aboutsummaryrefslogtreecommitdiffstats
path: root/src/bin/rbw/commands.rs
diff options
context:
space:
mode:
authorJesse Luehrs <doy@tozt.net>2020-04-18 03:45:49 -0400
committerJesse Luehrs <doy@tozt.net>2020-04-18 03:45:49 -0400
commitf2e12534b876e73a0c7c4593acb23ac200529309 (patch)
tree3348552733e4fa812d513468ce0f172a27a466ef /src/bin/rbw/commands.rs
parentf1d63c8bfb76b218822ee417e98a9015877ab528 (diff)
downloadrbw-f2e12534b876e73a0c7c4593acb23ac200529309.tar.gz
rbw-f2e12534b876e73a0c7c4593acb23ac200529309.zip
refactor
Diffstat (limited to 'src/bin/rbw/commands.rs')
-rw-r--r--src/bin/rbw/commands.rs50
1 files changed, 16 insertions, 34 deletions
diff --git a/src/bin/rbw/commands.rs b/src/bin/rbw/commands.rs
index acf3f32..253ce5d 100644
--- a/src/bin/rbw/commands.rs
+++ b/src/bin/rbw/commands.rs
@@ -114,8 +114,9 @@ pub fn add(name: &str, username: Option<&str>) -> anyhow::Result<()> {
let email = config_email()?;
let mut db = rbw::db::Db::load(&email)?;
// unwrap is safe here because the call to unlock above is guaranteed to
- // populate it or error
- let access_token = db.access_token.unwrap();
+ // populate these or error
+ let access_token = db.access_token.as_ref().unwrap();
+ let refresh_token = db.refresh_token.as_ref().unwrap();
let name = crate::actions::encrypt(name)?;
@@ -153,21 +154,11 @@ pub fn add(name: &str, username: Option<&str>) -> anyhow::Result<()> {
notes,
};
- let res = rbw::actions::add(&access_token, &cipher);
- if let Err(e) = &res {
- if let rbw::error::Error::RequestUnauthorized = e {
- if let Some(refresh_token) = &db.refresh_token {
- let access_token =
- rbw::actions::exchange_refresh_token(refresh_token)?;
- db.access_token = Some(access_token.clone());
- db.save(&email).context("failed to save database")?;
- rbw::actions::add(&access_token, &cipher)?;
- } else {
- return Err(anyhow::anyhow!(
- "failed to find refresh token in db"
- ));
- }
- }
+ if let Some(access_token) =
+ rbw::actions::add(&access_token, &refresh_token, &cipher)?
+ {
+ db.access_token = Some(access_token);
+ db.save(&email).context("failed to save database")?;
}
crate::actions::sync()?;
@@ -190,8 +181,9 @@ pub fn generate(
let email = config_email()?;
let mut db = rbw::db::Db::load(&email)?;
// unwrap is safe here because the call to unlock above is guaranteed
- // to populate it or error
- let access_token = db.access_token.unwrap();
+ // to populate these or error
+ let access_token = db.access_token.as_ref().unwrap();
+ let refresh_token = db.refresh_token.as_ref().unwrap();
let name = crate::actions::encrypt(name)?;
let username = username
@@ -208,21 +200,11 @@ pub fn generate(
notes: None,
};
- let res = rbw::actions::add(&access_token, &cipher);
- if let Err(e) = &res {
- if let rbw::error::Error::RequestUnauthorized = e {
- if let Some(refresh_token) = &db.refresh_token {
- let access_token =
- rbw::actions::exchange_refresh_token(refresh_token)?;
- db.access_token = Some(access_token.clone());
- db.save(&email).context("failed to save database")?;
- rbw::actions::add(&access_token, &cipher)?;
- } else {
- return Err(anyhow::anyhow!(
- "failed to find refresh token in db"
- ));
- }
- }
+ if let Some(access_token) =
+ rbw::actions::add(&access_token, &refresh_token, &cipher)?
+ {
+ db.access_token = Some(access_token);
+ db.save(&email).context("failed to save database")?;
}
crate::actions::sync()?;