All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.api.client.googleapis.auth.oauth2.DefaultCredentialProvider Maven / Gradle / Ivy

There is a newer version: 2.7.0
Show newest version
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
 * in compliance with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed under the License
 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
 * or implied. See the License for the specific language governing permissions and limitations under
 * the License.
 */

package com.google.api.client.googleapis.auth.oauth2;

import com.google.api.client.auth.oauth2.TokenResponse;
import com.google.api.client.http.GenericUrl;
import com.google.api.client.http.HttpRequest;
import com.google.api.client.http.HttpResponse;
import com.google.api.client.http.HttpStatusCodes;
import com.google.api.client.http.HttpTransport;
import com.google.api.client.json.JsonFactory;
import com.google.api.client.json.JsonObjectParser;
import com.google.api.client.util.Beta;
import java.io.File;
import java.io.FileInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.lang.reflect.Constructor;
import java.lang.reflect.Field;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
import java.security.AccessControlException;
import java.util.Locale;

/**
 * {@link Beta} 
* Provides a default credential available from the host or from an environment variable. * *

An instance represents the per-process state used to get and cache the credential and allows * overriding the state and environment for testing purposes. */ @Beta class DefaultCredentialProvider extends SystemEnvironmentProvider { static final String CREDENTIAL_ENV_VAR = "GOOGLE_APPLICATION_CREDENTIALS"; static final String WELL_KNOWN_CREDENTIALS_FILE = "application_default_credentials.json"; static final String CLOUDSDK_CONFIG_DIRECTORY = "gcloud"; static final String HELP_PERMALINK = "https://developers.google.com/accounts/docs/application-default-credentials"; static final String APP_ENGINE_CREDENTIAL_CLASS = "com.google.api.client.googleapis.extensions.appengine.auth.oauth2" + ".AppIdentityCredential$AppEngineCredentialWrapper"; static final String CLOUD_SHELL_ENV_VAR = "DEVSHELL_CLIENT_PORT"; private static enum Environment { UNKNOWN, ENVIRONMENT_VARIABLE, WELL_KNOWN_FILE, CLOUD_SHELL, APP_ENGINE, COMPUTE_ENGINE, } // These variables should only be accessed inside a synchronized block private GoogleCredential cachedCredential = null; private Environment detectedEnvironment = null; DefaultCredentialProvider() {} /** * {@link Beta}
* Returns the Application Default Credentials. * *

