summaryrefslogtreecommitdiffstats
path: root/contrib/python/google-auth/py3
diff options
context:
space:
mode:
authorrobot-piglet <[email protected]>2024-08-22 10:43:37 +0300
committerrobot-piglet <[email protected]>2024-08-22 10:52:34 +0300
commit1fbd27b4e37aecbce5bc29b1084ebc08d49c44ab (patch)
treedc2e6502cd69163a7309a5a2b5ee7bc0f7b1d736 /contrib/python/google-auth/py3
parent09b7cd61fa6d98c03d6612f2130641e209f61a06 (diff)
Intermediate changes
Diffstat (limited to 'contrib/python/google-auth/py3')
-rw-r--r--contrib/python/google-auth/py3/.dist-info/METADATA2
-rw-r--r--contrib/python/google-auth/py3/google/auth/_credentials_base.py75
-rw-r--r--contrib/python/google-auth/py3/google/auth/_exponential_backoff.py10
-rw-r--r--contrib/python/google-auth/py3/google/auth/aio/__init__.py25
-rw-r--r--contrib/python/google-auth/py3/google/auth/aio/credentials.py143
-rw-r--r--contrib/python/google-auth/py3/google/auth/compute_engine/_metadata.py21
-rw-r--r--contrib/python/google-auth/py3/google/auth/credentials.py12
-rw-r--r--contrib/python/google-auth/py3/google/auth/transport/_requests_base.py52
-rw-r--r--contrib/python/google-auth/py3/google/auth/transport/requests.py5
-rw-r--r--contrib/python/google-auth/py3/google/auth/version.py2
-rw-r--r--contrib/python/google-auth/py3/google/oauth2/_client.py22
-rw-r--r--contrib/python/google-auth/py3/google/oauth2/_client_async.py20
-rw-r--r--contrib/python/google-auth/py3/tests/compute_engine/test__metadata.py15
-rw-r--r--contrib/python/google-auth/py3/tests/oauth2/test__client.py10
-rw-r--r--contrib/python/google-auth/py3/tests/test__exponential_backoff.py35
-rw-r--r--contrib/python/google-auth/py3/tests/test_credentials_async.py136
-rw-r--r--contrib/python/google-auth/py3/ya.make6
17 files changed, 522 insertions, 69 deletions
diff --git a/contrib/python/google-auth/py3/.dist-info/METADATA b/contrib/python/google-auth/py3/.dist-info/METADATA
index 1814862af63..cdbc6833961 100644
--- a/contrib/python/google-auth/py3/.dist-info/METADATA
+++ b/contrib/python/google-auth/py3/.dist-info/METADATA
@@ -1,6 +1,6 @@
Metadata-Version: 2.1
Name: google-auth
-Version: 2.32.0
+Version: 2.33.0
Summary: Google Authentication Library
Home-page: https://github.com/googleapis/google-auth-library-python
Author: Google Cloud Platform
diff --git a/contrib/python/google-auth/py3/google/auth/_credentials_base.py b/contrib/python/google-auth/py3/google/auth/_credentials_base.py
new file mode 100644
index 00000000000..64d5ce34b9a
--- /dev/null
+++ b/contrib/python/google-auth/py3/google/auth/_credentials_base.py
@@ -0,0 +1,75 @@
+# Copyright 2024 Google LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+
+"""Interface for base credentials."""
+
+import abc
+
+from google.auth import _helpers
+
+
+class _BaseCredentials(metaclass=abc.ABCMeta):
+ """Base class for all credentials.
+
+ All credentials have a :attr:`token` that is used for authentication and
+ may also optionally set an :attr:`expiry` to indicate when the token will
+ no longer be valid.
+
+ Most credentials will be :attr:`invalid` until :meth:`refresh` is called.
+ Credentials can do this automatically before the first HTTP request in
+ :meth:`before_request`.
+
+ Although the token and expiration will change as the credentials are
+ :meth:`refreshed <refresh>` and used, credentials should be considered
+ immutable. Various credentials will accept configuration such as private
+ keys, scopes, and other options. These options are not changeable after
+ construction. Some classes will provide mechanisms to copy the credentials
+ with modifications such as :meth:`ScopedCredentials.with_scopes`.
+
+ Attributes:
+ token (Optional[str]): The bearer token that can be used in HTTP headers to make
+ authenticated requests.
