Index: third_party/gsutil/oauth2_plugin/oauth2_client.py |
diff --git a/third_party/gsutil/oauth2_plugin/oauth2_client.py b/third_party/gsutil/oauth2_plugin/oauth2_client.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..84c74c87c76f539abb033674424a29e0fb397ed0 |
--- /dev/null |
+++ b/third_party/gsutil/oauth2_plugin/oauth2_client.py |
@@ -0,0 +1,642 @@ |
+# Copyright 2010 Google Inc. All Rights Reserved. |
+# |
+# Licensed under the Apache License, Version 2.0 (the "License"); |
+# you may not use this file except in compliance with the License. |
+# You may obtain a copy of the License at |
+# |
+# http://www.apache.org/licenses/LICENSE-2.0 |
+# |
+# Unless required by applicable law or agreed to in writing, software |
+# distributed under the License is distributed on an "AS IS" BASIS, |
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
+# See the License for the specific language governing permissions and |
+# limitations under the License. |
+ |
+"""An OAuth2 client library. |
+ |
+This library provides a client implementation of the OAuth2 protocol (see |
+http://code.google.com/apis/accounts/docs/OAuth2.html). |
+ |
+**** Experimental API **** |
+ |
+This module is experimental and is subject to modification or removal without |
+notice. |
+""" |
+ |
+# This implementation is inspired by the implementation in |
+# http://code.google.com/p/google-api-python-client/source/browse/oauth2client/, |
+# with the following main differences: |
+# - This library uses the fancy_urllib monkey patch for urllib to correctly |
+# implement SSL certificate validation. |
+# - This library does not assume that client code is using the httplib2 library |
+# to make HTTP requests. |
+# - This library implements caching of access tokens independent of refresh |
+# tokens (in the python API client oauth2client, there is a single class that |
+# encapsulates both refresh and access tokens). |
+ |
+ |
+import cgi |
+import datetime |
+import errno |
+from hashlib import sha1 |
+import logging |
+import os |
+import tempfile |
+import threading |
+import urllib |
+import urllib2 |
+import urlparse |
+ |
+from boto import cacerts |
+from third_party import fancy_urllib |
+ |
+try: |
+ import json |
+except ImportError: |
+ try: |
+ # Try to import from django, should work on App Engine |
+ from django.utils import simplejson as json |
+ except ImportError: |
+ # Try for simplejson |
+ import simplejson as json |
+ |
+LOG = logging.getLogger('oauth2_client') |
+# Lock used for checking/exchanging refresh token, so multithreaded |
+# operation doesn't attempt concurrent refreshes. |
+token_exchange_lock = threading.Lock() |
+ |
+# SHA1 sum of the CA certificates file imported from boto. |
+CACERTS_FILE_SHA1SUM = 'ed024a78d9327f8669b3b117d9eac9e3c9460e9b' |
+ |
+class Error(Exception): |
+ """Base exception for the OAuth2 module.""" |
+ pass |
+ |
+ |
+class AccessTokenRefreshError(Error): |
+ """Error trying to exchange a refresh token into an access token.""" |
+ pass |
+ |
+ |
+class AuthorizationCodeExchangeError(Error): |
+ """Error trying to exchange an authorization code into a refresh token.""" |
+ pass |
+ |
+ |
+class TokenCache(object): |
+ """Interface for OAuth2 token caches.""" |
+ |
+ def PutToken(self, key, value): |
+ raise NotImplementedError |
+ |
+ def GetToken(self, key): |
+ raise NotImplementedError |
+ |
+ |
+class NoopTokenCache(TokenCache): |
+ """A stub implementation of TokenCache that does nothing.""" |
+ |
+ def PutToken(self, key, value): |
+ pass |
+ |
+ def GetToken(self, key): |
+ return None |
+ |
+ |
+class InMemoryTokenCache(TokenCache): |
+ """An in-memory token cache. |
+ |
+ The cache is implemented by a python dict, and inherits the thread-safety |
+ properties of dict. |
+ """ |
+ |
+ def __init__(self): |
