2015-03-06 21:13:26 +00:00
|
|
|
# Copyright 2015, Google Inc.
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are
|
|
|
|
# met:
|
|
|
|
#
|
|
|
|
# * Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
# * Redistributions in binary form must reproduce the above
|
|
|
|
# copyright notice, this list of conditions and the following disclaimer
|
|
|
|
# in the documentation and/or other materials provided with the
|
|
|
|
# distribution.
|
|
|
|
# * Neither the name of Google Inc. nor the names of its
|
|
|
|
# contributors may be used to endorse or promote products derived from
|
|
|
|
# this software without specific prior written permission.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
require "memoist"
|
|
|
|
require "os"
|
|
|
|
require "rbconfig"
|
2015-03-06 21:13:26 +00:00
|
|
|
|
|
|
|
module Google
|
|
|
|
# Module Auth provides classes that provide Google-specific authorization
|
|
|
|
# used to access Google APIs.
|
|
|
|
module Auth
|
|
|
|
# CredentialsLoader contains the behaviour used to locate and find default
|
|
|
|
# credentials files on the file system.
|
|
|
|
module CredentialsLoader
|
|
|
|
extend Memoist
|
2019-02-27 16:06:41 +00:00
|
|
|
ENV_VAR = "GOOGLE_APPLICATION_CREDENTIALS".freeze
|
|
|
|
PRIVATE_KEY_VAR = "GOOGLE_PRIVATE_KEY".freeze
|
|
|
|
CLIENT_EMAIL_VAR = "GOOGLE_CLIENT_EMAIL".freeze
|
|
|
|
CLIENT_ID_VAR = "GOOGLE_CLIENT_ID".freeze
|
|
|
|
CLIENT_SECRET_VAR = "GOOGLE_CLIENT_SECRET".freeze
|
|
|
|
REFRESH_TOKEN_VAR = "GOOGLE_REFRESH_TOKEN".freeze
|
|
|
|
ACCOUNT_TYPE_VAR = "GOOGLE_ACCOUNT_TYPE".freeze
|
|
|
|
PROJECT_ID_VAR = "GOOGLE_PROJECT_ID".freeze
|
|
|
|
GCLOUD_POSIX_COMMAND = "gcloud".freeze
|
|
|
|
GCLOUD_WINDOWS_COMMAND = "gcloud.cmd".freeze
|
|
|
|
GCLOUD_CONFIG_COMMAND = "config config-helper --format json".freeze
|
|
|
|
|
|
|
|
CREDENTIALS_FILE_NAME = "application_default_credentials.json".freeze
|
2015-03-06 21:13:26 +00:00
|
|
|
NOT_FOUND_ERROR =
|
2016-07-13 22:44:16 +00:00
|
|
|
"Unable to read the credential file specified by #{ENV_VAR}".freeze
|
|
|
|
WELL_KNOWN_PATH = "gcloud/#{CREDENTIALS_FILE_NAME}".freeze
|
2019-02-27 16:06:41 +00:00
|
|
|
WELL_KNOWN_ERROR = "Unable to read the default credential file".freeze
|
2015-03-06 21:13:26 +00:00
|
|
|
|
2016-07-13 22:44:16 +00:00
|
|
|
SYSTEM_DEFAULT_ERROR =
|
2019-02-27 16:06:41 +00:00
|
|
|
"Unable to read the system default credential file".freeze
|
2015-06-29 20:35:45 +00:00
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
CLOUD_SDK_CLIENT_ID = "764086051850-6qr4p6gpi6hn506pt8ejuq83di341hur.app"\
|
|
|
|
"s.googleusercontent.com".freeze
|
2018-07-18 20:54:03 +00:00
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
CLOUD_SDK_CREDENTIALS_WARNING = "Your application has authenticated "\
|
|
|
|
"using end user credentials from Google Cloud SDK. We recommend that "\
|
|
|
|
"most server applications use service accounts instead. If your "\
|
|
|
|
"application continues to use end user credentials from Cloud SDK, "\
|
2018-07-18 20:54:03 +00:00
|
|
|
'you might receive a "quota exceeded" or "API not enabled" error. For'\
|
2019-02-27 16:06:41 +00:00
|
|
|
" more information about service accounts, see "\
|
|
|
|
"https://cloud.google.com/docs/authentication/.".freeze
|
2018-07-18 20:54:03 +00:00
|
|
|
|
2015-03-07 00:58:57 +00:00
|
|
|
# make_creds proxies the construction of a credentials instance
|
|
|
|
#
|
|
|
|
# By default, it calls #new on the current class, but this behaviour can
|