+ """
+
+ def __init__(self):
+ self.token = None
+
+ @abc.abstractmethod
+ def refresh(self, request):
+ """Refreshes the access token.
+
+ Args:
+ request (google.auth.transport.Request): The object used to make
+ HTTP requests.
+
+ Raises:
+ google.auth.exceptions.RefreshError: If the credentials could
+ not be refreshed.
+ """
+ # pylint: disable=missing-raises-doc
+ # (pylint doesn't recognize that this is abstract)
+ raise NotImplementedError("Refresh must be implemented")
+
+ def _apply(self, headers, token=None):
+ """Apply the token to the authentication header.
+
+ Args:
+ headers (Mapping): The HTTP request headers.
+ token (Optional[str]): If specified, overrides the current access
+ token.
+ """
+ headers["authorization"] = "Bearer {}".format(
+ _helpers.from_bytes(token or self.token)
+ )
diff --git a/contrib/python/google-auth/py3/google/auth/_exponential_backoff.py b/contrib/python/google-auth/py3/google/auth/_exponential_backoff.py
index 0dd621a9492..04f9f976412 100644
--- a/contrib/python/google-auth/py3/google/auth/_exponential_backoff.py
+++ b/contrib/python/google-auth/py3/google/auth/_exponential_backoff.py
@@ -15,6 +15,8 @@
import random
import time
+from google.auth import exceptions
+
# The default amount of retry attempts
_DEFAULT_RETRY_TOTAL_ATTEMPTS = 3
@@ -68,6 +70,11 @@ class ExponentialBackoff:
randomization_factor=_DEFAULT_RANDOMIZATION_FACTOR,
multiplier=_DEFAULT_MULTIPLIER,
):
+ if total_attempts < 1:
+ raise exceptions.InvalidValue(
+ f"total_attempts must be greater than or equal to 1 but was {total_attempts}"
+ )
+
self._total_attempts = total_attempts
self._initial_wait_seconds = initial_wait_seconds
@@ -87,6 +94,9 @@ class ExponentialBackoff:
raise StopIteration
self._backoff_count += 1
+ if self._backoff_count <= 1:
+ return self._backoff_count
+
jitter_variance = self._current_wait_in_seconds * self._randomization_factor
jitter = random.uniform(
self._current_wait_in_seconds - jitter_variance,
diff --git a/contrib/python/google-auth/py3/google/auth/aio/__init__.py b/contrib/python/google-auth/py3/google/auth/aio/__init__.py
new file mode 100644
index 00000000000..331708cba62
--- /dev/null
+++ b/contrib/python/google-auth/py3/google/auth/aio/__init__.py
@@ -0,0 +1,25 @@
+# Copyright 2024 Google LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+"""Google Auth AIO Library for Python."""
+
+import logging
+
+from google.auth import version as google_auth_version
+
+
+__version__ = google_auth_version.__version__
+
+# Set default logging handler to avoid "No handler found" warnings.
+logging.getLogger(__name__).addHandler(logging.NullHandler())
diff --git a/contrib/python/google-auth/py3/google/auth/aio/credentials.py b/contrib/python/google-auth/py3/google/auth/aio/credentials.py
new file mode 100644
index 00000000000..3bc6a5a6762
--- /dev/null
+++ b/contrib/python/google-auth/py3/google/auth/aio/credentials.py
@@ -0,0 +1,143 @@
+# Copyright 2024 Google LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+
+"""Interfaces for asynchronous credentials."""
+
+
+from google.auth import _helpers
+from google.auth import exceptions
+from google.auth._credentials_base import _BaseCredentials
+
+
+class Credentials(_BaseCredentials):
+ """Base class for all asynchronous credentials.
+
+ All credentials have a :attr:`token` that is used for authentication and
+ may also optionally set an :attr:`expiry` to indicate when the token will
+ no longer be valid.
+
+ Most credentials will be :attr:`invalid` until :meth:`refresh` is called.
+ Credentials can do this automatically before the first HTTP request in
+ :meth:`before_request`.
+
+ Although the token and expiration will change as the credentials are
+ :meth:`refreshed <refresh>` and used, credentials should be considered
+ immutable. Various credentials will accept configuration such as private
+ keys, scopes, and other options. These options are not changeable after
+ construction. Some classes will provide mechanisms to copy the credentials
+ with modifications such as :meth:`ScopedCredentials.with_scopes`.
