aboutsummaryrefslogtreecommitdiff
path: root/auth/client.go
blob: 1e504c5a5ff3238703d89030ffdca78efc0d2c0d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
macli - Unofficial CLI-Based MyAnimeList Client
Copyright © 2022 Vidhu Kant Sharma <vidhukant@vidhukant.xyz>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/

package auth

import (
  "os"
  "fmt"
  "github.com/zalando/go-keyring"
  "github.com/spf13/viper"
  "errors"
)

var clientSuffix string = "-client-id"

func getClientId() (string, error) {
  var id string
  var err error


  if NoSysKeyring {
    id = viper.GetString("auth.client_id")
    if id == "" {
      err = errors.New("secret not found in keyring")
    }
  } else {
    id, err = keyring.Get(serviceName + clientSuffix, userName)
  }

  return id, err
}

func setClientId(clientId string) {
  if NoSysKeyring {
    defer viper.WriteConfig()
    viper.Set("auth.client_id", clientId)
    return
  }

  err := keyring.Set(serviceName + clientSuffix, userName, clientId)
  if err != nil {
    fmt.Println("Error while writing Client ID to keychain", err)
    os.Exit(1)
  }
}

func deleteClientId() {
  if NoSysKeyring {
    defer viper.WriteConfig()
    viper.Set("auth.client_id", "")
  }

  err := keyring.Delete(serviceName + clientSuffix, userName)
  // if secret doesnt exist dont show error
  if err != nil && !NoSysKeyring {
    if err.Error() != "secret not found in keyring" {
      fmt.Println("Error while deleting Client ID", err.Error())
      os.Exit(1)
    }
  }
}

// if client id isn't in keyring
// it will ask the user to enter/create one
func askClientId(storeClientId bool) string {
  clientId, err := getClientId()
  if err != nil {
    if err.Error() == "secret not found in keyring" {
      fmt.Println("Looks like you don't have any Client ID saved.")
      fmt.Println("If you don't have a MyAnimeList Client ID, please go to \x1b[34mhttps://myanimelist.net/apiconfig\x1b[0m and create one.")
      fmt.Println("Remember to set the App Redirect Url to \x1b[33mhttp://localhost:8000\x1b[0m. Other details don't matter.")

      // get clientId from user input
      clientId = secretInput("Enter your Client ID: ", "Client ID Can't be blank")
      validateClientId(clientId)
      if storeClientId {
        setClientId(clientId)
      }
    } else {
      fmt.Println("Error while reading Client ID from keychain:", err)
      os.Exit(1)
    }
  }

  return clientId
}

func validateClientId(clientId string) {
  /* I'm not sure if ALL client IDs are 32 characters
   * but that's most likely the case */
  if len(clientId) != 32 {
    fmt.Println("\x1b[33mWarning:\x1b[0m The Client ID you have entered has failed the validity check.")

    if confirmInput("Show entered Client ID? [Y/n] ", true) {
      fmt.Println("The Client ID you just entered:", clientId)
      if !confirmInput("Is this correct? [Y/n] ", true) {
        fmt.Println("Please verify your Client ID and run \x1b[33m`macli login`\x1b[0m again.")
        os.Exit(1)
      }
    }
  }
}