|
|
|
# be modified, allowing different instances to be created.
|
2019-03-15 19:34:54 +00:00
|
|
|
def make_creds *args
|
2019-01-02 22:42:42 +00:00
|
|
|
creds = new(*args)
|
2019-03-15 19:34:54 +00:00
|
|
|
creds = creds.configure_connection args[0] if creds.respond_to?(:configure_connection) && args.size == 1
|
2019-01-02 22:42:42 +00:00
|
|
|
creds
|
2015-03-07 00:58:57 +00:00
|
|
|
end
|
|
|
|
|
2015-03-06 21:13:26 +00:00
|
|
|
# Creates an instance from the path specified in an environment
|
|
|
|
# variable.
|
|
|
|
#
|
2015-03-17 23:46:55 +00:00
|
|
|
# @param scope [string|array|nil] the scope(s) to access
|
2019-01-02 22:42:42 +00:00
|
|
|
# @param options [Hash] Connection options. These may be used to configure
|
|
|
|
# how OAuth tokens are retrieved, by providing a suitable
|
|
|
|
# `Faraday::Connection`. For example, if a connection proxy must be
|
|
|
|
# used in the current network, you may provide a connection with
|
|
|
|
# with the needed proxy options.
|
|
|
|
# The following keys are recognized:
|
|
|
|
# * `:default_connection` The connection object to use.
|
|
|
|
# * `:connection_builder` A `Proc` that returns a connection.
|
2019-03-15 19:34:54 +00:00
|
|
|
def from_env scope = nil, options = {}
|
2019-01-02 22:42:42 +00:00
|
|
|
options = interpret_options scope, options
|
2019-03-27 17:55:08 +00:00
|
|
|
if ENV.key?(ENV_VAR) && !ENV[ENV_VAR].empty?
|
2015-05-21 20:38:19 +00:00
|
|
|
path = ENV[ENV_VAR]
|
2019-03-15 19:34:54 +00:00
|
|
|
raise "file #{path} does not exist" unless File.exist? path
|
|
|
|
File.open path do |f|
|
|
|
|
return make_creds options.merge(json_key_io: f)
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
|
|
|
elsif service_account_env_vars? || authorized_user_env_vars?
|
2019-03-15 19:34:54 +00:00
|
|
|
return make_creds options
|
2015-03-06 21:13:26 +00:00
|
|
|
end
|
|
|
|
rescue StandardError => e
|
|
|
|
raise "#{NOT_FOUND_ERROR}: #{e}"
|
|
|
|
end
|
|
|
|
|
|
|
|
# Creates an instance from a well known path.
|
|
|
|
#
|
2015-03-17 23:46:55 +00:00
|
|
|
# @param scope [string|array|nil] the scope(s) to access
|
2019-01-02 22:42:42 +00:00
|
|
|
# @param options [Hash] Connection options. These may be used to configure
|
|
|
|
# how OAuth tokens are retrieved, by providing a suitable
|
|
|
|
# `Faraday::Connection`. For example, if a connection proxy must be
|
|
|
|
# used in the current network, you may provide a connection with
|
|
|
|
# with the needed proxy options.
|
|
|
|
# The following keys are recognized:
|
|
|
|
# * `:default_connection` The connection object to use.
|
|
|
|
# * `:connection_builder` A `Proc` that returns a connection.
|
2019-03-15 19:34:54 +00:00
|
|
|
def from_well_known_path scope = nil, options = {}
|
2019-01-02 22:42:42 +00:00
|
|
|
options = interpret_options scope, options
|
2019-02-27 16:06:41 +00:00
|
|
|
home_var = OS.windows? ? "APPDATA" : "HOME"
|
2015-08-05 23:45:49 +00:00
|
|
|
base = WELL_KNOWN_PATH
|
2019-02-27 16:06:41 +00:00
|
|
|
root = ENV[home_var].nil? ? "" : ENV[home_var]
|
2019-03-15 19:34:54 +00:00
|
|
|
base = File.join ".config", base unless OS.windows?
|
|
|
|
path = File.join root, base
|
|
|
|
return nil unless File.exist? path
|
|
|
|
File.open path do |f|
|
|
|
|
return make_creds options.merge(json_key_io: f)
|
2015-03-06 21:13:26 +00:00
|
|
|
end
|
|
|
|
rescue StandardError => e
|
|
|
|
raise "#{WELL_KNOWN_ERROR}: #{e}"
