OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file |
| 2 // for details. All rights reserved. Use of this source code is governed by a |
| 3 // BSD-style license that can be found in the LICENSE file. |
| 4 |
| 5 library oauth2; |
| 6 |
| 7 import 'dart:io'; |
| 8 import 'dart:uri'; |
| 9 |
| 10 // TODO(nweiz): Make this a "package:" URL, or something nicer than this. |
| 11 import '../../pkg/oauth2/lib/oauth2.dart'; |
| 12 import 'curl_client.dart'; |
| 13 import 'io.dart'; |
| 14 import 'system_cache.dart'; |
| 15 import 'utils.dart'; |
| 16 |
| 17 export '../../pkg/oauth2/lib/oauth2.dart'; |
| 18 |
| 19 /// The pub client's OAuth2 identifier. |
| 20 final _identifier = '818368855108-8grd2eg9tj9f38os6f1urbcvsq399u8n.apps.' |
| 21 'googleusercontent.com'; |
| 22 |
| 23 /// The pub client's OAuth2 secret. This isn't actually meant to be kept a |
| 24 /// secret. |
| 25 final _secret = 'SWeqj8seoJW0w7_CpEPFLX0K'; |
| 26 |
| 27 /// The URL to which the user will be directed to authorize the pub client to |
| 28 /// get an OAuth2 access token. |
| 29 /// |
| 30 /// `access_type=offline` and `approval_prompt=force` ensures that we always get |
| 31 /// a refresh token from the server. See the [Google OAuth2 documentation][]. |
| 32 /// |
| 33 /// [Google OAuth2 documentation]: https://developers.google.com/accounts/docs/O
Auth2WebServer#offline |
| 34 final _authorizationEndpoint = new Uri.fromString( |
| 35 'https://accounts.google.com/o/oauth2/auth?access_type=offline' |
| 36 '&approval_prompt=force'); |
| 37 |
| 38 /// The URL from which the pub client will request an access token once it's |
| 39 /// been authorized by the user. |
| 40 final _tokenEndpoint = new Uri.fromString( |
| 41 'https://accounts.google.com/o/oauth2/token'); |
| 42 |
| 43 /// The OAuth2 scopes that the pub client needs. Currently the client only needs |
| 44 /// the user's email so that the server can verify their identity. |
| 45 final _scopes = ['https://www.googleapis.com/auth/userinfo.email']; |
| 46 |
| 47 /// An in-memory cache of the user's OAuth2 credentials. This should always be |
| 48 /// the same as the credentials file stored in the system cache. |
| 49 Credentials _credentials; |
| 50 |
| 51 /// Asynchronously passes an OAuth2 [Client] to [fn], and closes the client when |
| 52 /// the [Future] returned by [fn] completes. |
| 53 /// |
| 54 /// This takes care of loading and saving the client's credentials, as well as |
| 55 /// prompting the user for their authorization. |
| 56 Future withClient(SystemCache cache, Future fn(Client client)) { |
| 57 return _getClient(cache).chain((client) { |
| 58 var completer = new Completer(); |
| 59 var future = fn(client); |
| 60 future.onComplete((_) { |
| 61 try { |
| 62 client.close(); |
| 63 // Be sure to save the credentials even when an error happens. Also be |
| 64 // sure to pipe the exception from `future` to `completer`. |
| 65 chainToCompleter( |
| 66 _saveCredentials(cache, client.credentials).chain((_) => future), |
| 67 completer); |
| 68 } catch (e, stackTrace) { |
| 69 // onComplete will drop exceptions on the floor. We want to ensure that |
| 70 // any programming errors here don't go un-noticed. See issue 4127. |
| 71 completer.completeException(e, stackTrace); |
| 72 } |
| 73 }); |
| 74 return completer.future; |
| 75 }); |
| 76 } |
| 77 |
| 78 /// Gets a new OAuth2 client. If saved credentials are available, those are |
