Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(95)

Side by Side Diff: utils/pub/oauth2.dart

Issue 11308212: Add an initial "pub lish" command. (Closed) Base URL: https://dart.googlecode.com/svn/branches/bleeding_edge/dart
Patch Set: Code review changes Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « utils/pub/io.dart ('k') | utils/pub/pub.dart » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file
2 // for details. All rights reserved. Use of this source code is governed by a
3 // BSD-style license that can be found in the LICENSE file.
4
5 library oauth2;
6
7 import 'dart:io';
8 import 'dart:uri';
9
10 // TODO(nweiz): Make this a "package:" URL, or something nicer than this.
11 import '../../pkg/oauth2/lib/oauth2.dart';
12 import 'curl_client.dart';
13 import 'io.dart';
14 import 'system_cache.dart';
15 import 'utils.dart';
16
17 export '../../pkg/oauth2/lib/oauth2.dart';
18
19 /// The pub client's OAuth2 identifier.
20 final _identifier = '818368855108-8grd2eg9tj9f38os6f1urbcvsq399u8n.apps.'
21 'googleusercontent.com';
22
23 /// The pub client's OAuth2 secret. This isn't actually meant to be kept a
24 /// secret.
25 final _secret = 'SWeqj8seoJW0w7_CpEPFLX0K';
26
27 /// The URL to which the user will be directed to authorize the pub client to
28 /// get an OAuth2 access token.
29 ///
30 /// `access_type=offline` and `approval_prompt=force` ensures that we always get
31 /// a refresh token from the server. See the [Google OAuth2 documentation][].
32 ///
33 /// [Google OAuth2 documentation]: https://developers.google.com/accounts/docs/O Auth2WebServer#offline
34 final _authorizationEndpoint = new Uri.fromString(
35 'https://accounts.google.com/o/oauth2/auth?access_type=offline'
36 '&approval_prompt=force');
37
38 /// The URL from which the pub client will request an access token once it's
39 /// been authorized by the user.
40 final _tokenEndpoint = new Uri.fromString(
41 'https://accounts.google.com/o/oauth2/token');
42
43 /// The OAuth2 scopes that the pub client needs. Currently the client only needs
44 /// the user's email so that the server can verify their identity.
45 final _scopes = ['https://www.googleapis.com/auth/userinfo.email'];
46
47 /// An in-memory cache of the user's OAuth2 credentials. This should always be
48 /// the same as the credentials file stored in the system cache.
49 Credentials _credentials;
50
51 /// Asynchronously passes an OAuth2 [Client] to [fn], and closes the client when
52 /// the [Future] returned by [fn] completes.
53 ///
54 /// This takes care of loading and saving the client's credentials, as well as
55 /// prompting the user for their authorization.
56 Future withClient(SystemCache cache, Future fn(Client client)) {
57 return _getClient(cache).chain((client) {
58 var completer = new Completer();
59 var future = fn(client);
60 future.onComplete((_) {
61 try {
62 client.close();
63 // Be sure to save the credentials even when an error happens. Also be
64 // sure to pipe the exception from `future` to `completer`.
65 chainToCompleter(
66 _saveCredentials(cache, client.credentials).chain((_) => future),
67 completer);
68 } catch (e, stackTrace) {
69 // onComplete will drop exceptions on the floor. We want to ensure that
70 // any programming errors here don't go un-noticed. See issue 4127.
71 completer.completeException(e, stackTrace);
72 }
73 });
74 return completer.future;
75 });
76 }
77
78 /// Gets a new OAuth2 client. If saved credentials are available, those are
79 /// used; otherwise, the user is prompted to authorize the pub client.
80 Future<Client> _getClient(SystemCache cache) {
81 var httpClient = new CurlClient();
82
83 return _loadCredentials(cache).chain((credentials) {
84 if (credentials != null) {
85 return new Future.immediate(new Client(
86 _identifier, _secret, credentials, httpClient: httpClient));
87 }
88
89 // Allow the tests to inject their own token endpoint URL.
90 var tokenEndpoint = Platform.environment['_PUB_TEST_TOKEN_ENDPOINT'];
91 if (tokenEndpoint != null) {
92 tokenEndpoint = new Uri.fromString(tokenEndpoint);
93 } else {
94 tokenEndpoint = _tokenEndpoint;
95 }
96
97 var grant = new AuthorizationCodeGrant(
98 _identifier,
99 _secret,
100 _authorizationEndpoint,
101 tokenEndpoint,
102 httpClient: httpClient);
103
104 // TODO(nweiz): spin up a server on localhost and redirect the user there so
105 // they don't have to copy/paste the authorization code. See issue 6951.
106 var authUrl = grant.getAuthorizationUrl(
107 new Uri.fromString('urn:ietf:wg:oauth:2.0:oob'), scopes: _scopes);
108
109 stdout.writeString(
110 'Pub needs your authorization to upload packages on your behalf.\n'
111 'Go to $authUrl\n'
112 'Then click "Allow access" and paste the code below:\n'
113 '> ');
114 return readLine().chain(grant.handleAuthorizationCode);
115 }).chain((client) {
116 return _saveCredentials(cache, client.credentials).transform((_) => client);
117 });
118 }
119
120 /// Loads the user's OAuth2 credentials from the in-memory cache or the
121 /// filesystem if possible. If the credentials can't be loaded for any reason,
122 /// the returned [Future] will complete to null.
123 Future<Credentials> _loadCredentials(SystemCache cache) {
124 if (_credentials != null) return new Future.immediate(_credentials);
125 return fileExists(_credentialsFile(cache)).chain((credentialsExist) {
126 if (!credentialsExist) return new Future.immediate(null);
127
128 return readTextFile(_credentialsFile(cache)).transform((credentialsJson) {
129 var credentials = new Credentials.fromJson(credentialsJson);
130 if (credentials.isExpired && !credentials.canRefresh) {
131 printError("Pub's authorization to upload packages has expired and "
132 "can't be automatically refreshed.");
133 return null; // null means re-authorize
134 }
135
136 return credentials;
137 });
138 }).transformException((e) {
139 printError('Warning: could not load the saved OAuth2 credentials:'
140 ' $e\n'
141 'Obtaining new credentials...');
142 return null; // null means re-authorize
143 });
144 }
145
146 /// Save the user's OAuth2 credentials to the in-memory cache and the
147 /// filesystem.
148 Future _saveCredentials(SystemCache cache, Credentials credentials) {
149 _credentials = credentials;
150 var credentialsFile = _credentialsFile(cache);
151 return ensureDir(dirname(credentialsFile)).chain((_) =>
152 writeTextFile(credentialsFile, credentials.toJson()));
153 }
154
155 /// The path to the file in which the user's OAuth2 credentials are stored.
156 String _credentialsFile(SystemCache cache) =>
157 join(cache.rootDir, 'credentials.json');
OLDNEW
« no previous file with comments | « utils/pub/io.dart ('k') | utils/pub/pub.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698