|
|
|
|
end
|
2015-05-21 20:38:19 +00:00
|
|
|
|
2015-06-29 20:35:45 +00:00
|
|
|
# Creates an instance from the system default path
|
|
|
|
#
|
|
|
|
# @param scope [string|array|nil] the scope(s) to access
|
2019-01-02 22:42:42 +00:00
|
|
|
# @param options [Hash] Connection options. These may be used to configure
|
|
|
|
# how OAuth tokens are retrieved, by providing a suitable
|
|
|
|
# `Faraday::Connection`. For example, if a connection proxy must be
|
|
|
|
# used in the current network, you may provide a connection with
|
|
|
|
# with the needed proxy options.
|
|
|
|
# The following keys are recognized:
|
|
|
|
# * `:default_connection` The connection object to use.
|
|
|
|
# * `:connection_builder` A `Proc` that returns a connection.
|
2019-03-15 19:34:54 +00:00
|
|
|
def from_system_default_path scope = nil, options = {}
|
2019-01-02 22:42:42 +00:00
|
|
|
options = interpret_options scope, options
|
2015-12-31 23:48:39 +00:00
|
|
|
if OS.windows?
|
2019-02-27 16:06:41 +00:00
|
|
|
return nil unless ENV["ProgramData"]
|
2019-03-15 19:34:54 +00:00
|
|
|
prefix = File.join ENV["ProgramData"], "Google/Auth"
|
2015-06-29 20:35:45 +00:00
|
|
|
else
|
2019-02-27 16:06:41 +00:00
|
|
|
prefix = "/etc/google/auth/"
|
2015-06-29 20:35:45 +00:00
|
|
|
end
|
2019-03-15 19:34:54 +00:00
|
|
|
path = File.join prefix, CREDENTIALS_FILE_NAME
|
|
|
|
return nil unless File.exist? path
|
|
|
|
File.open path do |f|
|
|
|
|
return make_creds options.merge(json_key_io: f)
|
2015-06-29 20:35:45 +00:00
|
|
|
end
|
|
|
|
rescue StandardError => e
|
|
|
|
raise "#{SYSTEM_DEFAULT_ERROR}: #{e}"
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
module_function
|
|
|
|
|
2018-07-18 20:54:03 +00:00
|
|
|
# Issues warning if cloud sdk client id is used
|
2019-03-15 19:34:54 +00:00
|
|
|
def warn_if_cloud_sdk_credentials client_id
|
2018-07-18 20:54:03 +00:00
|
|
|
warn CLOUD_SDK_CREDENTIALS_WARNING if client_id == CLOUD_SDK_CLIENT_ID
|
|
|
|
end
|
|
|
|
|
2018-12-27 23:09:51 +00:00
|
|
|
# Finds project_id from gcloud CLI configuration
|
2018-10-24 16:23:37 +00:00
|
|
|
def load_gcloud_project_id
|
|
|
|
gcloud = GCLOUD_WINDOWS_COMMAND if OS.windows?
|
|
|
|
gcloud = GCLOUD_POSIX_COMMAND unless OS.windows?
|
2019-02-21 22:38:34 +00:00
|
|
|
gcloud_json = IO.popen("#{gcloud} #{GCLOUD_CONFIG_COMMAND}", &:read)
|
|
|
|
config = MultiJson.load gcloud_json
|
2019-02-27 16:06:41 +00:00
|
|
|
config["configuration"]["properties"]["core"]["project"]
|
2019-03-15 19:34:54 +00:00
|
|
|
rescue StandardError
|
2018-12-27 23:09:51 +00:00
|
|
|
nil
|
2018-10-24 16:23:37 +00:00
|
|
|
end
|
|
|
|
|
2015-05-21 20:38:19 +00:00
|
|
|
private
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
def interpret_options scope, options
|
2019-01-02 22:42:42 +00:00
|
|
|
if scope.is_a? Hash
|
|
|
|
options = scope
|
|
|
|
scope = nil
|
|
|
|
end
|
2019-03-15 19:34:54 +00:00
|
|
|
return options.merge scope: scope if scope && !options[:scope]
|
|
|
|
options
|
2019-01-02 22:42:42 +00:00
|
|
|
end
|
|
|
|
|
2015-05-21 20:38:19 +00:00
|
|
|
def service_account_env_vars?
|
2019-03-27 17:55:08 +00:00
|
|
|
([PRIVATE_KEY_VAR, CLIENT_EMAIL_VAR] - ENV.keys).empty? &&
|
|
|
|
!ENV.to_h.fetch_values(PRIVATE_KEY_VAR, CLIENT_EMAIL_VAR).join(" ").empty?
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def authorized_user_env_vars?
|
2019-03-27 17:55:08 +00:00
|
|
|
([CLIENT_ID_VAR, CLIENT_SECRET_VAR, REFRESH_TOKEN_VAR] - ENV.keys).empty? &&
|
|
|
|
!ENV.to_h.fetch_values(CLIENT_ID_VAR, CLIENT_SECRET_VAR, REFRESH_TOKEN_VAR).join(" ").empty?
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
2015-03-06 21:13:26 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|