| 79 /// used; otherwise, the user is prompted to authorize the pub client. |
| 80 Future<Client> _getClient(SystemCache cache) { |
| 81 var httpClient = new CurlClient(); |
| 82 |
| 83 return _loadCredentials(cache).chain((credentials) { |
| 84 if (credentials != null) { |
| 85 return new Future.immediate(new Client( |
| 86 _identifier, _secret, credentials, httpClient: httpClient)); |
| 87 } |
| 88 |
| 89 // Allow the tests to inject their own token endpoint URL. |
| 90 var tokenEndpoint = Platform.environment['_PUB_TEST_TOKEN_ENDPOINT']; |
| 91 if (tokenEndpoint != null) { |
| 92 tokenEndpoint = new Uri.fromString(tokenEndpoint); |
| 93 } else { |
| 94 tokenEndpoint = _tokenEndpoint; |
| 95 } |
| 96 |
| 97 var grant = new AuthorizationCodeGrant( |
| 98 _identifier, |
| 99 _secret, |
| 100 _authorizationEndpoint, |
| 101 tokenEndpoint, |
| 102 httpClient: httpClient); |
| 103 |
| 104 // TODO(nweiz): spin up a server on localhost and redirect the user there so |
| 105 // they don't have to copy/paste the authorization code. See issue 6951. |
| 106 var authUrl = grant.getAuthorizationUrl( |
| 107 new Uri.fromString('urn:ietf:wg:oauth:2.0:oob'), scopes: _scopes); |
| 108 |
| 109 stdout.writeString( |
| 110 'Pub needs your authorization to upload packages on your behalf.\n' |
| 111 'Go to $authUrl\n' |
| 112 'Then click "Allow access" and paste the code below:\n' |
| 113 '> '); |
| 114 return readLine().chain(grant.handleAuthorizationCode); |
| 115 }).chain((client) { |
| 116 return _saveCredentials(cache, client.credentials).transform((_) => client); |
| 117 }); |
| 118 } |
| 119 |
| 120 /// Loads the user's OAuth2 credentials from the in-memory cache or the |
| 121 /// filesystem if possible. If the credentials can't be loaded for any reason, |
| 122 /// the returned [Future] will complete to null. |
| 123 Future<Credentials> _loadCredentials(SystemCache cache) { |
| 124 if (_credentials != null) return new Future.immediate(_credentials); |
| 125 return fileExists(_credentialsFile(cache)).chain((credentialsExist) { |
| 126 if (!credentialsExist) return new Future.immediate(null); |
| 127 |
| 128 return readTextFile(_credentialsFile(cache)).transform((credentialsJson) { |
| 129 var credentials = new Credentials.fromJson(credentialsJson); |
| 130 if (credentials.isExpired && !credentials.canRefresh) { |
| 131 printError("Pub's authorization to upload packages has expired and " |
| 132 "can't be automatically refreshed."); |
| 133 return null; // null means re-authorize |
| 134 } |
| 135 |
| 136 return credentials; |
| 137 }); |
| 138 }).transformException((e) { |
| 139 printError('Warning: could not load the saved OAuth2 credentials:' |
| 140 ' $e\n' |
| 141 'Obtaining new credentials...'); |
| 142 return null; // null means re-authorize |
| 143 }); |
| 144 } |
| 145 |
| 146 /// Save the user's OAuth2 credentials to the in-memory cache and the |
| 147 /// filesystem. |
| 148 Future _saveCredentials(SystemCache cache, Credentials credentials) { |
| 149 _credentials = credentials; |
| 150 var credentialsFile = _credentialsFile(cache); |
| 151 return ensureDir(dirname(credentialsFile)).chain((_) => |
| 152 writeTextFile(credentialsFile, credentials.toJson())); |
| 153 } |
| 154 |
| 155 /// The path to the file in which the user's OAuth2 credentials are stored. |
| 156 String _credentialsFile(SystemCache cache) => |
| 157 join(cache.rootDir, 'credentials.json'); |
OLD | NEW |