Returns the Application Default Credentials which are credentials that identify and * authorize the whole application. This is the built-in service account if running on Google * Compute Engine or the credentials file from the path in the environment variable * GOOGLE_APPLICATION_CREDENTIALS. * * @param transport the transport for Http calls. * @param jsonFactory the factory for Json parsing and formatting. * @return the credential instance. * @throws IOException if the credential cannot be created in the current environment. */ final GoogleCredential getDefaultCredential(HttpTransport transport, JsonFactory jsonFactory) throws IOException { synchronized (this) { if (cachedCredential == null) { cachedCredential = getDefaultCredentialUnsynchronized(transport, jsonFactory); } if (cachedCredential != null) { return cachedCredential; } } throw new IOException( String.format( "The Application Default Credentials are not available. They are available if running " + "on Google App Engine, Google Compute Engine, or Google Cloud Shell. Otherwise, " + "the environment variable %s must be defined pointing to a file defining " + "the credentials. See %s for more information.", CREDENTIAL_ENV_VAR, HELP_PERMALINK)); } private final GoogleCredential getDefaultCredentialUnsynchronized( HttpTransport transport, JsonFactory jsonFactory) throws IOException { if (detectedEnvironment == null) { detectedEnvironment = detectEnvironment(transport); } switch (detectedEnvironment) { case ENVIRONMENT_VARIABLE: return getCredentialUsingEnvironmentVariable(transport, jsonFactory); case WELL_KNOWN_FILE: return getCredentialUsingWellKnownFile(transport, jsonFactory); case APP_ENGINE: return getAppEngineCredential(transport, jsonFactory); case CLOUD_SHELL: return getCloudShellCredential(jsonFactory); case COMPUTE_ENGINE: return getComputeCredential(transport, jsonFactory); default: return null; } } private final File getWellKnownCredentialsFile() { File cloudConfigPath = null; String os = getProperty("os.name", "").toLowerCase(Locale.US); if (os.indexOf("windows") >= 0) { File appDataPath = new File(getEnv("APPDATA")); cloudConfigPath = new File(appDataPath, CLOUDSDK_CONFIG_DIRECTORY); } else { File configPath = new File(getProperty("user.home", ""), ".config"); cloudConfigPath = new File(configPath, CLOUDSDK_CONFIG_DIRECTORY); } File credentialFilePath = new File(cloudConfigPath, WELL_KNOWN_CREDENTIALS_FILE); return credentialFilePath; } /** Override in test code to isolate from environment. */ boolean fileExists(File file) { return file.exists() && !file.isDirectory(); } /** Override in test code to isolate from environment. */ String getProperty(String property, String def) { return System.getProperty(property, def); } /** Override in test code to isolate from environment. */ Class forName(String className) throws ClassNotFoundException { return Class.forName(className); } private final Environment detectEnvironment(HttpTransport transport) throws IOException { // First try the environment variable if (runningUsingEnvironmentVariable()) { return Environment.ENVIRONMENT_VARIABLE; // Then try the well-known file } else if (runningUsingWellKnownFile()) { return Environment.WELL_KNOWN_FILE; // Try App Engine } else if (useGAEStandardAPI()) { return Environment.APP_ENGINE; // Then try Cloud Shell. This must be done BEFORE checking // Compute Engine, as Cloud Shell runs on GCE VMs. } else if (runningOnCloudShell()) { return Environment.CLOUD_SHELL; // Then try Compute Engine } else if (OAuth2Utils.runningOnComputeEngine(transport, this)) { return Environment.COMPUTE_ENGINE; } return Environment.UNKNOWN; } private boolean runningUsingEnvironmentVariable() throws IOException { String credentialsPath = getEnv(CREDENTIAL_ENV_VAR); if (credentialsPath == null || credentialsPath.length() == 0) { return false; } try { File credentialsFile = new File(credentialsPath); if (!credentialsFile.exists() || credentialsFile.isDirectory()) { throw new IOException( String.format( "Error reading credential file from environment variable %s, value '%s': " + "File does not exist.", CREDENTIAL_ENV_VAR, credentialsPath)); } return true; } catch (AccessControlException expected) { // Exception querying file system is expected on App-Engine return false; } } private GoogleCredential getCredentialUsingEnvironmentVariable( HttpTransport transport, JsonFactory jsonFactory) throws IOException { String credentialsPath = getEnv(CREDENTIAL_ENV_VAR); InputStream credentialsStream = null; try { credentialsStream = new FileInputStream(credentialsPath); return GoogleCredential.fromStream(credentialsStream, transport, jsonFactory); } catch (IOException e) { // Although it is also the cause, the message of the caught exception can have very // important information for diagnosing errors, so include its message in the // outer exception message also throw OAuth2Utils.exceptionWithCause( new IOException( String.format( "Error reading credential file from environment variable %s, value '%s': %s", CREDENTIAL_ENV_VAR, credentialsPath, e.getMessage())), e); } finally { if (credentialsStream != null) { credentialsStream.close(); } } } private boolean runningUsingWellKnownFile() { File wellKnownFileLocation = getWellKnownCredentialsFile(); try { return fileExists(wellKnownFileLocation); } catch (AccessControlException expected) { // Exception querying file system is expected on