+ super(InMemoryTokenCache, self).__init__() |
+ self.cache = dict() |
+ |
+ def PutToken(self, key, value): |
+ LOG.info('InMemoryTokenCache.PutToken: key=%s', key) |
+ self.cache[key] = value |
+ |
+ def GetToken(self, key): |
+ value = self.cache.get(key, None) |
+ LOG.info('InMemoryTokenCache.GetToken: key=%s%s present', |
+ key, ' not' if value is None else '') |
+ return value |
+ |
+ |
+class FileSystemTokenCache(TokenCache): |
+ """An implementation of a token cache that persists tokens on disk. |
+ |
+ Each token object in the cache is stored in serialized form in a separate |
+ file. The cache file's name can be configured via a path pattern that is |
+ parameterized by the key under which a value is cached and optionally the |
+ current processes uid as obtained by os.getuid(). |
+ |
+ Since file names are generally publicly visible in the system, it is important |
+ that the cache key does not leak information about the token's value. If |
+ client code computes cache keys from token values, a cryptographically strong |
+ one-way function must be used. |
+ """ |
+ |
+ def __init__(self, path_pattern=None): |
+ """Creates a FileSystemTokenCache. |
+ |
+ Args: |
+ path_pattern: Optional string argument to specify the path pattern for |
+ cache files. The argument should be a path with format placeholders |
+ '%(key)s' and optionally '%(uid)s'. If the argument is omitted, the |
+ default pattern |
+ <tmpdir>/oauth2client-tokencache.%(uid)s.%(key)s |
+ is used, where <tmpdir> is replaced with the system temp dir as |
+ obtained from tempfile.gettempdir(). |
+ """ |
+ super(FileSystemTokenCache, self).__init__() |
+ self.path_pattern = path_pattern |
+ if not path_pattern: |
+ self.path_pattern = os.path.join( |
+ tempfile.gettempdir(), 'oauth2_client-tokencache.%(uid)s.%(key)s') |
+ |
+ def CacheFileName(self, key): |
+ uid = '_' |
+ try: |
+ # os.getuid() doesn't seem to work in Windows |
+ uid = str(os.getuid()) |
+ except: |
+ pass |
+ return self.path_pattern % {'key': key, 'uid': uid} |
+ |
+ def PutToken(self, key, value): |
+ """Serializes the value to the key's filename. |
+ |
+ To ensure that written tokens aren't leaked to a different users, we |
+ a) unlink an existing cache file, if any (to ensure we don't fall victim |
+ to symlink attacks and the like), |
+ b) create a new file with O_CREAT | O_EXCL (to ensure nobody is trying to |
+ race us) |
+ If either of these steps fail, we simply give up (but log a warning). Not |
+ caching access tokens is not catastrophic, and failure to create a file |
+ can happen for either of the following reasons: |
+ - someone is attacking us as above, in which case we want to default to |
+ safe operation (not write the token); |
+ - another legitimate process is racing us; in this case one of the two |
+ will win and write the access token, which is fine; |
+ - we don't have permission to remove the old file or write to the |
+ specified directory, in which case we can't recover |
+ |
+ Args: |
+ key: the refresh_token hash key to store. |
+ value: the access_token value to serialize. |
+ """ |
+ |
+ cache_file = self.CacheFileName(key) |
+ LOG.info('FileSystemTokenCache.PutToken: key=%s, cache_file=%s', |
+ key, cache_file) |
+ try: |
+ os.unlink(cache_file) |
+ except: |
+ # Ignore failure to unlink the file; if the file exists and can't be |
+ # unlinked, the subsequent open with O_CREAT | O_EXCL will fail. |
+ pass |
+ |
+ flags = os.O_RDWR | os.O_CREAT | os.O_EXCL |
+ |
+ # Accommodate Windows; stolen from python2.6/tempfile.py. |
+ if hasattr(os, 'O_NOINHERIT'): |
+ flags |= os.O_NOINHERIT |
+ if hasattr(os, 'O_BINARY'): |
+ flags |= os.O_BINARY |
+ |
+ try: |
+ fd = os.open(cache_file, flags, 0600) |
+ except (OSError, IOError), e: |
+ LOG.warning('FileSystemTokenCache.PutToken: ' |
