Dan Anglin
42251f6df8
SUMMARY This commit adds configuration support to enbas. The configuration is stored as a JSON file in the user specified configuration directory. When using enbas for the first time, the user will first need to execute the new init command in order to generate the configuration. Once this has been generated the user can edit the settings to personalise their experience, login to their account and use enbas as normal. For now the configurable settings included in the configuration are as follows: - The path to the credentials file (by default this is set to a file in the same directory as the configuration file). - The path to the cache directory. - The character limit used for line wrapping. - The programs used for integrations such as paging, media viewing, opening URLs, etc. CHANGES - added the new config type. - added the new init executor for generating a new configuration file. - removed the following top level flags in favour of the new configration support. - cache-dir - pager - image-viewer - video-player - max-terminal-width - added a new error type for use when an unknown media attachment ID is specified. - updated the usage function for the executors to support a case where a flagsets has no flags. - update .golangci.yaml to disable some linters
106 lines
2.8 KiB
Go
106 lines
2.8 KiB
Go
// SPDX-FileCopyrightText: 2024 Dan Anglin <d.n.i.anglin@gmail.com>
|
|
//
|
|
// SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
package executor
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"codeflow.dananglin.me.uk/apollo/enbas/internal/client"
|
|
"codeflow.dananglin.me.uk/apollo/enbas/internal/config"
|
|
"codeflow.dananglin.me.uk/apollo/enbas/internal/printer"
|
|
"codeflow.dananglin.me.uk/apollo/enbas/internal/utilities"
|
|
)
|
|
|
|
type LoginExecutor struct {
|
|
*flag.FlagSet
|
|
|
|
printer *printer.Printer
|
|
config *config.Config
|
|
instance string
|
|
}
|
|
|
|
func NewLoginExecutor(printer *printer.Printer, config *config.Config, name, summary string) *LoginExecutor {
|
|
command := LoginExecutor{
|
|
FlagSet: flag.NewFlagSet(name, flag.ExitOnError),
|
|
|
|
printer: printer,
|
|
config: config,
|
|
instance: "",
|
|
}
|
|
|
|
command.StringVar(&command.instance, flagInstance, "", "Specify the instance that you want to login to.")
|
|
|
|
command.Usage = commandUsageFunc(name, summary, command.FlagSet)
|
|
|
|
return &command
|
|
}
|
|
|
|
func (c *LoginExecutor) Execute() error {
|
|
var err error
|
|
|
|
if c.instance == "" {
|
|
return FlagNotSetError{flagText: flagInstance}
|
|
}
|
|
|
|
instance := c.instance
|
|
|
|
if !strings.HasPrefix(instance, "https") || !strings.HasPrefix(instance, "http") {
|
|
instance = "https://" + instance
|
|
}
|
|
|
|
for strings.HasSuffix(instance, "/") {
|
|
instance = instance[:len(instance)-1]
|
|
}
|
|
|
|
credentials := config.Credentials{
|
|
Instance: instance,
|
|
}
|
|
|
|
gtsClient := client.NewClient(credentials)
|
|
|
|
if err := gtsClient.Register(); err != nil {
|
|
return fmt.Errorf("unable to register the application: %w", err)
|
|
}
|
|
|
|
consentPageURL := gtsClient.AuthCodeURL()
|
|
|
|
utilities.OpenLink(consentPageURL)
|
|
|
|
var builder strings.Builder
|
|
|
|
builder.WriteString("\nYou'll need to sign into your GoToSocial's consent page in order to generate the out-of-band token to continue with the application's login process.")
|
|
builder.WriteString("\nYour browser may have opened the link to the consent page already. If not, please copy and paste the link below to your browser:")
|
|
builder.WriteString("\n\n" + consentPageURL)
|
|
builder.WriteString("\n\n" + "Once you have the code please copy and paste it below.")
|
|
builder.WriteString("\n" + "Out-of-band token: ")
|
|
|
|
c.printer.PrintInfo(builder.String())
|
|
|
|
var code string
|
|
|
|
if _, err := fmt.Scanln(&code); err != nil {
|
|
return fmt.Errorf("failed to read access code: %w", err)
|
|
}
|
|
|
|
if err := gtsClient.UpdateToken(code); err != nil {
|
|
return fmt.Errorf("unable to update the client's access token: %w", err)
|
|
}
|
|
|
|
account, err := gtsClient.VerifyCredentials()
|
|
if err != nil {
|
|
return fmt.Errorf("unable to verify the credentials: %w", err)
|
|
}
|
|
|
|
loginName, err := config.SaveCredentials(c.config.CredentialsFile, account.Username, gtsClient.Authentication)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to save the authentication details: %w", err)
|
|
}
|
|
|
|
c.printer.PrintSuccess("Successfully logged into " + loginName + ".")
|
|
|
|
return nil
|
|
}
|