2015-02-13 00:59:08 +00:00
|
|
|
# Copyright 2015, Google Inc.
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are
|
|
|
|
# met:
|
|
|
|
#
|
|
|
|
# * Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
# * Redistributions in binary form must reproduce the above
|
|
|
|
# copyright notice, this list of conditions and the following disclaimer
|
|
|
|
# in the documentation and/or other materials provided with the
|
|
|
|
# distribution.
|
|
|
|
# * Neither the name of Google Inc. nor the names of its
|
|
|
|
# contributors may be used to endorse or promote products derived from
|
|
|
|
# this software without specific prior written permission.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
spec_dir = File.expand_path File.join(File.dirname(__FILE__))
|
|
|
|
$LOAD_PATH.unshift spec_dir
|
2015-02-13 00:59:08 +00:00
|
|
|
$LOAD_PATH.uniq!
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
require "faraday"
|
|
|
|
require "fakefs/safe"
|
|
|
|
require "googleauth"
|
|
|
|
require "spec_helper"
|
|
|
|
require "os"
|
2015-02-13 00:59:08 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
describe "#get_application_default" do
|
2015-12-09 23:45:22 +00:00
|
|
|
# Pass unique options each time to bypass memoization
|
|
|
|
let(:options) { |example| { dememoize: example } }
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
before :example do
|
|
|
|
@key = OpenSSL::PKey::RSA.new 2048
|
2015-05-21 20:38:19 +00:00
|
|
|
@var_name = ENV_VAR
|
|
|
|
@credential_vars = [
|
|
|
|
ENV_VAR, PRIVATE_KEY_VAR, CLIENT_EMAIL_VAR, CLIENT_ID_VAR,
|
2016-07-13 22:44:16 +00:00
|
|
|
CLIENT_SECRET_VAR, REFRESH_TOKEN_VAR, ACCOUNT_TYPE_VAR
|
|
|
|
]
|
2015-05-21 20:38:19 +00:00
|
|
|
@original_env_vals = {}
|
|
|
|
@credential_vars.each { |var| @original_env_vals[var] = ENV[var] }
|
2019-03-15 19:34:54 +00:00
|
|
|
@home = ENV["HOME"]
|
|
|
|
@app_data = ENV["APPDATA"]
|
|
|
|
@program_data = ENV["ProgramData"]
|
|
|
|
@scope = "https://www.googleapis.com/auth/userinfo.profile"
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
after :example do
|
2015-05-21 20:38:19 +00:00
|
|
|
@credential_vars.each { |var| ENV[var] = @original_env_vals[var] }
|
2019-03-15 19:34:54 +00:00
|
|
|
ENV["HOME"] = @home unless @home == ENV["HOME"]
|
|
|
|
ENV["APPDATA"] = @app_data unless @app_data == ENV["APPDATA"]
|
|
|
|
ENV["ProgramData"] = @program_data unless @program_data == ENV["ProgramData"]
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
shared_examples "it cannot load misconfigured credentials" do
|
|
|
|
it "fails if the GOOGLE_APPLICATION_CREDENTIALS path does not exist" do
|
2015-03-07 00:58:57 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, "does-not-exist"
|
2015-03-07 00:58:57 +00:00
|
|
|
ENV[@var_name] = key_path
|
2018-07-18 20:54:03 +00:00
|
|
|
expect { Google::Auth.get_application_default @scope, options }
|
2015-06-30 21:47:16 +00:00
|
|
|
.to raise_error RuntimeError
|
2015-03-07 00:58:57 +00:00
|
|
|
end
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "fails without default file or env if not on compute engine" do
|
|
|
|
stub = stub_request(:get, "http://169.254.169.254")
|
|
|
|
.to_return(status: 404,
|
|
|
|
headers: { "Metadata-Flavor" => "NotGoogle" })
|
2015-03-07 00:58:57 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil? # no env var
|
|
|
|
ENV["HOME"] = dir # no config present in this tmp dir
|
2016-07-13 22:44:16 +00:00
|
|
|
expect do
|
2018-07-18 20:54:03 +00:00
|
|
|
Google::Auth.get_application_default @scope, options
|
2016-07-13 22:44:16 +00:00
|
|
|
end.to raise_error RuntimeError
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
2015-12-09 23:45:22 +00:00
|
|
|
expect(stub).to have_been_requested
|
2015-03-07 00:58:57 +00:00
|
|
|
end
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
shared_examples "it can successfully load credentials" do
|
|
|
|
it "succeeds if the GOOGLE_APPLICATION_CREDENTIALS file is valid" do
|
2015-03-09 16:50:18 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, "my_cert_file"
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
2015-03-09 16:50:18 +00:00
|
|
|
ENV[@var_name] = key_path
|
2018-10-11 01:23:50 +00:00
|
|
|
expect(Google::Auth.get_application_default(@scope, options))
|
2015-12-09 23:45:22 +00:00
|
|
|
.to_not be_nil
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-01-02 22:42:42 +00:00
|
|
|
it "propagates default_connection option" do
|
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, "my_cert_file"
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
2019-01-02 22:42:42 +00:00
|
|
|
ENV[@var_name] = key_path
|
2019-03-15 19:34:54 +00:00
|
|
|
connection = Faraday.new headers: { "User-Agent" => "hello" }
|
|
|
|
opts = options.merge default_connection: connection
|
|
|
|
creds = Google::Auth.get_application_default @scope, opts
|
2019-01-02 22:42:42 +00:00
|
|
|
expect(creds.build_default_connection).to be connection
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "succeeds with default file without GOOGLE_APPLICATION_CREDENTIALS" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil?
|
2015-03-09 16:50:18 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, ".config", WELL_KNOWN_PATH
|
|
|
|
key_path = File.join dir, WELL_KNOWN_PATH if OS.windows?
