1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
|
/*
macli - Unofficial CLI-Based MyAnimeList Client
Copyright © 2022-2024 Vidhu Kant Sharma <vidhukant@vidhukant.com>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package auth
import (
"os"
"fmt"
"github.com/zalando/go-keyring"
"github.com/spf13/viper"
)
var refreshPrefix string = "-refresh-token"
var expiresPrefix string = "-expires-in"
var NoSysKeyring bool
func GetToken() string {
secret, err := keyring.Get(serviceName, userName)
if err != nil {
fmt.Println("\x1b[31mError while reading access token from keychain:", err.Error(), "\x1b[0m")
fmt.Println("Run `macli login` first to authenticate with your MyAnimeList API Token")
os.Exit(1)
}
return secret
}
func setToken(secret string) {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.token", secret)
viper.Set("auth.no_system_keyring", true)
return
}
err := keyring.Set(serviceName, userName, secret)
if err != nil {
fmt.Println("Error while writing access token to keychain", err.Error())
os.Exit(1)
}
}
func deleteToken() {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.token", "")
}
err := keyring.Delete(serviceName, userName)
// if secret doesnt exist dont show error
if err != nil && !NoSysKeyring {
if err.Error() != "secret not found in keyring" {
fmt.Println("Error while deleting authentication token", err.Error())
os.Exit(1)
}
}
}
// currently refreshtoken has no use
func setRefreshToken(secret string) {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.refresh", secret)
return
}
err := keyring.Set(serviceName + refreshPrefix, userName, secret)
if err != nil {
fmt.Println("Error while writing access token to keychain", err)
os.Exit(1)
}
}
func getRefreshToken() string {
secret, err := keyring.Get(serviceName + refreshPrefix, userName)
if err != nil {
fmt.Println("\x1b[31mError while reading refresh token from keychain:", err.Error(), "\x1b[0m")
fmt.Println("Your access token won't be automatically refreshed. If you have problems using macli please run `macli login` to log in again.")
os.Exit(1)
}
return secret
}
func deleteRefreshToken() {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.refresh", "")
}
err := keyring.Delete(serviceName + refreshPrefix, userName)
// if secret doesnt exist dont show error
if err != nil && !NoSysKeyring {
if err.Error() != "secret not found in keyring" {
fmt.Println("Error while deleting refresh token", err.Error())
os.Exit(1)
}
}
}
func setExpiresIn(secret string) {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.refresh", secret)
return
}
err := keyring.Set(serviceName + expiresPrefix, userName, secret)
if err != nil {
fmt.Println("Error while writing token expire time to keychain", err)
os.Exit(1)
}
}
func getExpiresIn() string {
secret, err := keyring.Get(serviceName + expiresPrefix, userName)
if err != nil {
fmt.Println("\x1b[31mError while reading token expire time from keychain:", err.Error(), "\x1b[0m")
fmt.Println("Please log in again using `macli login` if problems occour")
// os.Exit(1)
}
return secret
}
func deleteExpiresIn() {
if NoSysKeyring {
defer viper.WriteConfig()
viper.Set("auth.refresh", "")
}
err := keyring.Delete(serviceName + expiresPrefix, userName)
// if secret doesnt exist dont show error
if err != nil && !NoSysKeyring {
if err.Error() != "secret not found in keyring" {
fmt.Println("Error while deleting token expires in data", err.Error())
os.Exit(1)
}
}
}
|