+ """
+
+ def __init__(self):
+ super(Credentials, self).__init__()
+
+ async def apply(self, headers, token=None):
+ """Apply the token to the authentication header.
+
+ Args:
+ headers (Mapping): The HTTP request headers.
+ token (Optional[str]): If specified, overrides the current access
+ token.
+ """
+ self._apply(headers, token=token)
+
+ async def refresh(self, request):
+ """Refreshes the access token.
+
+ Args:
+ request (google.auth.aio.transport.Request): The object used to make
+ HTTP requests.
+
+ Raises:
+ google.auth.exceptions.RefreshError: If the credentials could
+ not be refreshed.
+ """
+ raise NotImplementedError("Refresh must be implemented")
+
+ async def before_request(self, request, method, url, headers):
+ """Performs credential-specific before request logic.
+
+ Refreshes the credentials if necessary, then calls :meth:`apply` to
+ apply the token to the authentication header.
+
+ Args:
+ request (google.auth.aio.transport.Request): The object used to make
+ HTTP requests.
+ method (str): The request's HTTP method or the RPC method being
+ invoked.
+ url (str): The request's URI or the RPC service's URI.
+ headers (Mapping): The request's headers.
+ """
+ await self.apply(headers)
+
+
+class StaticCredentials(Credentials):
+ """Asynchronous Credentials representing an immutable access token.
+
+ The credentials are considered immutable except the tokens which can be
+ configured in the constructor ::
+
+ credentials = StaticCredentials(token="token123")
+
+ StaticCredentials does not support :meth `refresh` and assumes that the configured
+ token is valid and not expired. StaticCredentials will never attempt to
+ refresh the token.
+ """
+
+ def __init__(self, token):
+ """
+ Args:
+ token (str): The access token.
+ """
+ super(StaticCredentials, self).__init__()
+ self.token = token
+
+ @_helpers.copy_docstring(Credentials)
+ async def refresh(self, request):
+ raise exceptions.InvalidOperation("Static credentials cannot be refreshed.")
+
+ # Note: before_request should never try to refresh access tokens.
+ # StaticCredentials intentionally does not support it.
+ @_helpers.copy_docstring(Credentials)
+ async def before_request(self, request, method, url, headers):
+ await self.apply(headers)
+
+
+class AnonymousCredentials(Credentials):
+ """Asynchronous Credentials that do not provide any authentication information.
+
+ These are useful in the case of services that support anonymous access or
+ local service emulators that do not use credentials.
+ """
+
+ async def refresh(self, request):
+ """Raises :class:``InvalidOperation``, anonymous credentials cannot be
+ refreshed."""
+ raise exceptions.InvalidOperation("Anonymous credentials cannot be refreshed.")
+
+ async def apply(self, headers, token=None):
+ """Anonymous credentials do nothing to the request.
+
+ The optional ``token`` argument is not supported.
+
+ Raises:
+ google.auth.exceptions.InvalidValue: If a token was specified.
+ """
+ if token is not None:
+ raise exceptions.InvalidValue("Anonymous credentials don't support tokens.")
+
+ async def before_request(self, request, method, url, headers):
+ """Anonymous credentials do nothing to the request."""
+ pass
diff --git a/contrib/python/google-auth/py3/google/auth/compute_engine/_metadata.py b/contrib/python/google-auth/py3/google/auth/compute_engine/_metadata.py
index e597365851c..69b7b524589 100644
--- a/contrib/python/google-auth/py3/google/auth/compute_engine/_metadata.py
+++ b/contrib/python/google-auth/py3/google/auth/compute_engine/_metadata.py
@@ -28,11 +28,12 @@ from google.auth import _helpers
from google.auth import environment_vars
from google.auth import exceptions
from google.auth import metrics
+from google.auth._exponential_backoff import ExponentialBackoff
_LOGGER = logging.getLogger(__name__)
