diff --git a/src/main.rs b/src/main.rs index 354772f..eb17c63 100644 --- a/src/main.rs +++ b/src/main.rs @@ -25,7 +25,7 @@ use color_eyre::eyre::Context; use reqwest::tls::Version; use serde::{Deserialize, Serialize}; use tokio::sync::Mutex; -use tracing::{error, info}; +use tracing::{debug, error, info}; macro_rules! unwrap_env { ($name:literal) => { @@ -63,7 +63,9 @@ const ALLOWED_USERS: &[u64] = &[/*maiboyer*/ 159559, /*nfelsemb*/ 95340]; #[tokio::main] async fn main() { - tracing_subscriber::fmt::init(); + tracing_subscriber::fmt() + .with_max_level(tracing::Level::DEBUG) + .init(); let local = tokio::task::LocalSet::new(); local .run_until(async { @@ -71,7 +73,7 @@ async fn main() { let http = reqwest::ClientBuilder::new() // Following redirects opens the client up to SSRF vulnerabilities. .redirect(reqwest::redirect::Policy::none()) - .user_agent("FftManager/1.0") + .user_agent("FFTManager/1.0") .tls_info(true) .min_tls_version(Version::TLS_1_0) .max_tls_version(Version::TLS_1_2) @@ -153,9 +155,11 @@ async fn oauth2_callback( ) -> Result { let inner = || async { let Some(code) = params.get("code") else { + debug!("No code"); return Ok::<_, color_eyre::eyre::Report>((jar, Redirect::to("/manager"))); }; let Some(state_csrf) = params.get("state") else { + debug!("No state"); return Ok((jar, Redirect::to("/manager"))); }; let token = state