Skip to content

Commit 21ccfb8

Browse files
committed
Don't try to compile cargo-credential-gnome-secret on non-Linux platforms.
1 parent be42872 commit 21ccfb8

File tree

3 files changed

+202
-189
lines changed

3 files changed

+202
-189
lines changed
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,8 @@
11
fn main() {
2-
pkg_config::probe_library("libsecret-1").unwrap();
2+
if cfg!(target_os = "linux") {
3+
// TODO: Consider ignoring errors when libsecret is not installed and
4+
// switching the impl to UnsupportedCredential (possibly along with a
5+
// warning?).
6+
pkg_config::probe_library("libsecret-1").unwrap();
7+
}
38
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,190 @@
1+
//! Implementation of the libsecret credential helper.
2+
3+
use cargo_credential::{Credential, Error};
4+
use std::ffi::{CStr, CString};
5+
use std::os::raw::{c_char, c_int};
6+
use std::ptr::{null, null_mut};
7+
8+
#[allow(non_camel_case_types)]
9+
type gchar = c_char;
10+
11+
#[allow(non_camel_case_types)]
12+
type gboolean = c_int;
13+
14+
type GQuark = u32;
15+
16+
#[repr(C)]
17+
struct GError {
18+
domain: GQuark,
19+
code: c_int,
20+
message: *mut gchar,
21+
}
22+
23+
#[repr(C)]
24+
struct GCancellable {
25+
_private: [u8; 0],
26+
}
27+
28+
#[repr(C)]
29+
struct SecretSchema {
30+
name: *const gchar,
31+
flags: SecretSchemaFlags,
32+
attributes: [SecretSchemaAttribute; 32],
33+
}
34+
35+
#[repr(C)]
36+
#[derive(Copy, Clone)]
37+
struct SecretSchemaAttribute {
38+
name: *const gchar,
39+
attr_type: SecretSchemaAttributeType,
40+
}
41+
42+
#[repr(C)]
43+
enum SecretSchemaFlags {
44+
None = 0,
45+
}
46+
47+
#[repr(C)]
48+
#[derive(Copy, Clone)]
49+
enum SecretSchemaAttributeType {
50+
String = 0,
51+
}
52+
53+
extern "C" {
54+
fn secret_password_store_sync(
55+
schema: *const SecretSchema,
56+
collection: *const gchar,
57+
label: *const gchar,
58+
password: *const gchar,
59+
cancellable: *mut GCancellable,
60+
error: *mut *mut GError,
61+
...
62+
) -> gboolean;
63+
fn secret_password_clear_sync(
64+
schema: *const SecretSchema,
65+
cancellable: *mut GCancellable,
66+
error: *mut *mut GError,
67+
...
68+
) -> gboolean;
69+
fn secret_password_lookup_sync(
70+
schema: *const SecretSchema,
71+
cancellable: *mut GCancellable,
72+
error: *mut *mut GError,
73+
...
74+
) -> *mut gchar;
75+
}
76+
77+
pub struct GnomeSecret;
78+
79+
fn label(index_url: &str) -> CString {
80+
CString::new(format!("cargo-registry:{}", index_url)).unwrap()
81+
}
82+
83+
fn schema() -> SecretSchema {
84+
let mut attributes = [SecretSchemaAttribute {
85+
name: null(),
86+
attr_type: SecretSchemaAttributeType::String,
87+
}; 32];
88+
attributes[0] = SecretSchemaAttribute {
89+
name: b"url\0".as_ptr() as *const gchar,
90+
attr_type: SecretSchemaAttributeType::String,
91+
};
92+
SecretSchema {
93+
name: b"org.rust-lang.cargo.registry\0".as_ptr() as *const gchar,
94+
flags: SecretSchemaFlags::None,
95+
attributes,
96+
}
97+
}
98+
99+
impl Credential for GnomeSecret {
100+
fn name(&self) -> &'static str {
101+
env!("CARGO_PKG_NAME")
102+
}
103+
104+
fn get(&self, index_url: &str) -> Result<String, Error> {
105+
let mut error: *mut GError = null_mut();
106+
let attr_url = CString::new("url").unwrap();
107+
let index_url_c = CString::new(index_url).unwrap();
108+
let schema = schema();
109+
unsafe {
110+
let token_c = secret_password_lookup_sync(
111+
&schema,
112+
null_mut(),
113+
&mut error,
114+
attr_url.as_ptr(),
115+
index_url_c.as_ptr(),
116+
null() as *const gchar,
117+
);
118+
if !error.is_null() {
119+
return Err(format!(
120+
"failed to get token: {}",
121+
CStr::from_ptr((*error).message).to_str()?
122+
)
123+
.into());
124+
}
125+
if token_c.is_null() {
126+
return Err(format!("cannot find token for {}", index_url).into());
127+
}
128+
let token = CStr::from_ptr(token_c)
129+
.to_str()
130+
.map_err(|e| format!("expected utf8 token: {}", e))?
131+
.to_string();
132+
Ok(token)
133+
}
134+
}
135+
136+
fn store(&self, index_url: &str, token: &str, name: Option<&str>) -> Result<(), Error> {
137+
let label = label(name.unwrap_or(index_url));
138+
let token = CString::new(token).unwrap();
139+
let mut error: *mut GError = null_mut();
140+
let attr_url = CString::new("url").unwrap();
141+
let index_url_c = CString::new(index_url).unwrap();
142+
let schema = schema();
143+
unsafe {
144+
secret_password_store_sync(
145+
&schema,
146+
b"default\0".as_ptr() as *const gchar,
147+
label.as_ptr(),
148+
token.as_ptr(),
149+
null_mut(),
150+
&mut error,
151+
attr_url.as_ptr(),
152+
index_url_c.as_ptr(),
153+
null() as *const gchar,
154+
);
155+
if !error.is_null() {
156+
return Err(format!(
157+
"failed to store token: {}",
158+
CStr::from_ptr((*error).message).to_str()?
159+
)
160+
.into());
161+
}
162+
}
163+
Ok(())
164+
}
165+
166+
fn erase(&self, index_url: &str) -> Result<(), Error> {
167+
let schema = schema();
168+
let mut error: *mut GError = null_mut();
169+
let attr_url = CString::new("url").unwrap();
170+
let index_url_c = CString::new(index_url).unwrap();
171+
unsafe {
172+
secret_password_clear_sync(
173+
&schema,
174+
null_mut(),
175+
&mut error,
176+
attr_url.as_ptr(),
177+
index_url_c.as_ptr(),
178+
null() as *const gchar,
179+
);
180+
if !error.is_null() {
181+
return Err(format!(
182+
"failed to erase token: {}",
183+
CStr::from_ptr((*error).message).to_str()?
184+
)
185+
.into());
186+
}
187+
}
188+
Ok(())
189+
}
190+
}

0 commit comments

Comments
 (0)