# Environment variable GCE_METADATA_HOST is originally named
-# GCE_METADATA_ROOT. For compatiblity reasons, here it checks
+# GCE_METADATA_ROOT. For compatibility reasons, here it checks
# the new variable first; if not set, the system falls back
# to the old variable.
_GCE_METADATA_HOST = os.getenv(environment_vars.GCE_METADATA_HOST, None)
@@ -119,11 +120,12 @@ def ping(request, timeout=_METADATA_DEFAULT_TIMEOUT, retry_count=3):
# could lead to false negatives in the event that we are on GCE, but
# the metadata resolution was particularly slow. The latter case is
# "unlikely".
- retries = 0
headers = _METADATA_HEADERS.copy()
headers[metrics.API_CLIENT_HEADER] = metrics.mds_ping()
- while retries < retry_count:
+ backoff = ExponentialBackoff(total_attempts=retry_count)
+
+ for attempt in backoff:
try:
response = request(
url=_METADATA_IP_ROOT, method="GET", headers=headers, timeout=timeout
@@ -139,11 +141,10 @@ def ping(request, timeout=_METADATA_DEFAULT_TIMEOUT, retry_count=3):
_LOGGER.warning(
"Compute Engine Metadata server unavailable on "
"attempt %s of %s. Reason: %s",
- retries + 1,
+ attempt,
retry_count,
e,
)
- retries += 1
return False
@@ -179,7 +180,7 @@ def get(
Returns:
Union[Mapping, str]: If the metadata server returns JSON, a mapping of
- the decoded JSON is return. Otherwise, the response content is
+ the decoded JSON is returned. Otherwise, the response content is
returned as a string.
Raises:
@@ -198,8 +199,9 @@ def get(
url = _helpers.update_query(base_url, query_params)
- retries = 0
- while retries < retry_count:
+ backoff = ExponentialBackoff(total_attempts=retry_count)
+
+ for attempt in backoff:
try:
response = request(url=url, method="GET", headers=headers_to_use)
break
@@ -208,11 +210,10 @@ def get(
_LOGGER.warning(
"Compute Engine Metadata server unavailable on "
"attempt %s of %s. Reason: %s",
- retries + 1,
+ attempt,
retry_count,
e,
)
- retries += 1
else:
raise exceptions.TransportError(
"Failed to retrieve {} from the Google Compute Engine "
diff --git a/contrib/python/google-auth/py3/google/auth/credentials.py b/contrib/python/google-auth/py3/google/auth/credentials.py
index 27abd443dc0..e31930311be 100644
--- a/contrib/python/google-auth/py3/google/auth/credentials.py
+++ b/contrib/python/google-auth/py3/google/auth/credentials.py
@@ -22,12 +22,13 @@ import os
from google.auth import _helpers, environment_vars
from google.auth import exceptions
from google.auth import metrics
+from google.auth._credentials_base import _BaseCredentials
from google.auth._refresh_worker import RefreshThreadManager
DEFAULT_UNIVERSE_DOMAIN = "googleapis.com"
-class Credentials(metaclass=abc.ABCMeta):
+class Credentials(_BaseCredentials):
"""Base class for all credentials.
All credentials have a :attr:`token` that is used for authentication and
@@ -47,9 +48,8 @@ class Credentials(metaclass=abc.ABCMeta):
"""
def __init__(self):
- self.token = None
- """str: The bearer token that can be used in HTTP headers to make
- authenticated requests."""
+ super(Credentials, self).__init__()
+
self.expiry = None
"""Optional[datetime]: When the token expires and is no longer valid.
If this is None, the token is assumed to never expire."""
@@ -167,9 +167,7 @@ class Credentials(metaclass=abc.ABCMeta):
token (Optional[str]): If specified, overrides the current access
token.
"""
- headers["authorization"] = "Bearer {}".format(
- _helpers.from_bytes(token or self.token)
- )
+ self._apply(headers, token=token)
"""Trust boundary value will be a cached value from global lookup.
The response of trust boundary will be a list of regions and a hex
diff --git a/contrib/python/google-auth/py3/google/auth/transport/_requests_base.py b/contrib/python/google-auth/py3/google/auth/transport/_requests_base.py
new file mode 100644
index 00000000000..ec718d909a3
--- /dev/null
+++ b/contrib/python/google-auth/py3/google/auth/transport/_requests_base.py
@@ -0,0 +1,52 @@
+# Copyright 2024 Google LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+"""Transport adapter for Base Requests."""
+
+
+import abc
+
+
+_DEFAULT_TIMEOUT = 120 # in second
+
+
+class _BaseAuthorizedSession(metaclass=abc.ABCMeta):
+ """Base class for a Request Session with credentials. This class is intended to capture
+ the common logic between synchronous and asynchronous request sessions and is not intended to
+ be instantiated directly.
