1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
|
use std::fmt::Write;
fn main() {
println!(
"cargo:rustc-env=BUILD_TARGET={}",
std::env::var("TARGET").unwrap()
);
set_oauth_ids();
}
fn set_oauth_ids() {
let out_dir = std::path::PathBuf::from(std::env::var_os("OUT_DIR").expect("always present"));
println!("cargo::rerun-if-env-changed=BUILTIN_CLIENT_IDS");
let mut client_info_branches = String::new();
if let Ok(oauth_supported) = std::env::var("BUILTIN_CLIENT_IDS") {
if oauth_supported.contains('"') {
println!("cargo::error=BUILTIN_CLIENT_IDS contains a quote character. If you did not set it yourself, this could mean it is malicious and trying to inject code.");
return;
}
for info in oauth_supported.split(",") {
let Some((domain, id)) = info.split_once(" ") else {
println!("cargo::warning=BUILTIN_CLIENT_IDS is set improperly");
continue;
};
if uuid::Uuid::parse_str(&id).is_err() {
println!("cargo::warning=client id for {domain} is invalid. It should be a UUID");
continue;
}
writeln!(&mut client_info_branches, "\"{domain}\" => Some(\"{id}\"),")
.expect("writing to string can't fail");
}
}
let oauth_match = format!(
"match host {{
{client_info_branches}
_ => None,
}}"
);
let oauth_src_file_path = out_dir.join("oauth_client_info.rs");
std::fs::write(oauth_src_file_path, oauth_match)
.expect("Failed to write oauth client info file");
}
|