1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
|
use oauth2::basic::BasicClient;
use oauth2::{
AuthUrl, ClientId, DeviceAuthorizationUrl, Scope, StandardDeviceAuthorizationResponse, TokenUrl,
};
use std::error::Error;
#[tokio::main]
async fn main() -> Result<(), Box<dyn Error>> {
let client = BasicClient::new(ClientId::new("client_id".to_string()))
.set_auth_uri(AuthUrl::new(
"https://login.microsoftonline.com/common/oauth2/v2.0/authorize".to_string(),
)?)
.set_token_uri(TokenUrl::new(
"https://login.microsoftonline.com/common/oauth2/v2.0/token".to_string(),
)?)
.set_device_authorization_url(DeviceAuthorizationUrl::new(
"https://login.microsoftonline.com/common/oauth2/v2.0/devicecode".to_string(),
)?);
let http_client = reqwest::ClientBuilder::new()
// Following redirects opens the client up to SSRF vulnerabilities.
.redirect(reqwest::redirect::Policy::none())
.build()
.expect("Client should build");
let details: StandardDeviceAuthorizationResponse = client
.exchange_device_code()
.add_scope(Scope::new("read".to_string()))
.request_async(&http_client)
.await?;
eprintln!(
"Open this URL in your browser:\n{}\nand enter the code: {}",
details.verification_uri(),
details.user_code().secret(),
);
let token_result = client
.exchange_device_access_token(&details)
.request_async(&http_client, tokio::time::sleep, None)
.await;
eprintln!("Token:{token_result:?}");
Ok(())
}
|