mirror of
https://github.com/taigrr/wtf
synced 2025-01-18 04:03:14 -08:00
Output from 'dep status': PROJECT CONSTRAINT VERSION REVISION LATEST PKGS USED cloud.google.com/go v0.23.0 v0.23.0 0fd7230 v0.23.0 1 github.com/briandowns/openweathermap ^0.11.0 0.11 1b87579 0.11 1 github.com/gdamore/encoding branch master branch master b23993c b23993c 1 github.com/gdamore/tcell ^1.0.0 v1.0.0 061d51a v1.0.0 2 github.com/go-test/deep ^1.0.1 v1.0.1 6592d9c v1.0.1 1 github.com/golang/protobuf v1.1.0 v1.1.0 b4deda0 v1.1.0 1 github.com/google/go-github branch master branch master 2ae5df7 2ae5df7 1 github.com/google/go-querystring branch master branch master 53e6ce1 53e6ce1 1 github.com/jessevdk/go-flags ^1.4.0 v1.4.0 c6ca198 v1.4.0 1 github.com/lucasb-eyer/go-colorful v1.0 v1.0 345fbb3 v1.0 1 github.com/mattn/go-runewidth v0.0.2 v0.0.2 9e777a8 v0.0.2 1 github.com/olebedev/config branch master branch master 9a10d05 9a10d05 1 github.com/radovskyb/watcher ^1.0.2 v1.0.2 6145e14 v1.0.2 1 github.com/rivo/tview branch master branch master 71ecf1f 71ecf1f 1 github.com/yfronto/newrelic branch master branch master f7fa0c6 f7fa0c6 1 golang.org/x/net branch master branch master 1e49130 1e49130 2 golang.org/x/oauth2 branch master branch master 1e0a3fa 1e0a3fa 5 golang.org/x/text v0.3.0 v0.3.0 f21a4df v0.3.0 5 google.golang.org/api branch master branch master 00e3bb8 00e3bb8 4 google.golang.org/appengine v1.0.0 v1.0.0 150dc57 v1.0.0 10 gopkg.in/yaml.v2 ^2.2.1 v2.2.1 5420a8b v2.2.1 1 See https://golang.github.io/dep/docs/daily-dep.html
75 lines
2.1 KiB
Go
75 lines
2.1 KiB
Go
// Copyright 2015 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package google
|
|
|
|
import (
|
|
"crypto/rsa"
|
|
"fmt"
|
|
"time"
|
|
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/oauth2/internal"
|
|
"golang.org/x/oauth2/jws"
|
|
)
|
|
|
|
// JWTAccessTokenSourceFromJSON uses a Google Developers service account JSON
|
|
// key file to read the credentials that authorize and authenticate the
|
|
// requests, and returns a TokenSource that does not use any OAuth2 flow but
|
|
// instead creates a JWT and sends that as the access token.
|
|
// The audience is typically a URL that specifies the scope of the credentials.
|
|
//
|
|
// Note that this is not a standard OAuth flow, but rather an
|
|
// optimization supported by a few Google services.
|
|
// Unless you know otherwise, you should use JWTConfigFromJSON instead.
|
|
func JWTAccessTokenSourceFromJSON(jsonKey []byte, audience string) (oauth2.TokenSource, error) {
|
|
cfg, err := JWTConfigFromJSON(jsonKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("google: could not parse JSON key: %v", err)
|
|
}
|
|
pk, err := internal.ParseKey(cfg.PrivateKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("google: could not parse key: %v", err)
|
|
}
|
|
ts := &jwtAccessTokenSource{
|
|
email: cfg.Email,
|
|
audience: audience,
|
|
pk: pk,
|
|
pkID: cfg.PrivateKeyID,
|
|
}
|
|
tok, err := ts.Token()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return oauth2.ReuseTokenSource(tok, ts), nil
|
|
}
|
|
|
|
type jwtAccessTokenSource struct {
|
|
email, audience string
|
|
pk *rsa.PrivateKey
|
|
pkID string
|
|
}
|
|
|
|
func (ts *jwtAccessTokenSource) Token() (*oauth2.Token, error) {
|
|
iat := time.Now()
|
|
exp := iat.Add(time.Hour)
|
|
cs := &jws.ClaimSet{
|
|
Iss: ts.email,
|
|
Sub: ts.email,
|
|
Aud: ts.audience,
|
|
Iat: iat.Unix(),
|
|
Exp: exp.Unix(),
|
|
}
|
|
hdr := &jws.Header{
|
|
Algorithm: "RS256",
|
|
Typ: "JWT",
|
|
KeyID: string(ts.pkID),
|
|
}
|
|
msg, err := jws.Encode(hdr, cs, ts.pk)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("google: could not encode JWT: %v", err)
|
|
}
|
|
return &oauth2.Token{AccessToken: msg, TokenType: "Bearer", Expiry: exp}, nil
|
|
}
|