1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
use crate::internals::proto::{
Oauth,
SecretString,
};
/// Oauth Options configuration
///
/// https://ngrok.com/docs/http/oauth/
#[derive(Clone, Default)]
pub struct OauthOptions {
/// The OAuth provider to use
provider: String,
/// The client ID, if a custom one is being used
client_id: String,
/// The client secret, if a custom one is being used
client_secret: SecretString,
/// Email addresses of users to authorize.
allow_emails: Vec<String>,
/// Email domains of users to authorize.
allow_domains: Vec<String>,
/// OAuth scopes to request from the provider.
scopes: Vec<String>,
}
impl OauthOptions {
/// Create a new [OauthOptions] for the given provider.
pub fn new(provider: impl Into<String>) -> Self {
OauthOptions {
provider: provider.into(),
..Default::default()
}
}
/// Provide an OAuth client ID for custom apps.
pub fn client_id(&mut self, id: impl Into<String>) -> &mut Self {
self.client_id = id.into();
self
}
/// Provide an OAuth client secret for custom apps.
pub fn client_secret(&mut self, secret: impl Into<String>) -> &mut Self {
self.client_secret = SecretString::from(secret.into());
self
}
/// Append an email address to the list of allowed emails.
pub fn allow_email(&mut self, email: impl Into<String>) -> &mut Self {
self.allow_emails.push(email.into());
self
}
/// Append an email domain to the list of allowed domains.
pub fn allow_domain(&mut self, domain: impl Into<String>) -> &mut Self {
self.allow_domains.push(domain.into());
self
}
/// Append a scope to the list of scopes to request.
pub fn scope(&mut self, scope: impl Into<String>) -> &mut Self {
self.scopes.push(scope.into());
self
}
}
// transform into the wire protocol format
impl From<OauthOptions> for Oauth {
fn from(o: OauthOptions) -> Self {
Oauth {
provider: o.provider,
client_id: o.client_id,
client_secret: o.client_secret,
sealed_client_secret: Default::default(), // unused in this context
allow_emails: o.allow_emails,
allow_domains: o.allow_domains,
scopes: o.scopes,
}
}
}