+ 'Failed to create cache file %s: %s', cache_file, e) |
+ return |
+ f = os.fdopen(fd, 'w+b') |
+ f.write(value.Serialize()) |
+ f.close() |
+ |
+ def GetToken(self, key): |
+ """Returns a deserialized access token from the key's filename.""" |
+ value = None |
+ cache_file = self.CacheFileName(key) |
+ try: |
+ f = open(cache_file) |
+ value = AccessToken.UnSerialize(f.read()) |
+ f.close() |
+ except (IOError, OSError), e: |
+ if e.errno != errno.ENOENT: |
+ LOG.warning('FileSystemTokenCache.GetToken: ' |
+ 'Failed to read cache file %s: %s', cache_file, e) |
+ except Exception, e: |
+ LOG.warning('FileSystemTokenCache.GetToken: ' |
+ 'Failed to read cache file %s (possibly corrupted): %s', |
+ cache_file, e) |
+ |
+ LOG.info('FileSystemTokenCache.GetToken: key=%s%s present (cache_file=%s)', |
+ key, ' not' if value is None else '', cache_file) |
+ return value |
+ |
+ |
+class OAuth2Provider(object): |
+ """Encapsulates information about an OAuth2 provider.""" |
+ |
+ def __init__(self, label, authorization_uri, token_uri): |
+ """Creates an OAuth2Provider. |
+ |
+ Args: |
+ label: A string identifying this oauth2 provider, e.g. "Google". |
+ authorization_uri: The provider's authorization URI. |
+ token_uri: The provider's token endpoint URI. |
+ """ |
+ self.label = label |
+ self.authorization_uri = authorization_uri |
+ self.token_uri = token_uri |
+ |
+ |
+class OAuth2Client(object): |
+ """An OAuth2 client.""" |
+ |
+ def __init__(self, provider, client_id, client_secret, |
+ url_opener=None, |
+ proxy=None, |
+ access_token_cache=None, |
+ datetime_strategy=datetime.datetime): |
+ """Creates an OAuth2Client. |
+ |
+ Args: |
+ provider: The OAuth2Provider provider this client will authenticate |
+ against. |
+ client_id: The OAuth2 client ID of this client. |
+ client_secret: The OAuth2 client secret of this client. |
+ url_opener: An optinal urllib2.OpenerDirector to use for making HTTP |
+ requests to the OAuth2 provider's token endpoint. The provided |
+ url_opener *must* be configured to validate server SSL certificates |
+ for requests to https connections, and to correctly handle proxying of |
+ https requests. If this argument is omitted or None, a suitable |
+ opener based on fancy_urllib is used. |
+ proxy: An optional string specifying a HTTP proxy to be used, in the form |
+ '<proxy>:<port>'. This option is only effective if the url_opener has |
+ been configured with a fancy_urllib.FancyProxyHandler (this is the |
+ case for the default url_opener). |
+ access_token_cache: An optional instance of a TokenCache. If omitted or |
+ None, an InMemoryTokenCache is used. |
+ datetime_strategy: datetime module strategy to use. |
+ """ |
+ self.provider = provider |
+ self.client_id = client_id |
+ self.client_secret = client_secret |
+ # datetime_strategy is used to invoke utcnow() on; it is injected into the |
+ # constructor for unit testing purposes. |
+ self.datetime_strategy = datetime_strategy |
+ self._proxy = proxy |
+ |
+ self.access_token_cache = access_token_cache or InMemoryTokenCache() |
+ |
+ self.ca_certs_file = os.path.join( |
+ os.path.dirname(os.path.abspath(cacerts.__file__)), 'cacerts.txt') |
+ |
+ if url_opener is None: |
+ # Check that the cert file distributed with boto has not been tampered |
+ # with. |
+ h = sha1() |
+ h.update(file(self.ca_certs_file).read()) |
+ actual_sha1 = h.hexdigest() |
+ if actual_sha1 != CACERTS_FILE_SHA1SUM: |
+ raise Error( |
+ 'CA certificates file does not have expected SHA1 sum; ' |
+ 'expected: %s, actual: %s' % (CACERTS_FILE_SHA1SUM, actual_sha1)) |
+ # TODO(Google): set user agent? |
+ url_opener = urllib2.build_opener( |
+ fancy_urllib.FancyProxyHandler(), |
+ fancy_urllib.FancyRedirectHandler(), |
+ fancy_urllib.FancyHTTPSHandler()) |
+ self.url_opener = url_opener |