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
|
|
|
ENV["HOME"] = dir
|
|
|
|
ENV["APPDATA"] = dir
|
2018-10-11 01:23:50 +00:00
|
|
|
expect(Google::Auth.get_application_default(@scope, options))
|
2015-12-09 23:45:22 +00:00
|
|
|
.to_not be_nil
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
end
|
2015-03-07 00:58:57 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "succeeds with default file without a scope" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil?
|
2015-03-17 23:46:55 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, ".config", WELL_KNOWN_PATH
|
|
|
|
key_path = File.join dir, WELL_KNOWN_PATH if OS.windows?
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
|
|
|
ENV["HOME"] = dir
|
|
|
|
ENV["APPDATA"] = dir
|
2018-10-11 01:23:50 +00:00
|
|
|
expect(Google::Auth.get_application_default(nil, options)).to_not be_nil
|
2015-03-17 23:46:55 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "succeeds without default file or env if on compute engine" do
|
|
|
|
stub = stub_request(:get, "http://169.254.169.254")
|
|
|
|
.to_return(status: 200,
|
|
|
|
headers: { "Metadata-Flavor" => "Google" })
|
2015-03-07 00:58:57 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil? # no env var
|
|
|
|
ENV["HOME"] = dir # no config present in this tmp dir
|
2018-07-18 20:54:03 +00:00
|
|
|
creds = Google::Auth.get_application_default @scope, options
|
2015-03-07 00:58:57 +00:00
|
|
|
expect(creds).to_not be_nil
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
2015-12-09 23:45:22 +00:00
|
|
|
expect(stub).to have_been_requested
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
2015-05-21 20:38:19 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "succeeds with system default file" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil?
|
2015-06-29 20:35:45 +00:00
|
|
|
FakeFS do
|
2019-03-15 19:34:54 +00:00
|
|
|
ENV["ProgramData"] = "/etc"
|
|
|
|
prefix = OS.windows? ? "/etc/Google/Auth/" : "/etc/google/auth/"
|
|
|
|
key_path = File.join prefix, CREDENTIALS_FILE_NAME
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
2018-10-11 01:23:50 +00:00
|
|
|
expect(Google::Auth.get_application_default(@scope, options))
|
2015-12-09 23:45:22 +00:00
|
|
|
.to_not be_nil
|
2019-03-15 19:34:54 +00:00
|
|
|
File.delete key_path
|
2015-06-29 20:35:45 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "succeeds if environment vars are valid" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil? # no env var
|
2015-05-21 20:38:19 +00:00
|
|
|
ENV[PRIVATE_KEY_VAR] = cred_json[:private_key]
|
|
|
|
ENV[CLIENT_EMAIL_VAR] = cred_json[:client_email]
|
|
|
|
ENV[CLIENT_ID_VAR] = cred_json[:client_id]
|
|
|
|
ENV[CLIENT_SECRET_VAR] = cred_json[:client_secret]
|
|
|
|
ENV[REFRESH_TOKEN_VAR] = cred_json[:refresh_token]
|
|
|
|
ENV[ACCOUNT_TYPE_VAR] = cred_json[:type]
|
2018-10-11 01:23:50 +00:00
|
|
|
expect(Google::Auth.get_application_default(@scope, options))
|
2015-12-09 23:45:22 +00:00
|
|
|
.to_not be_nil
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
2018-07-18 20:54:03 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "warns when using cloud sdk credentials" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil? # no env var
|
2018-07-18 20:54:03 +00:00
|
|
|
ENV[PRIVATE_KEY_VAR] = cred_json[:private_key]
|
|
|
|
ENV[CLIENT_EMAIL_VAR] = cred_json[:client_email]
|
|
|
|
ENV[CLIENT_ID_VAR] = Google::Auth::CredentialsLoader::CLOUD_SDK_CLIENT_ID
|
|
|
|
ENV[CLIENT_SECRET_VAR] = cred_json[:client_secret]
|
|
|
|
ENV[REFRESH_TOKEN_VAR] = cred_json[:refresh_token]
|
|
|
|
ENV[ACCOUNT_TYPE_VAR] = cred_json[:type]
|
2019-03-15 19:34:54 +00:00
|
|
|
ENV[PROJECT_ID_VAR] = "a_project_id"
|
2018-07-18 20:54:03 +00:00
|
|
|
expect { Google::Auth.get_application_default @scope, options }.to output(
|
2018-10-11 01:23:50 +00:00
|
|
|
Google::Auth::CredentialsLoader::CLOUD_SDK_CREDENTIALS_WARNING + "\n"
|
2018-07-18 20:54:03 +00:00
|
|
|
).to_stderr
|
|
|
|
end
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