+
+ Args:
+ credentials (google.auth._credentials_base.BaseCredentials): The credentials to
+ add to the request.
+ """
+
+ def __init__(self, credentials):
+ self.credentials = credentials
+
+ @abc.abstractmethod
+ def request(
+ self,
+ method,
+ url,
+ data=None,
+ headers=None,
+ max_allowed_time=None,
+ timeout=_DEFAULT_TIMEOUT,
+ **kwargs
+ ):
+ raise NotImplementedError("Request must be implemented")
+
+ @abc.abstractmethod
+ def close(self):
+ raise NotImplementedError("Close must be implemented")
diff --git a/contrib/python/google-auth/py3/google/auth/transport/requests.py b/contrib/python/google-auth/py3/google/auth/transport/requests.py
index 23a69783dc3..68f67c59bdf 100644
--- a/contrib/python/google-auth/py3/google/auth/transport/requests.py
+++ b/contrib/python/google-auth/py3/google/auth/transport/requests.py
@@ -38,6 +38,7 @@ from google.auth import environment_vars
from google.auth import exceptions
from google.auth import transport
import google.auth.transport._mtls_helper
+from google.auth.transport._requests_base import _BaseAuthorizedSession
from google.oauth2 import service_account
_LOGGER = logging.getLogger(__name__)
@@ -292,7 +293,7 @@ class _MutualTlsOffloadAdapter(requests.adapters.HTTPAdapter):
return super(_MutualTlsOffloadAdapter, self).proxy_manager_for(*args, **kwargs)
-class AuthorizedSession(requests.Session):
+class AuthorizedSession(requests.Session, _BaseAuthorizedSession):
"""A Requests Session class with credentials.
This class is used to perform requests to API endpoints that require
@@ -389,7 +390,7 @@ class AuthorizedSession(requests.Session):
default_host=None,
):
super(AuthorizedSession, self).__init__()
- self.credentials = credentials
+ _BaseAuthorizedSession.__init__(self, credentials)
self._refresh_status_codes = refresh_status_codes
self._max_refresh_attempts = max_refresh_attempts
self._refresh_timeout = refresh_timeout
diff --git a/contrib/python/google-auth/py3/google/auth/version.py b/contrib/python/google-auth/py3/google/auth/version.py
index 51f7f62acd7..c41f8776589 100644
--- a/contrib/python/google-auth/py3/google/auth/version.py
+++ b/contrib/python/google-auth/py3/google/auth/version.py
@@ -12,4 +12,4 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-__version__ = "2.32.0"
+__version__ = "2.33.0"
diff --git a/contrib/python/google-auth/py3/google/oauth2/_client.py b/contrib/python/google-auth/py3/google/oauth2/_client.py
index bce797b88bb..68e13ddc734 100644
--- a/contrib/python/google-auth/py3/google/oauth2/_client.py
+++ b/contrib/python/google-auth/py3/google/oauth2/_client.py
@@ -183,7 +183,11 @@ def _token_endpoint_request_no_throw(
if headers:
headers_to_use.update(headers)
- def _perform_request():
+ response_data = {}
+ retryable_error = False
+
+ retries = _exponential_backoff.ExponentialBackoff()
+ for _ in retries:
response = request(
method="POST", url=token_uri, headers=headers_to_use, body=body, **kwargs
)
@@ -192,7 +196,7 @@ def _token_endpoint_request_no_throw(
if hasattr(response.data, "decode")
else response.data
)
- response_data = ""
+
try:
# response_body should be a JSON
response_data = json.loads(response_body)
@@ -206,18 +210,8 @@ def _token_endpoint_request_no_throw(
status_code=response.status, response_data=response_data
)
- return False, response_data, retryable_error
-
- request_succeeded, response_data, retryable_error = _perform_request()
-
- if request_succeeded or not retryable_error or not can_retry:
- return request_succeeded, response_data, retryable_error
-
- retries = _exponential_backoff.ExponentialBackoff()
- for _ in retries:
- request_succeeded, response_data, retryable_error = _perform_request()
- if request_succeeded or not retryable_error:
- return request_succeeded, response_data, retryable_error
+ if not can_retry or not retryable_error:
+ return False, response_data, retryable_error
return False, response_data, retryable_error
diff --git a/contrib/python/google-auth/py3/google/oauth2/_client_async.py b/contrib/python/google-auth/py3/google/oauth2/_client_async.py
index 2858d862b0b..8867f0a5274 100644
--- a/contrib/python/google-auth/py3/google/oauth2/_client_async.py
+++ b/contrib/python/google-auth/py3/google/oauth2/_client_async.py
@@ -67,7 +67,11 @@ async def _token_endpoint_request_no_throw(
if access_token:
headers["Authorization"] = "Bearer {}".format(access_token)
