Index: third_party/gsutil/plugins/sso_auth.py |
diff --git a/third_party/gsutil/plugins/sso_auth.py b/third_party/gsutil/plugins/sso_auth.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..ff285fdf877b70d07090c8df4d3b4da9b3ce763c |
--- /dev/null |
+++ b/third_party/gsutil/plugins/sso_auth.py |
@@ -0,0 +1,105 @@ |
+# Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+"""AuthHandler plugin for gsutil's boto to support LOAS based auth.""" |
+ |
+import getpass |
+import json |
+import os |
+import re |
+import subprocess |
+import time |
+import urllib2 |
+ |
+from boto.auth_handler import AuthHandler |
+from boto.auth_handler import NotReadyToAuthenticate |
+ |
+CMD = ['stubby', '--proto2', 'call', 'blade:sso', 'CorpLogin.Exchange'] |
+ |
+STUBBY_CMD = """target: { |
+ scope: GAIA_USER |
+ name: "%s" |
+} |
+target_credential: { |
+ type: OAUTH2_TOKEN |
+ oauth2_attributes: { |
+ scope: 'https://www.googleapis.com/auth/devstorage.read_only' |
+ } |
+}""" |
+ |
+COOKIE_LOCATION = os.path.expanduser('~/.devstore_token') |
+ |
+TOKEN_EXPIRY = 300 |
+ |
+ |
+class SSOAuthError(Exception): |
+ pass |
+ |
+ |
+class SSOAuth(AuthHandler): |
+ """SSO based auth handler.""" |
+ |
+ capability = ['google-oauth2', 's3'] |
+ |
+ def __init__(self, path, config, provider): |
+ if provider.name == 'google' and self.has_prodaccess(): |
+ # If we don't have a loas token, then bypass this auth handler. |
+ if subprocess.call('loas_check', |
+ stdout=subprocess.PIPE, |
+ stderr=subprocess.PIPE): |
+ raise NotReadyToAuthenticate() |
+ else: |
+ raise NotReadyToAuthenticate() |
+ self.token = None |
+ self.expire = 0 |
+ |
+ def GetAccessToken(self): |
+ """Returns a valid devstore access token. |
+ |
+ This will return from an in-memory cache if the token is there already, |
+ then try a filesystem cache, and then runs a stubby call if none of the |
+ caches have a valid token. |
+ """ |
+ if self.token and self.expire > time.time(): |
+ return self.token |
+ |
+ # Try to retrieve token from filesystem cache. |
+ if os.path.exists(COOKIE_LOCATION): |
+ last_modified = os.path.getmtime(COOKIE_LOCATION) |
+ if time.time() - last_modified < TOKEN_EXPIRY: |
+ with open(COOKIE_LOCATION, 'rb') as f: |
+ self.token = f.read() |
+ self.expire = last_modified + TOKEN_EXPIRY |
+ return self.token |
+ |
+ # If the token is not in either caches, or has expired, then fetch token. |
+ username = '%s@google.com' % getpass.getuser() |
+ proc = subprocess.Popen(CMD, stdin=subprocess.PIPE, stdout=subprocess.PIPE) |
+ out, err = proc.communicate(STUBBY_CMD % username) |
+ if proc.returncode: |
+ raise SSOAuthError('Stubby returned %d\n%s' % (proc.returncode, err)) |
+ token_match = re.search(r'oauth2_token: "(.*)"$', out) |
+ |
+ if not token_match: |
+ raise SSOAuthError('Oauth2 token not found in %s' % out) |
+ |
+ token = token_match.group(1) |
+ self.token = token |
+ self.expire = time.time() + TOKEN_EXPIRY |
+ with os.fdopen(os.open(COOKIE_LOCATION, |
+ os.O_WRONLY | os.O_CREAT, |
+ 0600), 'wb') as f: |
+ f.write(token) |
+ return token |
+ |
+ def add_auth(self, http_request): |
+ http_request.headers['Authorization'] = 'OAuth %s' % self.GetAccessToken() |
+ |
+ @staticmethod |
+ def has_prodaccess(): |
+ for path in os.environ['PATH'].split(os.pathsep): |
+ exe_file = os.path.join(path, 'prodaccess') |
+ if os.path.exists(exe_file) and os.access(exe_file, os.X_OK): |
+ return True |
+ return False |