describe "when credential type is service account" do
|
|
|
|
let :cred_json do
|
2015-05-21 20:38:19 +00:00
|
|
|
{
|
2019-03-15 19:34:54 +00:00
|
|
|
private_key_id: "a_private_key_id",
|
|
|
|
private_key: @key.to_pem,
|
|
|
|
client_email: "app@developer.gserviceaccount.com",
|
|
|
|
client_id: "app.apps.googleusercontent.com",
|
|
|
|
type: "service_account"
|
2015-03-07 00:58:57 +00:00
|
|
|
}
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def cred_json_text
|
2019-03-15 19:34:54 +00:00
|
|
|
MultiJson.dump cred_json
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
2015-03-07 00:58:57 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it_behaves_like "it can successfully load credentials"
|
|
|
|
it_behaves_like "it cannot load misconfigured credentials"
|
2015-03-07 00:58:57 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
describe "when credential type is authorized_user" do
|
|
|
|
let :cred_json do
|
2015-05-21 20:38:19 +00:00
|
|
|
{
|
2019-03-15 19:34:54 +00:00
|
|
|
client_secret: "privatekey",
|
|
|
|
refresh_token: "refreshtoken",
|
|
|
|
client_id: "app.apps.googleusercontent.com",
|
|
|
|
type: "authorized_user"
|
2015-03-07 00:58:57 +00:00
|
|
|
}
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def cred_json_text
|
2019-03-15 19:34:54 +00:00
|
|
|
MultiJson.dump cred_json
|
2015-03-07 00:58:57 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it_behaves_like "it can successfully load credentials"
|
|
|
|
it_behaves_like "it cannot load misconfigured credentials"
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
describe "when credential type is unknown" do
|
|
|
|
let :cred_json do
|
2015-05-21 20:38:19 +00:00
|
|
|
{
|
2019-03-15 19:34:54 +00:00
|
|
|
client_secret: "privatekey",
|
|
|
|
refresh_token: "refreshtoken",
|
|
|
|
client_id: "app.apps.googleusercontent.com",
|
|
|
|
private_key: @key.to_pem,
|
|
|
|
client_email: "app@developer.gserviceaccount.com",
|
|
|
|
type: "not_known_type"
|
2015-03-09 16:50:18 +00:00
|
|
|
}
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def cred_json_text
|
2019-03-15 19:34:54 +00:00
|
|
|
MultiJson.dump cred_json
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "fails if the GOOGLE_APPLICATION_CREDENTIALS file contains the creds" do
|
2015-03-09 16:50:18 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, "my_cert_file"
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
2015-03-09 16:50:18 +00:00
|
|
|
ENV[@var_name] = key_path
|
2016-07-13 22:44:16 +00:00
|
|
|
expect do
|
2018-07-18 20:54:03 +00:00
|
|
|
Google::Auth.get_application_default @scope, options
|
2016-07-13 22:44:16 +00:00
|
|
|
end.to raise_error RuntimeError
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "fails if the well known file contains the creds" do
|
|
|
|
ENV.delete @var_name unless ENV[@var_name].nil?
|
2015-03-09 16:50:18 +00:00
|
|
|
Dir.mktmpdir do |dir|
|
2019-03-15 19:34:54 +00:00
|
|
|
key_path = File.join dir, ".config", WELL_KNOWN_PATH
|
|
|
|
key_path = File.join dir, WELL_KNOWN_PATH if OS.windows?
|
|
|
|
FileUtils.mkdir_p File.dirname(key_path)
|
|
|
|
File.write key_path, cred_json_text
|
|
|
|
ENV["HOME"] = dir
|
|
|
|
ENV["APPDATA"] = dir
|
2016-07-13 22:44:16 +00:00
|
|
|
expect do
|
2018-07-18 20:54:03 +00:00
|
|
|
Google::Auth.get_application_default @scope, options
|
2016-07-13 22:44:16 +00:00
|
|
|
end.to raise_error RuntimeError
|
2015-03-09 16:50:18 +00:00
|
|
|
end
|
|
|
|
end
|
2015-05-21 20:38:19 +00:00
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
it "fails if env vars are set" do
|
2018-10-24 16:23:37 +00:00
|
|
|
ENV[ENV_VAR] = nil
|
2015-05-21 20:38:19 +00:00
|
|
|
ENV[PRIVATE_KEY_VAR] = cred_json[:private_key]
|
|
|
|
ENV[CLIENT_EMAIL_VAR] = cred_json[:client_email]
|
2016-07-13 22:44:16 +00:00
|
|
|
expect do
|
2018-07-18 20:54:03 +00:00
|
|
|
Google::Auth.get_application_default @scope, options
|
2016-07-13 22:44:16 +00:00
|
|
|
end.to raise_error RuntimeError
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
2015-02-13 00:59:08 +00:00
|
|
|
end
|
|
|
|
end
|