+ |
+ def _TokenRequest(self, request): |
+ """Make a requst to this client's provider's token endpoint. |
+ |
+ Args: |
+ request: A dict with the request parameteres. |
+ Returns: |
+ A tuple (response, error) where, |
+ - response is the parsed JSON response received from the token endpoint, |
+ or None if no parseable response was received, and |
+ - error is None if the request succeeded or |
+ an Exception if an error occurred. |
+ """ |
+ |
+ body = urllib.urlencode(request) |
+ LOG.debug('_TokenRequest request: %s', body) |
+ response = None |
+ try: |
+ request = fancy_urllib.FancyRequest( |
+ self.provider.token_uri, data=body) |
+ if self._proxy: |
+ request.set_proxy(self._proxy, 'http') |
+ |
+ request.set_ssl_info(ca_certs=self.ca_certs_file) |
+ result = self.url_opener.open(request) |
+ resp_body = result.read() |
+ LOG.debug('_TokenRequest response: %s', resp_body) |
+ except urllib2.HTTPError, e: |
+ try: |
+ response = json.loads(e.read()) |
+ except: |
+ pass |
+ return (response, e) |
+ |
+ try: |
+ response = json.loads(resp_body) |
+ except ValueError, e: |
+ return (None, e) |
+ |
+ return (response, None) |
+ |
+ def GetAccessToken(self, refresh_token): |
+ """Given a RefreshToken, obtains a corresponding access token. |
+ |
+ First, this client's access token cache is checked for an existing, |
+ not-yet-expired access token for the provided refresh token. If none is |
+ found, the client obtains a fresh access token for the provided refresh |
+ token from the OAuth2 provider's token endpoint. |
+ |
+ Args: |
+ refresh_token: The RefreshToken object which to get an access token for. |
+ Returns: |
+ The cached or freshly obtained AccessToken. |
+ Raises: |
+ AccessTokenRefreshError if an error occurs. |
+ """ |
+ # Ensure only one thread at a time attempts to get (and possibly refresh) |
+ # the access token. This doesn't prevent concurrent refresh attempts across |
+ # multiple gsutil instances, but at least protects against multiple threads |
+ # simultaneously attempting to refresh when gsutil -m is used. |
+ token_exchange_lock.acquire() |
+ try: |
+ cache_key = refresh_token.CacheKey() |
+ LOG.info('GetAccessToken: checking cache for key %s', cache_key) |
+ access_token = self.access_token_cache.GetToken(cache_key) |
+ LOG.debug('GetAccessToken: token from cache: %s', access_token) |
+ if access_token is None or access_token.ShouldRefresh(): |
+ LOG.info('GetAccessToken: fetching fresh access token...') |
+ access_token = self.FetchAccessToken(refresh_token) |
+ LOG.debug('GetAccessToken: fresh access token: %s', access_token) |
+ self.access_token_cache.PutToken(cache_key, access_token) |
+ return access_token |
+ finally: |
+ token_exchange_lock.release() |
+ |
+ def FetchAccessToken(self, refresh_token): |
+ """Fetches an access token from the provider's token endpoint. |
+ |
+ Given a RefreshToken, fetches an access token from this client's OAuth2 |
+ provider's token endpoint. |
+ |
+ Args: |
+ refresh_token: The RefreshToken object which to get an access token for. |
+ Returns: |
+ The fetched AccessToken. |
+ Raises: |
+ AccessTokenRefreshError: if an error occurs. |
+ """ |
+ request = { |
+ 'grant_type': 'refresh_token', |
+ 'client_id': self.client_id, |
+ 'client_secret': self.client_secret, |
+ 'refresh_token': refresh_token.refresh_token, |
+ } |
+ LOG.debug('FetchAccessToken request: %s', request) |
+ |
+ response, error = self._TokenRequest(request) |
+ LOG.debug( |
+ 'FetchAccessToken response (error = %s): %s', error, response) |
+ |
+ if error: |
+ oauth2_error = '' |
+ if response and response['error']: |
+ oauth2_error = '; OAuth2 error: %s' % response['error'] |
+ raise AccessTokenRefreshError( |
+ 'Failed to exchange refresh token into access token; ' |
+ 'request failed: %s%s' % (error, oauth2_error)) |