- async def _perform_request():
+ response_data = {}
+ retryable_error = False
+
+ retries = _exponential_backoff.ExponentialBackoff()
+ for _ in retries:
response = await request(
method="POST", url=token_uri, headers=headers, body=body
)
@@ -93,18 +97,8 @@ async def _token_endpoint_request_no_throw(
status_code=response.status, response_data=response_data
)
- return False, response_data, retryable_error
-
- request_succeeded, response_data, retryable_error = await _perform_request()
-
- if request_succeeded or not retryable_error or not can_retry:
- return request_succeeded, response_data, retryable_error
-
- retries = _exponential_backoff.ExponentialBackoff()
- for _ in retries:
- request_succeeded, response_data, retryable_error = await _perform_request()
- if request_succeeded or not retryable_error:
- return request_succeeded, response_data, retryable_error
+ if not can_retry or not retryable_error:
+ return False, response_data, retryable_error
return False, response_data, retryable_error
diff --git a/contrib/python/google-auth/py3/tests/compute_engine/test__metadata.py b/contrib/python/google-auth/py3/tests/compute_engine/test__metadata.py
index 35e3c089f90..352342f1509 100644
--- a/contrib/python/google-auth/py3/tests/compute_engine/test__metadata.py
+++ b/contrib/python/google-auth/py3/tests/compute_engine/test__metadata.py
@@ -127,13 +127,15 @@ def test_ping_success_retry(mock_metrics_header_value):
assert request.call_count == 2
-def test_ping_failure_bad_flavor():
[email protected]("time.sleep", return_value=None)
+def test_ping_failure_bad_flavor(mock_sleep):
request = make_request("", headers={_metadata._METADATA_FLAVOR_HEADER: "meep"})
assert not _metadata.ping(request)
-def test_ping_failure_connection_failed():
[email protected]("time.sleep", return_value=None)
+def test_ping_failure_connection_failed(mock_sleep):
request = make_request("")
request.side_effect = exceptions.TransportError()
@@ -196,7 +198,8 @@ def test_get_success_json_content_type_charset():
assert result[key] == value
-def test_get_success_retry():
[email protected]("time.sleep", return_value=None)
+def test_get_success_retry(mock_sleep):
key, value = "foo", "bar"
data = json.dumps({key: value})
@@ -312,7 +315,8 @@ def _test_get_success_custom_root_old_variable():
)
-def test_get_failure():
[email protected]("time.sleep", return_value=None)
+def test_get_failure(mock_sleep):
request = make_request("Metadata error", status=http_client.NOT_FOUND)
with pytest.raises(exceptions.TransportError) as excinfo:
@@ -339,7 +343,8 @@ def test_get_return_none_for_not_found_error():
)
-def test_get_failure_connection_failed():
[email protected]("time.sleep", return_value=None)
+def test_get_failure_connection_failed(mock_sleep):
request = make_request("")
request.side_effect = exceptions.TransportError()
diff --git a/contrib/python/google-auth/py3/tests/oauth2/test__client.py b/contrib/python/google-auth/py3/tests/oauth2/test__client.py
index f9a2d3aff49..8736a4e27be 100644
--- a/contrib/python/google-auth/py3/tests/oauth2/test__client.py
+++ b/contrib/python/google-auth/py3/tests/oauth2/test__client.py
@@ -195,8 +195,8 @@ def test__token_endpoint_request_internal_failure_error():
_client._token_endpoint_request(
request, "http://example.com", {"error_description": "internal_failure"}
)
- # request should be called once and then with 3 retries
- assert request.call_count == 4
+ # request with 2 retries
+ assert request.call_count == 3
request = make_request(
{"error": "internal_failure"}, status=http_client.BAD_REQUEST
@@ -206,8 +206,8 @@ def test__token_endpoint_request_internal_failure_error():
_client._token_endpoint_request(
request, "http://example.com", {"error": "internal_failure"}
)
- # request should be called once and then with 3 retries
- assert request.call_count == 4
+ # request with 2 retries
+ assert request.call_count == 3
def test__token_endpoint_request_internal_failure_and_retry_failure_error():
@@ -626,6 +626,6 @@ def test__token_endpoint_request_no_throw_with_retry(can_retry):
)
if can_retry:
- assert mock_request.call_count == 4
+ assert mock_request.call_count == 3
else:
assert mock_request.call_count == 1
diff --git a/contrib/python/google-auth/py3/tests/test__exponential_backoff.py b/contrib/python/google-auth/py3/tests/test__exponential_backoff.py
