") if !theme.IsAvailable(theme.Theme(name.Value)) { s.log.WithField("scheme", name.Value).Warn("Color scheme not available") return nil, status.Error(codes.NotFound, "Color scheme not available") } if err := s.bridge.SetColorScheme(name.Value); err != nil { s.log.WithError(err).Error("Failed to set color scheme") return nil, status.Errorf(codes.Internal, "failed to set color scheme: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) ColorSchemeName(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("ColorSchemeName") current := s.bridge.GetColorScheme() if !theme.IsAvailable(theme.Theme(current)) { current = string(theme.DefaultTheme()) if err := s.bridge.SetColorScheme(current); err != nil { s.log.WithError(err).Error("Failed to set color scheme") return nil, status.Errorf(codes.Internal, "failed to set color scheme: %v", err) } } return wrapperspb.String(current), nil } func (s *Service) CurrentEmailClient(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("CurrentEmailClient") return wrapperspb.String(s.bridge.GetCurrentUserAgent()), nil } func (s *Service) ReportBug(ctx context.Context, report *ReportBugRequest) (*emptypb.Empty, error) { s.log.WithFields(logrus.Fields{ "osType": report.OsType, "osVersion": report.OsVersion, "description": report.Description, "address": report.Address, "emailClient": report.EmailClient, "includeLogs": report.IncludeLogs, }).Debug("ReportBug") go func() { defer func() { _ = s.SendEvent(NewReportBugFinishedEvent()) }() if err := s.bridge.ReportBug( context.Background(), report.OsType, report.OsVersion, report.Description, report.Address, report.Address, report.EmailClient, report.IncludeLogs, ); err != nil { s.log.WithError(err).Error("Failed to report bug") _ = s.SendEvent(NewReportBugErrorEvent()) return } _ = s.SendEvent(NewReportBugSuccessEvent()) }() return &emptypb.Empty{}, nil } func (s *Service) ForceLauncher(ctx context.Context, launcher *wrapperspb.StringValue) (*emptypb.Empty, error) { s.log.WithField("launcher", launcher.Value).Debug("ForceLauncher") s.restarter.Override(launcher.Value) return &emptypb.Empty{}, nil } func (s *Service) SetMainExecutable(ctx context.Context, exe *wrapperspb.StringValue) (*emptypb.Empty, error) { s.log.WithField("executable", exe.Value).Debug("SetMainExecutable") s.restarter.AddFlags("--wait", exe.Value) return &emptypb.Empty{}, nil } func (s *Service) Login(ctx context.Context, login *LoginRequest) (*emptypb.Empty, error) { s.log.WithField("username", login.Username).Debug("Login") go func() { defer s.panicHandler.HandlePanic() password, err := base64Decode(login.Password) if err != nil { s.log.WithError(err).Error("Cannot decode password") _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, "Cannot decode password")) return } client, auth, err := s.bridge.LoginAuth(context.Background(), login.Username, password) if err != nil { defer s.loginClean() if errors.Is(err, bridge.ErrUserAlreadyLoggedIn) { _ = s.SendEvent(NewLoginAlreadyLoggedInEvent(auth.UserID)) } else if apiErr := new(liteapi.Error); errors.As(err, &apiErr) { switch apiErr.Code { // nolint:exhaustive case liteapi.PasswordWrong: _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, "")) case liteapi.PaidPlanRequired: _ = s.SendEvent(NewLoginError(LoginErrorType_FREE_USER, "")) default: _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, err.Error())) } } else { _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, err.Error())) } return } s.password = password s.authClient = client s.auth = auth switch { case auth.TwoFA.Enabled == liteapi.TOTPEnabled: _ = s.SendEvent(NewLoginTfaRequestedEvent(login.Username)) case auth.PasswordMode == liteapi.TwoPasswordMode: _ = s.SendEvent(NewLoginTwoPasswordsRequestedEvent()) default: s.finishLogin() } }() return &emptypb.Empty{}, nil } func (s *Service) Login2FA(ctx context.Context, login *LoginRequest) (*emptypb.Empty, error) { s.log.WithField("username", login.Username).Debug("Login2FA") go func() { defer s.panicHandler.HandlePanic() if s.auth.UID == "" || s.authClient == nil { s.log.Errorf("Login 2FA: authethication incomplete %s %p", s.auth.UID, s.authClient) _ = s.SendEvent(NewLoginError(LoginErrorType_TFA_ABORT, "Missing authentication, try again.")) s.loginClean() return } twoFA, err := base64Decode(login.Password) if err != nil { s.log.WithError(err).Error("Cannot decode 2fa code") _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, "Cannot decode 2fa code")) s.loginClean() return } if err := s.authClient.Auth2FA(context.Background(), liteapi.Auth2FAReq{TwoFactorCode: string(twoFA)}); err != nil { if apiErr := new(liteapi.Error); errors.As(err, &apiErr) && apiErr.Code == liteapi.PasswordWrong { s.log.Warn("Login 2FA: retry 2fa") _ = s.SendEvent(NewLoginError(LoginErrorType_TFA_ERROR, "")) } else { s.log.WithError(err).Warn("Login 2FA: failed") _ = s.SendEvent(NewLoginError(LoginErrorType_TFA_ABORT, err.Error())) s.loginClean() } return } if s.auth.PasswordMode == liteapi.TwoPasswordMode { _ = s.SendEvent(NewLoginTwoPasswordsRequestedEvent()) return } s.finishLogin() }() return &emptypb.Empty{}, nil } func (s *Service) Login2Passwords(ctx context.Context, login *LoginRequest) (*emptypb.Empty, error) { s.log.WithField("username", login.Username).Debug("Login2Passwords") go func() { defer s.panicHandler.HandlePanic() password, err := base64Decode(login.Password) if err != nil { s.log.WithError(err).Error("Cannot decode mbox password") _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, "Cannot decode mbox password")) s.loginClean() return } s.password = password s.finishLogin() }() return &emptypb.Empty{}, nil } func (s *Service) LoginAbort(ctx context.Context, loginAbort *LoginAbortRequest) (*emptypb.Empty, error) { s.log.WithField("username", loginAbort.Username).Debug("LoginAbort") go func() { defer s.panicHandler.HandlePanic() s.loginAbort() }() return &emptypb.Empty{}, nil } func (s *Service) CheckUpdate(context.Context, *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("CheckUpdate") go func() { defer s.panicHandler.HandlePanic() updateCh, done := s.bridge.GetEvents(events.UpdateAvailable{}, events.UpdateNotAvailable{}) defer done() s.bridge.CheckForUpdates() switch (<-updateCh).(type) { case events.UpdateAvailable: // ... this is handled by the main event loop case events.UpdateNotAvailable: _ = s.SendEvent(NewUpdateIsLatestVersionEvent()) } _ = s.SendEvent(NewUpdateCheckFinishedEvent()) }() return &emptypb.Empty{}, nil } func (s *Service) InstallUpdate(ctx context.Context, _ *emptypb.Empty) (*emptypb.Empty, error) { s.log.Debug("InstallUpdate") go func() { defer s.panicHandler.HandlePanic() safe.RLock(func() { s.bridge.InstallUpdate(s.latest) }, s.targetLock) }() return &emptypb.Empty{}, nil } func (s *Service) SetIsAutomaticUpdateOn(ctx context.Context, isOn *wrapperspb.BoolValue) (*emptypb.Empty, error) { s.log.WithField("isOn", isOn.Value).Debug("SetIsAutomaticUpdateOn") if currentlyOn := s.bridge.GetAutoUpdate(); currentlyOn == isOn.Value { return &emptypb.Empty{}, nil } if err := s.bridge.SetAutoUpdate(isOn.Value); err != nil { s.log.WithError(err).Error("Failed to set auto update") return nil, status.Errorf(codes.Internal, "failed to set auto update: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) IsAutomaticUpdateOn(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsAutomaticUpdateOn") return wrapperspb.Bool(s.bridge.GetAutoUpdate()), nil } func (s *Service) DiskCachePath(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("DiskCachePath") return wrapperspb.String(s.bridge.GetGluonDir()), nil } func (s *Service) SetDiskCachePath(ctx context.Context, newPath *wrapperspb.StringValue) (*emptypb.Empty, error) { s.log.WithField("path", newPath.Value).Debug("setDiskCachePath") go func() { defer func() { _ = s.SendEvent(NewDiskCachePathChangeFinishedEvent()) }() path := newPath.Value //goland:noinspection GoBoolExpressions if (runtime.GOOS == "windows") && (path[0] == '/') { path = path[1:] } if path != s.bridge.GetGluonDir() { if err := s.bridge.SetGluonDir(context.Background(), path); err != nil { s.log.WithError(err).Error("The local cache location could not be changed.") _ = s.SendEvent(NewDiskCacheErrorEvent(DiskCacheErrorType_CANT_MOVE_DISK_CACHE_ERROR)) return } _ = s.SendEvent(NewDiskCachePathChangedEvent(s.bridge.GetGluonDir())) } }() return &emptypb.Empty{}, nil } func (s *Service) SetIsDoHEnabled(ctx context.Context, isEnabled *wrapperspb.BoolValue) (*emptypb.Empty, error) { s.log.WithField("isEnabled", isEnabled.Value).Debug("SetIsDohEnabled") if err := s.bridge.SetProxyAllowed(isEnabled.Value); err != nil { s.log.WithError(err).Error("Failed to set DoH") return nil, status.Errorf(codes.Internal, "failed to set DoH: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) IsDoHEnabled(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { s.log.Debug("IsDohEnabled") return wrapperspb.Bool(s.bridge.GetProxyAllowed()), nil } func (s *Service) SetUseSslForSmtp(ctx context.Context, useSsl *wrapperspb.BoolValue) (*emptypb.Empty, error) { //nolint:revive,stylecheck