+ |
+ if 'access_token' not in response: |
+ raise AccessTokenRefreshError( |
+ 'Failed to exchange refresh token into access token; response: %s' % |
+ response) |
+ |
+ token_expiry = None |
+ if 'expires_in' in response: |
+ token_expiry = ( |
+ self.datetime_strategy.utcnow() + |
+ datetime.timedelta(seconds=int(response['expires_in']))) |
+ |
+ return AccessToken(response['access_token'], token_expiry, |
+ datetime_strategy=self.datetime_strategy) |
+ |
+ def GetAuthorizationUri(self, redirect_uri, scopes, extra_params=None): |
+ """Gets the OAuth2 authorization URI and the specified scope(s). |
+ |
+ Applications should navigate/redirect the user's user agent to this URI. The |
+ user will be shown an approval UI requesting the user to approve access of |
+ this client to the requested scopes under the identity of the authenticated |
+ end user. |
+ |
+ The application should expect the user agent to be redirected to the |
+ specified redirect_uri after the user's approval/disapproval. |
+ |
+ Installed applications may use the special redirect_uri |
+ 'urn:ietf:wg:oauth:2.0:oob' to indicate that instead of redirecting the |
+ browser, the user be shown a confirmation page with a verification code. |
+ The application should query the user for this code. |
+ |
+ Args: |
+ redirect_uri: Either the string 'urn:ietf:wg:oauth:2.0:oob' for a |
+ non-web-based application, or a URI that handles the callback from the |
+ authorization server. |
+ scopes: A list of strings specifying the OAuth scopes the application |
+ requests access to. |
+ extra_params: Optional dictionary of additional parameters to be passed to |
+ the OAuth2 authorization URI. |
+ Returns: |
+ The authorization URI for the specified scopes as a string. |
+ """ |
+ |
+ request = { |
+ 'response_type': 'code', |
+ 'client_id': self.client_id, |
+ 'redirect_uri': redirect_uri, |
+ 'scope': ' '.join(scopes), |
+ } |
+ |
+ if extra_params: |
+ request.update(extra_params) |
+ url_parts = list(urlparse.urlparse(self.provider.authorization_uri)) |
+ # 4 is the index of the query part |
+ request.update(dict(cgi.parse_qsl(url_parts[4]))) |
+ url_parts[4] = urllib.urlencode(request) |
+ return urlparse.urlunparse(url_parts) |
+ |
+ def ExchangeAuthorizationCode(self, code, redirect_uri, scopes): |
+ """Exchanges an authorization code for a refresh token. |
+ |
+ Invokes this client's OAuth2 provider's token endpoint to exchange an |
+ authorization code into a refresh token. |
+ |
+ Args: |
+ code: the authrorization code. |
+ redirect_uri: Either the string 'urn:ietf:wg:oauth:2.0:oob' for a |
+ non-web-based application, or a URI that handles the callback from the |
+ authorization server. |
+ scopes: A list of strings specifying the OAuth scopes the application |
+ requests access to. |
+ Returns: |
+ A tuple consting of the resulting RefreshToken and AccessToken. |
+ Raises: |
+ AuthorizationCodeExchangeError: if an error occurs. |
+ """ |
+ request = { |
+ 'grant_type': 'authorization_code', |
+ 'client_id': self.client_id, |
+ 'client_secret': self.client_secret, |
+ 'code': code, |
+ 'redirect_uri': redirect_uri, |
+ 'scope': ' '.join(scopes), |
+ } |
+ LOG.debug('ExchangeAuthorizationCode request: %s', request) |
+ |
+ response, error = self._TokenRequest(request) |
+ LOG.debug( |
+ 'ExchangeAuthorizationCode response (error = %s): %s', |
+ error, response) |
+ |
+ if error: |
+ oauth2_error = '' |
+ if response and response['error']: |
+ oauth2_error = '; OAuth2 error: %s' % response['error'] |
+ raise AuthorizationCodeExchangeError( |
+ 'Failed to exchange refresh token into access token; ' |
+ 'request failed: %s%s' % (str(error), oauth2_error)) |
+ |
+ if not 'access_token' in response: |
+ raise AuthorizationCodeExchangeError( |
