/* macli - Unofficial CLI-Based MyAnimeList Client Copyright © 2022-2024 Vidhu Kant Sharma This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ package auth import ( "os" "fmt" "github.com/zalando/go-keyring" "github.com/spf13/viper" ) var refreshPrefix string = "-refresh-token" var expiresPrefix string = "-expires-in" var NoSysKeyring bool func GetToken() string { secret, err := keyring.Get(serviceName, userName) if err != nil { fmt.Println("\x1b[31mError while reading access token from keychain:", err.Error(), "\x1b[0m") fmt.Println("Run `macli login` first to authenticate with your MyAnimeList API Token") os.Exit(1) } return secret } func setToken(secret string) { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.token", secret) viper.Set("auth.no_system_keyring", true) return } err := keyring.Set(serviceName, userName, secret) if err != nil { fmt.Println("Error while writing access token to keychain", err.Error()) os.Exit(1) } } func deleteToken() { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.token", "") } err := keyring.Delete(serviceName, userName) // if secret doesnt exist dont show error if err != nil && !NoSysKeyring { if err.Error() != "secret not found in keyring" { fmt.Println("Error while deleting authentication token", err.Error()) os.Exit(1) } } } // currently refreshtoken has no use func setRefreshToken(secret string) { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.refresh", secret) return } err := keyring.Set(serviceName + refreshPrefix, userName, secret) if err != nil { fmt.Println("Error while writing access token to keychain", err) os.Exit(1) } } func getRefreshToken() string { secret, err := keyring.Get(serviceName + refreshPrefix, userName) if err != nil { fmt.Println("\x1b[31mError while reading refresh token from keychain:", err.Error(), "\x1b[0m") fmt.Println("Your access token won't be automatically refreshed. If you have problems using macli please run `macli login` to log in again.") os.Exit(1) } return secret } func deleteRefreshToken() { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.refresh", "") } err := keyring.Delete(serviceName + refreshPrefix, userName) // if secret doesnt exist dont show error if err != nil && !NoSysKeyring { if err.Error() != "secret not found in keyring" { fmt.Println("Error while deleting refresh token", err.Error()) os.Exit(1) } } } func setExpiresIn(secret string) { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.refresh", secret) return } err := keyring.Set(serviceName + expiresPrefix, userName, secret) if err != nil { fmt.Println("Error while writing token expire time to keychain", err) os.Exit(1) } } func getExpiresIn() string { secret, err := keyring.Get(serviceName + expiresPrefix, userName) if err != nil { fmt.Println("\x1b[31mError while reading token expire time from keychain:", err.Error(), "\x1b[0m") fmt.Println("Please log in again using `macli login` if problems occour") // os.Exit(1) } return secret } func deleteExpiresIn() { if NoSysKeyring { defer viper.WriteConfig() viper.Set("auth.refresh", "") } err := keyring.Delete(serviceName + expiresPrefix, userName) // if secret doesnt exist dont show error if err != nil && !NoSysKeyring { if err.Error() != "secret not found in keyring" { fmt.Println("Error while deleting token expires in data", err.Error()) os.Exit(1) } } }