// DO NOT EDIT ! // This file was generated automatically from 'src/mako/cli/main.rs.mako' // DO NOT EDIT ! #![feature(plugin, exit_status)] #![plugin(docopt_macros)] #![allow(unused_variables, unused_imports, dead_code, unused_mut)] extern crate docopt; extern crate yup_oauth2 as oauth2; extern crate rustc_serialize; extern crate serde; extern crate hyper; extern crate mime; extern crate google_oauth2_v2 as api; use std::env; use std::io::{self, Write}; docopt!(Options derive Debug, " Usage: oauth2-v2 [options] methods get-cert-for-open-id-connect [-p ]... [-o ] oauth2-v2 [options] methods tokeninfo [-p ]... [-o ] oauth2-v2 [options] userinfo get [-p ]... [-o ] oauth2-v2 [options] userinfo v2-me-get [-p ]... [-o ] oauth2-v2 --help All documentation details can be found TODO: Configuration: --scope Specify the authentication a method should be executed in. Each scope requires the user to grant this application permission to use it. If unset, it defaults to the shortest scope url for a particular method. --config-dir A directory into which we will store our persistent data. Defaults to a user-writable directory that we will create during the first invocation. [default: ~/.google-service-cli] "); mod cmn; use cmn::{InvalidOptionsError, CLIError, JsonTokenStorage, arg_from_str, writer_from_opts, parse_kv_arg, input_file_from_opts, input_mime_from_opts, FieldCursor, FieldError}; use std::default::Default; use std::str::FromStr; use oauth2::{Authenticator, DefaultAuthenticatorDelegate}; use rustc_serialize::json; struct Engine { opt: Options, hub: api::Oauth2>, } impl Engine { fn _methods_get_cert_for_open_id_connect(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.methods().get_cert_for_open_id_connect(); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { println!("DEBUG: REMOVE ME {:?}", response); serde::json::to_writer(&mut ostream, &output_schema).unwrap(); None } } } } fn _methods_tokeninfo(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.methods().tokeninfo(); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err); match key { "token-handle" => { call = call.token_handle(value.unwrap_or("")); }, "id-token" => { call = call.id_token(value.unwrap_or("")); }, "access-token" => { call = call.access_token(value.unwrap_or("")); }, "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { println!("DEBUG: REMOVE ME {:?}", response); serde::json::to_writer(&mut ostream, &output_schema).unwrap(); None } } } } fn _userinfo_get(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.userinfo().get(); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { println!("DEBUG: REMOVE ME {:?}", response); serde::json::to_writer(&mut ostream, &output_schema).unwrap(); None } } } } fn _userinfo_v2_me_get(&self, dry_run: bool, err: &mut InvalidOptionsError) -> Option { let mut call = self.hub.userinfo().v2_me_get(); for parg in self.opt.arg_v.iter() { let (key, value) = parse_kv_arg(&*parg, err); match key { "alt" |"fields" |"key" |"oauth-token" |"pretty-print" |"quota-user" |"user-ip" => { let map = [ ("oauth-token", "oauth_token"), ("pretty-print", "prettyPrint"), ("quota-user", "quotaUser"), ("user-ip", "userIp"), ]; call = call.param(map.iter().find(|t| t.0 == key).unwrap_or(&("", key)).1, value.unwrap_or("unset")) }, _ => err.issues.push(CLIError::UnknownParameter(key.to_string())), } } let protocol = "standard-request"; if dry_run { None } else { assert!(err.issues.len() == 0); let mut ostream = writer_from_opts(self.opt.flag_o, &self.opt.arg_out); match match protocol { "standard-request" => call.doit(), _ => unreachable!(), } { Err(api_err) => Some(api_err), Ok((mut response, output_schema)) => { println!("DEBUG: REMOVE ME {:?}", response); serde::json::to_writer(&mut ostream, &output_schema).unwrap(); None } } } } fn _doit(&self, dry_run: bool) -> (Option, Option) { let mut err = InvalidOptionsError::new(); let mut call_result: Option; let mut err_opt: Option = None; if self.opt.cmd_methods { if self.opt.cmd_get_cert_for_open_id_connect { call_result = self._methods_get_cert_for_open_id_connect(dry_run, &mut err); } else if self.opt.cmd_tokeninfo { call_result = self._methods_tokeninfo(dry_run, &mut err); } else { unreachable!(); } } else if self.opt.cmd_userinfo { if self.opt.cmd_get { call_result = self._userinfo_get(dry_run, &mut err); } else if self.opt.cmd_v2_me_get { call_result = self._userinfo_v2_me_get(dry_run, &mut err); } else { unreachable!(); } } else { unreachable!(); } if dry_run { if err.issues.len() > 0 { err_opt = Some(err); } } (call_result, err_opt) } // Please note that this call will fail if any part of the opt can't be handled fn new(opt: Options) -> Result { let (config_dir, secret) = { let config_dir = match cmn::assure_config_dir_exists(&opt.flag_config_dir) { Err(e) => return Err(InvalidOptionsError::single(e, 3)), Ok(p) => p, }; match cmn::application_secret_from_directory(&config_dir, "oauth2-v2-secret.json") { Ok(secret) => (config_dir, secret), Err(e) => return Err(InvalidOptionsError::single(e, 4)) } }; let auth = Authenticator::new(&secret, DefaultAuthenticatorDelegate, hyper::Client::new(), JsonTokenStorage { program_name: "oauth2-v2", db_dir: config_dir.clone(), }, None); let engine = Engine { opt: opt, hub: api::Oauth2::new(hyper::Client::new(), auth), }; match engine._doit(true) { (_, Some(err)) => Err(err), _ => Ok(engine), } } // Execute the call with all the bells and whistles, informing the caller only if there was an error. // The absense of one indicates success. fn doit(&self) -> Option { self._doit(false).0 } } fn main() { let opts: Options = Options::docopt().decode().unwrap_or_else(|e| e.exit()); match Engine::new(opts) { Err(err) => { write!(io::stderr(), "{}", err).ok(); env::set_exit_status(err.exit_code); }, Ok(engine) => { if let Some(err) = engine.doit() { write!(io::stderr(), "{}", err).ok(); env::set_exit_status(1); } } } }