From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id 708C81FF187 for ; Mon, 8 Sep 2025 16:12:33 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id EFF5E13F28; Mon, 8 Sep 2025 16:12:30 +0200 (CEST) From: Shan Shaji To: pve-devel@lists.proxmox.com Date: Mon, 8 Sep 2025 16:11:49 +0200 Message-ID: <20250908141149.51106-3-s.shaji@proxmox.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20250908141149.51106-1-s.shaji@proxmox.com> References: <20250908141149.51106-1-s.shaji@proxmox.com> MIME-Version: 1.0 X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1757340694551 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.150 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH proxmox_dart_api_client 2/2] fix: ios: add explicit throw of `HandshakeException` X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Proxmox VE development discussion Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" The `cupertino_http` package is throwing `ClientException` [0] instead of `HandShakeException` when the certificate is not valid. Due to this the exception was directly shown in the UI. Inorder to make the error more user friendly catch the `NSErrorClientException` and rethrow `HandShakeException` if the certificate is not valid. Signed-off-by: Shan Shaji --- lib/src/authenticate.dart | 35 +++++++++++++++++++++++++---------- 1 file changed, 25 insertions(+), 10 deletions(-) diff --git a/lib/src/authenticate.dart b/lib/src/authenticate.dart index 118408f..5217578 100644 --- a/lib/src/authenticate.dart +++ b/lib/src/authenticate.dart @@ -1,12 +1,13 @@ import 'dart:async'; import 'dart:convert'; +import 'dart:io'; +import 'package:cupertino_http/cupertino_http.dart'; import 'package:http/http.dart' as http; import 'package:proxmox_dart_api_client/proxmox_dart_api_client.dart'; import 'package:proxmox_dart_api_client/src/handle_ticket_response.dart'; import 'package:proxmox_dart_api_client/src/models/serializers.dart'; - /// Returns an authenticated client to work with if successful. /// /// This is the function you are looking for if you want to interact with any @@ -56,6 +57,12 @@ Future authenticate( } on TimeoutException catch (_) { throw ProxmoxApiException( 'Authentication takes unusually long, check network connection', 408); + } on NSErrorClientException catch (e) { + // Treat untrusted server certificate (-1202) as a handshake failure. + if (e.error.code == -1202) { + throw HandshakeException(e.message); + } + rethrow; } } @@ -64,14 +71,22 @@ Future> accessDomains( bool validateSSL, { http.Client? httpClient, }) async { - httpClient ??= getCustomIOHttpClient(validateSSL: validateSSL); + try { + httpClient ??= getCustomIOHttpClient(validateSSL: validateSSL); - final path = '/api2/json/access/domains'; - final response = await httpClient - .get(apiBaseUrl.replace(path: path)) - .timeout(Duration(seconds: 25)); - var data = (json.decode(response.body)['data'] as List).map((f) { - return serializers.deserializeWith(PveAccessDomainModel.serializer, f); - }); - return data.toList(); + final path = '/api2/json/access/domains'; + final response = await httpClient + .get(apiBaseUrl.replace(path: path)) + .timeout(Duration(seconds: 25)); + var data = (json.decode(response.body)['data'] as List).map((f) { + return serializers.deserializeWith(PveAccessDomainModel.serializer, f); + }); + return data.toList(); + } on NSErrorClientException catch (e) { + // Treat untrusted server certificate (-1202) as a handshake failure. + if (e.error.code == -1202) { + throw HandshakeException(e.message); + } + rethrow; + } } -- 2.50.1 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel