| Index: third_party/google-endpoints/oauth2client/gce.py
|
| diff --git a/third_party/google-endpoints/oauth2client/gce.py b/third_party/google-endpoints/oauth2client/gce.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..77b08f1eeb1c05d798e6af37b1d9d79eb523e2e6
|
| --- /dev/null
|
| +++ b/third_party/google-endpoints/oauth2client/gce.py
|
| @@ -0,0 +1,111 @@
|
| +# Copyright 2014 Google Inc. All rights reserved.
|
| +#
|
| +# Licensed under the Apache License, Version 2.0 (the "License");
|
| +# you may not use this file except in compliance with the License.
|
| +# You may obtain a copy of the License at
|
| +#
|
| +# http://www.apache.org/licenses/LICENSE-2.0
|
| +#
|
| +# Unless required by applicable law or agreed to in writing, software
|
| +# distributed under the License is distributed on an "AS IS" BASIS,
|
| +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
| +# See the License for the specific language governing permissions and
|
| +# limitations under the License.
|
| +
|
| +"""Utilities for Google Compute Engine
|
| +
|
| +Utilities for making it easier to use OAuth 2.0 on Google Compute Engine.
|
| +"""
|
| +
|
| +import json
|
| +import logging
|
| +from six.moves import urllib
|
| +
|
| +from oauth2client._helpers import _from_bytes
|
| +from oauth2client import util
|
| +from oauth2client.client import HttpAccessTokenRefreshError
|
| +from oauth2client.client import AssertionCredentials
|
| +
|
| +
|
| +__author__ = 'jcgregorio@google.com (Joe Gregorio)'
|
| +
|
| +logger = logging.getLogger(__name__)
|
| +
|
| +# URI Template for the endpoint that returns access_tokens.
|
| +META = ('http://metadata.google.internal/0.1/meta-data/service-accounts/'
|
| + 'default/acquire{?scope}')
|
| +
|
| +
|
| +class AppAssertionCredentials(AssertionCredentials):
|
| + """Credentials object for Compute Engine Assertion Grants
|
| +
|
| + This object will allow a Compute Engine instance to identify itself to
|
| + Google and other OAuth 2.0 servers that can verify assertions. It can be
|
| + used for the purpose of accessing data stored under an account assigned to
|
| + the Compute Engine instance itself.
|
| +
|
| + This credential does not require a flow to instantiate because it
|
| + represents a two legged flow, and therefore has all of the required
|
| + information to generate and refresh its own access tokens.
|
| + """
|
| +
|
| + @util.positional(2)
|
| + def __init__(self, scope, **kwargs):
|
| + """Constructor for AppAssertionCredentials
|
| +
|
| + Args:
|
| + scope: string or iterable of strings, scope(s) of the credentials
|
| + being requested.
|
| + """
|
| + self.scope = util.scopes_to_string(scope)
|
| + self.kwargs = kwargs
|
| +
|
| + # Assertion type is no longer used, but still in the
|
| + # parent class signature.
|
| + super(AppAssertionCredentials, self).__init__(None)
|
| +
|
| + @classmethod
|
| + def from_json(cls, json_data):
|
| + data = json.loads(_from_bytes(json_data))
|
| + return AppAssertionCredentials(data['scope'])
|
| +
|
| + def _refresh(self, http_request):
|
| + """Refreshes the access_token.
|
| +
|
| + Skip all the storage hoops and just refresh using the API.
|
| +
|
| + Args:
|
| + http_request: callable, a callable that matches the method
|
| + signature of httplib2.Http.request, used to make
|
| + the refresh request.
|
| +
|
| + Raises:
|
| + HttpAccessTokenRefreshError: When the refresh fails.
|
| + """
|
| + query = '?scope=%s' % urllib.parse.quote(self.scope, '')
|
| + uri = META.replace('{?scope}', query)
|
| + response, content = http_request(uri)
|
| + content = _from_bytes(content)
|
| + if response.status == 200:
|
| + try:
|
| + d = json.loads(content)
|
| + except Exception as e:
|
| + raise HttpAccessTokenRefreshError(str(e),
|
| + status=response.status)
|
| + self.access_token = d['accessToken']
|
| + else:
|
| + if response.status == 404:
|
| + content += (' This can occur if a VM was created'
|
| + ' with no service account or scopes.')
|
| + raise HttpAccessTokenRefreshError(content, status=response.status)
|
| +
|
| + @property
|
| + def serialization_data(self):
|
| + raise NotImplementedError(
|
| + 'Cannot serialize credentials for GCE service accounts.')
|
| +
|
| + def create_scoped_required(self):
|
| + return not self.scope
|
| +
|
| + def create_scoped(self, scopes):
|
| + return AppAssertionCredentials(scopes, **self.kwargs)
|
|
|