App-Engine return false; } } private GoogleCredential getCredentialUsingWellKnownFile( HttpTransport transport, JsonFactory jsonFactory) throws IOException { File wellKnownFileLocation = getWellKnownCredentialsFile(); InputStream credentialsStream = null; try { credentialsStream = new FileInputStream(wellKnownFileLocation); return GoogleCredential.fromStream(credentialsStream, transport, jsonFactory); } catch (IOException e) { throw new IOException( String.format( "Error reading credential file from location %s: %s", wellKnownFileLocation, e.getMessage())); } finally { if (credentialsStream != null) { credentialsStream.close(); } } } private boolean useGAEStandardAPI() { Class systemPropertyClass = null; try { systemPropertyClass = forName("com.google.appengine.api.utils.SystemProperty"); } catch (ClassNotFoundException expected) { // SystemProperty will always be present on App Engine. return false; } Exception cause = null; Field environmentField; try { environmentField = systemPropertyClass.getField("environment"); Object environmentValue = environmentField.get(null); Class environmentType = environmentField.getType(); Method valueMethod = environmentType.getMethod("value"); Object environmentValueValue = valueMethod.invoke(environmentValue); return (environmentValueValue != null); } catch (NoSuchFieldException exception) { cause = exception; } catch (SecurityException exception) { cause = exception; } catch (IllegalArgumentException exception) { cause = exception; } catch (IllegalAccessException exception) { cause = exception; } catch (NoSuchMethodException exception) { cause = exception; } catch (InvocationTargetException exception) { cause = exception; } throw OAuth2Utils.exceptionWithCause( new RuntimeException( String.format( "Unexpected error trying to determine if running on Google App Engine: %s", cause.getMessage())), cause); } private final GoogleCredential getAppEngineCredential( HttpTransport transport, JsonFactory jsonFactory) throws IOException { Exception innerException = null; try { Class credentialClass = forName(APP_ENGINE_CREDENTIAL_CLASS); Constructor constructor = credentialClass.getConstructor(HttpTransport.class, JsonFactory.class); return (GoogleCredential) constructor.newInstance(transport, jsonFactory); } catch (ClassNotFoundException e) { innerException = e; } catch (NoSuchMethodException e) { innerException = e; } catch (InstantiationException e) { innerException = e; } catch (IllegalAccessException e) { innerException = e; } catch (InvocationTargetException e) { innerException = e; } throw OAuth2Utils.exceptionWithCause( new IOException( String.format( "Application Default Credentials failed to create the Google App Engine service" + " account credentials class %s. Check that the component" + " 'google-api-client-appengine' is deployed.", APP_ENGINE_CREDENTIAL_CLASS)), innerException); } private boolean runningOnCloudShell() { // Check for well known environment variable return getEnv(CLOUD_SHELL_ENV_VAR) != null; } private GoogleCredential getCloudShellCredential(JsonFactory jsonFactory) { String port = getEnv(CLOUD_SHELL_ENV_VAR); return new CloudShellCredential(Integer.parseInt(port), jsonFactory); } private final GoogleCredential getComputeCredential( HttpTransport transport, JsonFactory jsonFactory) { return new ComputeGoogleCredential(transport, jsonFactory); } private static class ComputeGoogleCredential extends GoogleCredential { /** Metadata Service Account token server encoded URL. */ private static final String TOKEN_SERVER_ENCODED_URL = OAuth2Utils.getMetadataServerUrl() + "/computeMetadata/v1/instance/service-accounts/default/token"; ComputeGoogleCredential(HttpTransport transport, JsonFactory jsonFactory) { super( new GoogleCredential.Builder() .setTransport(transport) .setJsonFactory(jsonFactory) .setTokenServerEncodedUrl(TOKEN_SERVER_ENCODED_URL)); } @Override protected TokenResponse executeRefreshToken() throws IOException { GenericUrl tokenUrl = new GenericUrl(getTokenServerEncodedUrl()); HttpRequest request = getTransport().createRequestFactory().buildGetRequest(tokenUrl); JsonObjectParser parser = new JsonObjectParser(getJsonFactory()); request.setParser(parser); request.getHeaders().set("Metadata-Flavor", "Google"); request.setThrowExceptionOnExecuteError(false); HttpResponse response = request.execute(); int statusCode = response.getStatusCode(); if (statusCode == HttpStatusCodes.STATUS_CODE_OK) { InputStream content = response.getContent(); if (content == null) { // Throw explicitly rather than allow a later null reference as default mock // transports return success codes with empty contents. throw new IOException("Empty content from metadata token server request."); } return parser.parseAndClose(content, response.getContentCharset(), TokenResponse.class); } if (statusCode == HttpStatusCodes.STATUS_CODE_NOT_FOUND) { throw new IOException( String.format( "Error code %s trying to get security access token from" + " Compute Engine metadata for the default service account. This may be" + " because the virtual machine instance does not have permission scopes" + " specified.", statusCode)); } throw new IOException( String.format( "Unexpected Error code %s trying to get security access" + " token from Compute Engine metadata for the default service account: %s", statusCode, response.parseAsString())); } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy