def test_json_credentials_storage(self): access_token = 'foo' client_id = 'some_client_id' client_secret = 'cOuDdkfjxxnv+' refresh_token = '1/0/a.df219fjls0' token_expiry = datetime.datetime.utcnow() token_uri = 'https://www.google.com/accounts/o8/oauth2/token' user_agent = 'refresh_checker/1.0' credentials = OAuth2Credentials(access_token, client_id, client_secret, refresh_token, token_expiry, token_uri, user_agent) m = mox.Mox() m.StubOutWithMock(keyring, 'get_password') m.StubOutWithMock(keyring, 'set_password') keyring.get_password('my_unit_test', 'me').AndReturn(None) keyring.set_password('my_unit_test', 'me', credentials.to_json()) keyring.get_password('my_unit_test', 'me').AndReturn(credentials.to_json()) m.ReplayAll() s = Storage('my_unit_test', 'me') self.assertEquals(None, s.get()) s.put(credentials) restored = s.get() self.assertEqual('foo', restored.access_token) self.assertEqual('some_client_id', restored.client_id) m.UnsetStubs() m.VerifyAll()
def get_credentials(code): if code: params = get_oauth_keys('gcal') params.update({ "scope": 'https://www.googleapis.com/auth/calendar', "redirect_uri": get_redirect_uri('calendar'), "params": { "approval_prompt": "force", 'access_type': 'offline', "response_type": "code" } }) flow = OAuth2WebServerFlow(**params) credentials = flow.step2_exchange(code) # Store Credentials in Keyring Storage store = Storage('Google Account', frappe.session.user) store.put(credentials) frappe.get_doc({ "doctype": "Google Account", "name": frappe.session.user, "authenticated": 1 }).save(ignore_permissions=True) frappe.local.response["type"] = "redirect" frappe.local.response[ "location"] = "/desk#Form/Google Account/%s", frappe.sesion.user
def generate_token(): # check storage for credentials store = Storage('Google Account', frappe.session.user) # store = Storage('GCal', "*****@*****.**") credentials = store.get() if not credentials or credentials.invalid: url = get_oauth2_authorize_url('calendar') return {"url": url, "is_synced": False}
def test_get_with_malformed_json_credentials_stored(self): with mock.patch.object(keyring, 'get_password', return_value='{', autospec=True) as get_password: store = Storage('my_unit_test', 'me') credentials = store.get() self.assertEquals(None, credentials) get_password.assert_called_once_with('my_unit_test', 'me')
def test_constructor(self): service_name = 'my_unit_test' user_name = 'me' store = Storage(service_name, user_name) self.assertEqual(store._service_name, service_name) self.assertEqual(store._user_name, user_name) lock_type = type(threading.Lock()) self.assertTrue(isinstance(store._lock, lock_type))
def test_non_existent_credentials_storage(self): with mock.patch.object(keyring, 'get_password', return_value=None, autospec=True) as get_password: s = Storage('my_unit_test', 'me') credentials = s.get() self.assertEquals(None, credentials) get_password.assert_called_once_with('my_unit_test', 'me')
def _get_credentials(self): storage = Storage('ftw.recipe.translations', os.getlogin()) credentials = storage.get() if credentials: credentials.refresh(httplib2.Http()) return credentials return self._authorize(storage)
def test_locked_delete(self): service_name = 'my_unit_test' user_name = 'me' store = Storage(service_name, user_name) with mock.patch.object(keyring, 'set_password', return_value=None, autospec=True) as set_password: store.locked_delete() set_password.assert_called_once_with(service_name, user_name, '')
def get_credentials(self): storage = Storage(self.appname, os.getlogin()) credentials = storage.get() if not credentials or credentials.invalid: credentials = self.request_credentials() storage.put(credentials) return credentials
def sych_users_calender(users): for user in users: # get user credentials from keyring storage store = Storage('GCal', user[0]) credentials = store.get() if not credentials or credentials.invalid: # invalid credentials print "invalid credentials", user[0] else: sync_google_calendar(credentials)
def get_service_object(): # get google credentials from storage service = None store = Storage('GCal', frappe.session.user) credentials = store.get() if not credentials or credentials.invalid: # get credentials frappe.throw("Invalid Credentials") else: service = build('calendar', 'v3', http=credentials.authorize(Http())) return service
def sync_calender(): # check storage for credentials store = Storage('GCal', frappe.session.user) # store = Storage('GCal', "makarand") credentials = store.get() if not credentials or credentials.invalid: url = get_oauth2_authorize_url('gcal') return {"url": url, "is_synced": False} else: from gcal.tasks import sync_google_calendar sync_google_calendar(credentials) return {"url": None, "is_synced": True}
def test_malformed_credentials_in_storage(self): m = mox.Mox() m.StubOutWithMock(keyring, 'get_password') m.StubOutWithMock(keyring, 'set_password') keyring.get_password('my_unit_test', 'me').AndReturn('{') m.ReplayAll() s = Storage('my_unit_test', 'me') credentials = s.get() self.assertEquals(None, credentials) m.UnsetStubs() m.VerifyAll()
def test_locked_put(self): service_name = 'my_unit_test' user_name = 'me' store = Storage(service_name, user_name) with mock.patch.object(keyring, 'set_password', return_value=None, autospec=True) as set_password: credentials = mock.MagicMock() to_json_ret = object() credentials.to_json = to_json = mock.MagicMock( name='to_json', return_value=to_json_ret) store.locked_put(credentials) to_json.assert_called_once_with() set_password.assert_called_once_with(service_name, user_name, to_json_ret)
def get_service(secrets, scope, service_name, service_version, keyring_storename): """ return a service for google """ flow = flow_from_clientsecrets(secrets, scope=scope, redirect_uri='http://localhost:8080') store = Storage(keyring_storename, getpass.getuser()) # Check if we already have credentials credentials = store.get() if not credentials or credentials.invalid: # if not, spawn a browser to get credentials credentials = run(flow, store) # finally create a service object: http = httplib2.Http() http = credentials.authorize(http) service = build(service_name, service_version, http=http) return service
def test_locked_get(self): service_name = 'my_unit_test' user_name = 'me' mock_content = (object(), 'mock_content') mock_return_creds = mock.MagicMock() mock_return_creds.set_store = set_store = mock.MagicMock( name='set_store') with mock.patch.object(keyring, 'get_password', return_value=mock_content, autospec=True) as get_password: with mock.patch( 'oauth2client.keyring_storage.Credentials') as MockCreds: MockCreds.new_from_json = new_from_json = mock.MagicMock( name='new_from_json', return_value=mock_return_creds) store = Storage(service_name, user_name) credentials = store.locked_get() new_from_json.assert_called_once_with(mock_content) get_password.assert_called_once_with(service_name, user_name) self.assertEqual(credentials, mock_return_creds) set_store.assert_called_once_with(store)
def test_json_credentials_storage(self): access_token = 'foo' client_id = 'some_client_id' client_secret = 'cOuDdkfjxxnv+' refresh_token = '1/0/a.df219fjls0' token_expiry = datetime.datetime.utcnow() user_agent = 'refresh_checker/1.0' credentials = OAuth2Credentials(access_token, client_id, client_secret, refresh_token, token_expiry, GOOGLE_TOKEN_URI, user_agent) # Setting autospec on a mock with an iterable side_effect is # currently broken (http://bugs.python.org/issue17826), so instead # we patch twice. with mock.patch.object(keyring, 'get_password', return_value=None, autospec=True) as get_password: with mock.patch.object(keyring, 'set_password', return_value=None, autospec=True) as set_password: s = Storage('my_unit_test', 'me') self.assertEquals(None, s.get()) s.put(credentials) set_password.assert_called_once_with('my_unit_test', 'me', credentials.to_json()) get_password.assert_called_once_with('my_unit_test', 'me') with mock.patch.object(keyring, 'get_password', return_value=credentials.to_json(), autospec=True) as get_password: restored = s.get() self.assertEqual('foo', restored.access_token) self.assertEqual('some_client_id', restored.client_id) get_password.assert_called_once_with('my_unit_test', 'me')
def get_credentials(code): if code: params = get_oauth_keys('gcal') params.update({ "scope": 'https://www.googleapis.com/auth/calendar', "redirect_uri": get_redirect_uri('gcal'), "params": { "approval_prompt": "force", 'access_type': 'offline', "response_type": "code" } }) flow = OAuth2WebServerFlow(**params) credentials = flow.step2_exchange(code) # Store Credentials in Keyring Storage store = Storage('GCal', frappe.session.user) store.put(credentials) # get events and create new doctype from gcal.tasks import sync_google_calendar sync_google_calendar(credentials) frappe.local.response["type"] = "redirect" frappe.local.response["location"] = "/desk#Calendar/Event"
def main(argv): # Let the gflags module process the command-line arguments try: argv = FLAGS(argv) except gflags.FlagsError, e: print '%s\\nUsage: %s ARGS\\n%s' % (e, argv[0], FLAGS) sys.exit(1) # Set the logging according to the command-line flag logging.getLogger().setLevel(getattr(logging, FLAGS.logging_level)) # If the Credentials don't exist or are invalid run through the native client # flow. The Storage object will ensure that if successful the good # Credentials will get written back to a file. storage = Storage('Google_Plus_Sample', getpass.getuser()) credentials = storage.get() if credentials is None or credentials.invalid: credentials = run(FLOW, storage) # Create an httplib2.Http object to handle our HTTP requests and authorize it # with our good Credentials. http = httplib2.Http() http = credentials.authorize(http) service = build("plus", "v1", http=http) try: person = service.people().get(userId='me').execute(http)
def test_release_lock(self): store = Storage('my_unit_test', 'me') store._lock = lock = _FakeLock() self.assertEqual(lock._release_count, 0) store.release_lock() self.assertEqual(lock._release_count, 1)
def get_storage(self): return Storage( "cactus/gcs", self.engine.bucket_name ) #TODO: Not a great key, but do we want to ask for email?
def get_credentials(user): store = Storage('Google Account', user) credentials = store.get() return credentials
#! /usr/bin/env python import logging from oauth2client.keyring_storage import Storage from oauth2client.client import flow_from_clientsecrets from oauth2client.tools import run from httplib2 import Http import json from cmislib.model import CmisClient import os, pwd uid = pwd.getpwuid(os.getuid())[0] storage = Storage("Jeff's Sample Python App", uid) http = Http( disable_ssl_certificate_validation=True) # Should not have to do this! flow = flow_from_clientsecrets('client_secrets.json', scope='public_api', redirect_uri='http://localhost:8080/') credentials = storage.get() if credentials == None: credentials = run(flow, storage, http=http) storage.put(credentials) print "Your access_token is: %s" % credentials.access_token http = credentials.authorize(http) headers = {'Authorization': 'Bearer ' + credentials.access_token} client = CmisClient('https://api.alfresco.com/cmis/versions/1.0/atom', '',