s.log.WithField("useSsl", useSsl.Value).Debug("SetUseSslForSmtp") if s.bridge.GetSMTPSSL() == useSsl.Value { return &emptypb.Empty{}, nil } if err := s.bridge.SetSMTPSSL(useSsl.Value); err != nil { s.log.WithError(err).Error("Failed to set SMTP SSL") return nil, status.Errorf(codes.Internal, "failed to set SMTP SSL: %v", err) } return &emptypb.Empty{}, s.SendEvent(NewMailSettingsUseSslForSmtpFinishedEvent()) } func (s *Service) UseSslForSmtp(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { //nolint:revive,stylecheck s.log.Debug("UseSslForSmtp") return wrapperspb.Bool(s.bridge.GetSMTPSSL()), nil } func (s *Service) SetUseSslForImap(ctx context.Context, useSsl *wrapperspb.BoolValue) (*emptypb.Empty, error) { //nolint:revive,stylecheck s.log.WithField("useSsl", useSsl.Value).Debug("SetUseSslForImap") if s.bridge.GetIMAPSSL() == useSsl.Value { return &emptypb.Empty{}, nil } if err := s.bridge.SetIMAPSSL(useSsl.Value); err != nil { s.log.WithError(err).Error("Failed to set IMAP SSL") return nil, status.Errorf(codes.Internal, "failed to set IMAP SSL: %v", err) } return &emptypb.Empty{}, s.SendEvent(NewMailSettingsUseSslForImapFinishedEvent()) } func (s *Service) UseSslForImap(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.BoolValue, error) { //nolint:revive,stylecheck s.log.Debug("UseSslForImap") return wrapperspb.Bool(s.bridge.GetIMAPSSL()), nil } func (s *Service) Hostname(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("Hostname") return wrapperspb.String(constants.Host), nil } func (s *Service) ImapPort(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.Int32Value, error) { s.log.Debug("ImapPort") return wrapperspb.Int32(int32(s.bridge.GetIMAPPort())), nil } func (s *Service) SmtpPort(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.Int32Value, error) { //nolint:revive,stylecheck s.log.Debug("SmtpPort") return wrapperspb.Int32(int32(s.bridge.GetSMTPPort())), nil } func (s *Service) ChangePorts(ctx context.Context, ports *ChangePortsRequest) (*emptypb.Empty, error) { s.log.WithField("imapPort", ports.ImapPort).WithField("smtpPort", ports.SmtpPort).Debug("ChangePorts") if err := s.bridge.SetIMAPPort(int(ports.ImapPort)); err != nil { s.log.WithError(err).Error("Failed to set IMAP port") return nil, status.Errorf(codes.Internal, "failed to set IMAP port: %v", err) } if err := s.bridge.SetSMTPPort(int(ports.SmtpPort)); err != nil { s.log.WithError(err).Error("Failed to set SMTP port") return nil, status.Errorf(codes.Internal, "failed to set SMTP port: %v", err) } return &emptypb.Empty{}, s.SendEvent(NewMailSettingsChangePortFinishedEvent()) } func (s *Service) IsPortFree(ctx context.Context, port *wrapperspb.Int32Value) (*wrapperspb.BoolValue, error) { s.log.Debug("IsPortFree") return wrapperspb.Bool(ports.IsPortFree(int(port.Value))), nil } func (s *Service) AvailableKeychains(ctx context.Context, _ *emptypb.Empty) (*AvailableKeychainsResponse, error) { s.log.Debug("AvailableKeychains") return &AvailableKeychainsResponse{Keychains: maps.Keys(keychain.Helpers)}, nil } func (s *Service) SetCurrentKeychain(ctx context.Context, keychain *wrapperspb.StringValue) (*emptypb.Empty, error) { s.log.WithField("keychain", keychain.Value).Debug("SetCurrentKeyChain") // we do not check validity. defer func() { _, _ = s.Restart(ctx, &emptypb.Empty{}) }() defer func() { _ = s.SendEvent(NewKeychainChangeKeychainFinishedEvent()) }() helper, err := s.bridge.GetKeychainApp() if err != nil { s.log.WithError(err).Error("Failed to get current keychain") return nil, status.Errorf(codes.Internal, "failed to get current keychain: %v", err) } if helper == keychain.Value { return &emptypb.Empty{}, nil } if err := s.bridge.SetKeychainApp(keychain.Value); err != nil { s.log.WithError(err).Error("Failed to set keychain") return nil, status.Errorf(codes.Internal, "failed to set keychain: %v", err) } return &emptypb.Empty{}, nil } func (s *Service) CurrentKeychain(ctx context.Context, _ *emptypb.Empty) (*wrapperspb.StringValue, error) { s.log.Debug("CurrentKeychain") helper, err := s.bridge.GetKeychainApp() if err != nil { s.log.WithError(err).Error("Failed to get current keychain") return nil, status.Errorf(codes.Internal, "failed to get current keychain: %v", err) } return wrapperspb.String(helper), nil } func base64Decode(in []byte) ([]byte, error) { out := make([]byte, base64.StdEncoding.DecodedLen(len(in))) n, err := base64.StdEncoding.Decode(out, in) if err != nil { return nil, err } return out[:n], nil }