+ 'Failed to exchange authorization code into access token; ' |
+ 'response: %s' % response) |
+ |
+ token_expiry = None |
+ if 'expires_in' in response: |
+ token_expiry = ( |
+ self.datetime_strategy.utcnow() + |
+ datetime.timedelta(seconds=int(response['expires_in']))) |
+ |
+ access_token = AccessToken(response['access_token'], token_expiry, |
+ datetime_strategy=self.datetime_strategy) |
+ |
+ refresh_token = None |
+ refresh_token_string = response.get('refresh_token', None) |
+ |
+ token_exchange_lock.acquire() |
+ try: |
+ if refresh_token_string: |
+ refresh_token = RefreshToken(self, refresh_token_string) |
+ self.access_token_cache.PutToken(refresh_token.CacheKey(), access_token) |
+ finally: |
+ token_exchange_lock.release() |
+ |
+ return (refresh_token, access_token) |
+ |
+ |
+class AccessToken(object): |
+ """Encapsulates an OAuth2 access token.""" |
+ |
+ def __init__(self, token, expiry, datetime_strategy=datetime.datetime): |
+ self.token = token |
+ self.expiry = expiry |
+ self.datetime_strategy = datetime_strategy |
+ |
+ @staticmethod |
+ def UnSerialize(query): |
+ """Creates an AccessToken object from its serialized form.""" |
+ |
+ def GetValue(d, key): |
+ return (d.get(key, [None]))[0] |
+ kv = cgi.parse_qs(query) |
+ if not kv['token']: |
+ return None |
+ expiry = None |
+ expiry_tuple = GetValue(kv, 'expiry') |
+ if expiry_tuple: |
+ try: |
+ expiry = datetime.datetime( |
+ *[int(n) for n in expiry_tuple.split(',')]) |
+ except: |
+ return None |
+ return AccessToken(GetValue(kv, 'token'), expiry) |
+ |
+ def Serialize(self): |
+ """Serializes this object as URI-encoded key-value pairs.""" |
+ # There's got to be a better way to serialize a datetime. Unfortunately, |
+ # there is no reliable way to convert into a unix epoch. |
+ kv = {'token': self.token} |
+ if self.expiry: |
+ t = self.expiry |
+ tupl = (t.year, t.month, t.day, t.hour, t.minute, t.second, t.microsecond) |
+ kv['expiry'] = ','.join([str(i) for i in tupl]) |
+ return urllib.urlencode(kv) |
+ |
+ def ShouldRefresh(self, time_delta=300): |
+ """Whether the access token needs to be refreshed. |
+ |
+ Args: |
+ time_delta: refresh access token when it expires within time_delta secs. |
+ |
+ Returns: |
+ True if the token is expired or about to expire, False if the |
+ token should be expected to work. Note that the token may still |
+ be rejected, e.g. if it has been revoked server-side. |
+ """ |
+ if self.expiry is None: |
+ return False |
+ return (self.datetime_strategy.utcnow() |
+ + datetime.timedelta(seconds=time_delta) > self.expiry) |
+ |
+ def __eq__(self, other): |
+ return self.token == other.token and self.expiry == other.expiry |
+ |
+ def __ne__(self, other): |
+ return not self.__eq__(other) |
+ |
+ def __str__(self): |
+ return 'AccessToken(token=%s, expiry=%sZ)' % (self.token, self.expiry) |
+ |
+ |
+class RefreshToken(object): |
+ """Encapsulates an OAuth2 refresh token.""" |
+ |
+ def __init__(self, oauth2_client, refresh_token): |
+ self.oauth2_client = oauth2_client |
+ self.refresh_token = refresh_token |
+ |
+ def CacheKey(self): |
+ """Computes a cache key for this refresh token. |
+ |
+ The cache key is computed as the SHA1 hash of the token, and as such |
+ satisfies the FileSystemTokenCache requirement that cache keys do not leak |
+ information about token values. |
+ |
+ Returns: |
+ A hash key for this refresh token. |
+ """ |
+ h = sha1() |
+ h.update(self.refresh_token) |
+ return h.hexdigest() |
+ |
+ def GetAuthorizationHeader(self): |
+ """Gets the access token HTTP authorication header value. |
+ |
+ Returns: |
+ The value of an Authorization HTTP header that authenticates |
+ requests with an OAuth2 access token based on this refresh token. |
+ """ |
+ return 'Bearer %s' % self.oauth2_client.GetAccessToken(self).token |