index 06a54527e6b..95422502b0d 100644
--- a/contrib/python/google-auth/py3/tests/test__exponential_backoff.py
+++ b/contrib/python/google-auth/py3/tests/test__exponential_backoff.py
@@ -13,8 +13,10 @@
# limitations under the License.
import mock
+import pytest # type: ignore
from google.auth import _exponential_backoff
+from google.auth import exceptions
@mock.patch("time.sleep", return_value=None)
@@ -24,18 +26,31 @@ def test_exponential_backoff(mock_time):
iteration_count = 0
for attempt in eb:
- backoff_interval = mock_time.call_args[0][0]
- jitter = curr_wait * eb._randomization_factor
-
- assert (curr_wait - jitter) <= backoff_interval <= (curr_wait + jitter)
- assert attempt == iteration_count + 1
- assert eb.backoff_count == iteration_count + 1
- assert eb._current_wait_in_seconds == eb._multiplier ** (iteration_count + 1)
-
- curr_wait = eb._current_wait_in_seconds
+ if attempt == 1:
+ assert mock_time.call_count == 0
+ else:
+ backoff_interval = mock_time.call_args[0][0]
+ jitter = curr_wait * eb._randomization_factor
+
+ assert (curr_wait - jitter) <= backoff_interval <= (curr_wait + jitter)
+ assert attempt == iteration_count + 1
+ assert eb.backoff_count == iteration_count + 1
+ assert eb._current_wait_in_seconds == eb._multiplier ** iteration_count
+
+ curr_wait = eb._current_wait_in_seconds
iteration_count += 1
assert eb.total_attempts == _exponential_backoff._DEFAULT_RETRY_TOTAL_ATTEMPTS
assert eb.backoff_count == _exponential_backoff._DEFAULT_RETRY_TOTAL_ATTEMPTS
assert iteration_count == _exponential_backoff._DEFAULT_RETRY_TOTAL_ATTEMPTS
- assert mock_time.call_count == _exponential_backoff._DEFAULT_RETRY_TOTAL_ATTEMPTS
+ assert (
+ mock_time.call_count == _exponential_backoff._DEFAULT_RETRY_TOTAL_ATTEMPTS - 1
+ )
+
+
+def test_minimum_total_attempts():
+ with pytest.raises(exceptions.InvalidValue):
+ _exponential_backoff.ExponentialBackoff(total_attempts=0)
+ with pytest.raises(exceptions.InvalidValue):
+ _exponential_backoff.ExponentialBackoff(total_attempts=-1)
+ _exponential_backoff.ExponentialBackoff(total_attempts=1)
diff --git a/contrib/python/google-auth/py3/tests/test_credentials_async.py b/contrib/python/google-auth/py3/tests/test_credentials_async.py
new file mode 100644
index 00000000000..51e4f0611c8
--- /dev/null
+++ b/contrib/python/google-auth/py3/tests/test_credentials_async.py
@@ -0,0 +1,136 @@
+# Copyright 2024 Google LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+import pytest # type: ignore
+
+from google.auth import exceptions
+from google.auth.aio import credentials
+
+
+class CredentialsImpl(credentials.Credentials):
+ pass
+
+
+def test_credentials_constructor():
+ credentials = CredentialsImpl()
+ assert not credentials.token
+
+
+async def test_before_request():
+ credentials = CredentialsImpl()
+ request = "water"
+ headers = {}
+ credentials.token = "orchid"
+
+ # before_request should not affect the value of the token.
+ await credentials.before_request(request, "http://example.com", "GET", headers)
+ assert credentials.token == "orchid"
+ assert headers["authorization"] == "Bearer orchid"
+ assert "x-allowed-locations" not in headers
+
+ request = "earth"
+ headers = {}
+
+ # Second call shouldn't affect token or headers.
+ await credentials.before_request(request, "http://example.com", "GET", headers)
+ assert credentials.token == "orchid"
+ assert headers["authorization"] == "Bearer orchid"
+ assert "x-allowed-locations" not in headers
+
+
+async def test_static_credentials_ctor():
+ static_creds = credentials.StaticCredentials(token="orchid")
+ assert static_creds.token == "orchid"
+
+
+async def test_static_credentials_apply_default():
+ static_creds = credentials.StaticCredentials(token="earth")
+ headers = {}
+
+ await static_creds.apply(headers)
+ assert headers["authorization"] == "Bearer earth"
+
+ await static_creds.apply(headers, token="orchid")
+ assert headers["authorization"] == "Bearer orchid"
+
+
+async def test_static_credentials_before_request():
+ static_creds = credentials.StaticCredentials(token="orchid")
+ request = "water"
+ headers = {}
+
+ # before_request should not affect the value of the token.
+ await static_creds.before_request(request, "http://example.com", "GET", headers)
+ assert static_creds.token == "orchid"
+ assert headers["authorization"] == "Bearer orchid"
+ assert "x-allowed-locations" not in headers
+
+ request = "earth"
+ headers = {}
+
+ # Second call shouldn't affect token or headers.
+ await static_creds.before_request(request, "http://example.com", "GET", headers)
+ assert static_creds.token == "orchid"
+ assert headers["authorization"] == "Bearer orchid"
+ assert "x-allowed-locations" not in headers
+
+
+async def test_static_credentials_refresh():
+ static_creds = credentials.StaticCredentials(token="orchid")
+ request = "earth"
+
+ with pytest.raises(exceptions.InvalidOperation) as exc:
+ await static_creds.refresh(request)
+ assert exc.match("Static credentials cannot be refreshed.")
+
+
+async def test_anonymous_credentials_ctor():
+ anon = credentials.AnonymousCredentials()
+ assert anon.token is None
+
+
+async def test_anonymous_credentials_refresh():
+ anon = credentials.AnonymousCredentials()
+ request = object()
+ with pytest.raises(exceptions.InvalidOperation) as exc:
+ await anon.refresh(request)
+ assert exc.match("Anonymous credentials cannot be refreshed.")
+
+
+async def test_anonymous_credentials_apply_default():
+ anon = credentials.AnonymousCredentials()
+ headers = {}
+ await anon.apply(headers)
+ assert headers == {}
+ with pytest.raises(ValueError):
+ await anon.apply(headers, token="orchid")
+
+
+async def test_anonymous_credentials_before_request():
+ anon = credentials.AnonymousCredentials()
+ request = object()
+ method = "GET"
+ url = "https://example.com/api/endpoint"
+ headers = {}
+ await anon.before_request(request, method, url, headers)
+ assert headers == {}
diff --git a/contrib/python/google-auth/py3/ya.make b/contrib/python/google-auth/py3/ya.make
index 4ea57aefcc9..caefae5db65 100644
--- a/contrib/python/google-auth/py3/ya.make
+++ b/contrib/python/google-auth/py3/ya.make
@@ -2,7 +2,7 @@
PY3_LIBRARY()
-VERSION(2.32.0)
+VERSION(2.33.0)
LICENSE(Apache-2.0)
@@ -28,6 +28,7 @@ PY_SRCS(
google/auth/__init__.py
google/auth/_cloud_sdk.py
google/auth/_credentials_async.py
+ google/auth/_credentials_base.py
google/auth/_default.py
google/auth/_default_async.py
google/auth/_exponential_backoff.py
@@ -36,6 +37,8 @@ PY_SRCS(
google/auth/_oauth2client.py
google/auth/_refresh_worker.py
google/auth/_service_account_info.py
+ google/auth/aio/__init__.py
+ google/auth/aio/credentials.py
google/auth/api_key.py
google/auth/app_engine.py
google/auth/aws.py
@@ -66,6 +69,7 @@ PY_SRCS(
google/auth/transport/_custom_tls_signer.py
google/auth/transport/_http_client.py
google/auth/transport/_mtls_helper.py
+ google/auth/transport/_requests_base.py
google/auth/transport/grpc.py
google/auth/transport/mtls.py
google/auth/transport/requests.py