mirror of
https://github.com/Leseratte10/acsm-calibre-plugin.git
synced 2024-12-22 17:29:56 +06:00
Prepare v0.0.15
This commit is contained in:
parent
21644b25b2
commit
1fa8e28c53
@ -29,13 +29,13 @@
|
|||||||
# fix authorization failing with certain non-ASCII characters in username,
|
# fix authorization failing with certain non-ASCII characters in username,
|
||||||
# add detailed logging toggle setting, add auto-delete ACSM setting,
|
# add detailed logging toggle setting, add auto-delete ACSM setting,
|
||||||
# add useful error message for ACSMs with nonstandard download type.
|
# add useful error message for ACSMs with nonstandard download type.
|
||||||
# Currently in development:
|
# v0.0.15: Add support for anonymous authorizations, add support for other ID providers,
|
||||||
# Add support for anonymous authorizations, add support for other ID providers,
|
|
||||||
# fix ACSM files from Google Play books (no metadata node),
|
# fix ACSM files from Google Play books (no metadata node),
|
||||||
# allow converting an anonymous auth to an AdobeID auth.
|
# allow converting an anonymous auth to an AdobeID auth,
|
||||||
|
# update python-cryptography from 3.4.8 to 36.0.1, update python-rsa from 4.7.2 to 4.8.
|
||||||
|
|
||||||
PLUGIN_NAME = "DeACSM"
|
PLUGIN_NAME = "DeACSM"
|
||||||
PLUGIN_VERSION_TUPLE = (0, 0, 14)
|
PLUGIN_VERSION_TUPLE = (0, 0, 15)
|
||||||
|
|
||||||
from calibre.customize import FileTypePlugin # type: ignore
|
from calibre.customize import FileTypePlugin # type: ignore
|
||||||
__version__ = PLUGIN_VERSION = ".".join([str(x)for x in PLUGIN_VERSION_TUPLE])
|
__version__ = PLUGIN_VERSION = ".".join([str(x)for x in PLUGIN_VERSION_TUPLE])
|
||||||
|
@ -262,6 +262,11 @@ def buildSignInRequestForAnonAuthConvert(username: str, password: str, authentic
|
|||||||
except:
|
except:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
# Note: I tried replacing the user_uuid with the UUID of another (anonymous) authorization
|
||||||
|
# to see if it was possible to take over another account, but that didn't work. That's the reason
|
||||||
|
# why this request has the signature node, the payload needs to be signed with the user certificate
|
||||||
|
# that matches the UUID in the <adept:user> tag.
|
||||||
|
|
||||||
etree.SubElement(root, etree.QName(NSMAP["adept"], "user")).text = user_uuid
|
etree.SubElement(root, etree.QName(NSMAP["adept"], "user")).text = user_uuid
|
||||||
signature = sign_node(root)
|
signature = sign_node(root)
|
||||||
etree.SubElement(root, etree.QName(NSMAP["adept"], "signature")).text = signature
|
etree.SubElement(root, etree.QName(NSMAP["adept"], "signature")).text = signature
|
||||||
|
Loading…
Reference in New Issue
Block a user