github_repo_scraped
/
repos
/googleapis-google-auth-library-python-c6d9903
/tests_async
/test__default_async.py
# Copyright 2020 Google LLC | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# | |
# http://www.apache.org/licenses/LICENSE-2.0 | |
# | |
# Unless required by applicable law or agreed to in writing, software | |
# distributed under the License is distributed on an "AS IS" BASIS, | |
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
# See the License for the specific language governing permissions and | |
# limitations under the License. | |
import json | |
import os | |
import mock | |
import pytest # type: ignore | |
from google.auth import _credentials_async as credentials | |
from google.auth import _default_async as _default | |
from google.auth import app_engine | |
from google.auth import compute_engine | |
from google.auth import environment_vars | |
from google.auth import exceptions | |
from google.oauth2 import _service_account_async as service_account | |
import google.oauth2.credentials | |
from tests import test__default as test_default | |
MOCK_CREDENTIALS = mock.Mock(spec=credentials.CredentialsWithQuotaProject) | |
MOCK_CREDENTIALS.with_quota_project.return_value = MOCK_CREDENTIALS | |
LOAD_FILE_PATCH = mock.patch( | |
"google.auth._default_async.load_credentials_from_file", | |
return_value=(MOCK_CREDENTIALS, mock.sentinel.project_id), | |
autospec=True, | |
) | |
def test_load_credentials_from_missing_file(): | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file("") | |
assert excinfo.match(r"not found") | |
def test_load_credentials_from_file_invalid_json(tmpdir): | |
jsonfile = tmpdir.join("invalid.json") | |
jsonfile.write("{") | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file(str(jsonfile)) | |
assert excinfo.match(r"not a valid json file") | |
def test_load_credentials_from_file_invalid_type(tmpdir): | |
jsonfile = tmpdir.join("invalid.json") | |
jsonfile.write(json.dumps({"type": "not-a-real-type"})) | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file(str(jsonfile)) | |
assert excinfo.match(r"does not have a valid type") | |
def test_load_credentials_from_file_authorized_user(): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.AUTHORIZED_USER_FILE | |
) | |
assert isinstance(credentials, google.oauth2._credentials_async.Credentials) | |
assert project_id is None | |
def test_load_credentials_from_file_no_type(tmpdir): | |
# use the client_secrets.json, which is valid json but not a | |
# loadable credentials type | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file(test_default.CLIENT_SECRETS_FILE) | |
assert excinfo.match(r"does not have a valid type") | |
assert excinfo.match(r"Type is None") | |
def test_load_credentials_from_file_authorized_user_bad_format(tmpdir): | |
filename = tmpdir.join("authorized_user_bad.json") | |
filename.write(json.dumps({"type": "authorized_user"})) | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file(str(filename)) | |
assert excinfo.match(r"Failed to load authorized user") | |
assert excinfo.match(r"missing fields") | |
def test_load_credentials_from_file_authorized_user_cloud_sdk(): | |
with pytest.warns(UserWarning, match="Cloud SDK"): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.AUTHORIZED_USER_CLOUD_SDK_FILE | |
) | |
assert isinstance(credentials, google.oauth2._credentials_async.Credentials) | |
assert project_id is None | |
# No warning if the json file has quota project id. | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.AUTHORIZED_USER_CLOUD_SDK_WITH_QUOTA_PROJECT_ID_FILE | |
) | |
assert isinstance(credentials, google.oauth2._credentials_async.Credentials) | |
assert project_id is None | |
def test_load_credentials_from_file_authorized_user_cloud_sdk_with_scopes(): | |
with pytest.warns(UserWarning, match="Cloud SDK"): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.AUTHORIZED_USER_CLOUD_SDK_FILE, | |
scopes=["https://www.google.com/calendar/feeds"], | |
) | |
assert isinstance(credentials, google.oauth2._credentials_async.Credentials) | |
assert project_id is None | |
assert credentials.scopes == ["https://www.google.com/calendar/feeds"] | |
def test_load_credentials_from_file_authorized_user_cloud_sdk_with_quota_project(): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.AUTHORIZED_USER_CLOUD_SDK_FILE, quota_project_id="project-foo" | |
) | |
assert isinstance(credentials, google.oauth2._credentials_async.Credentials) | |
assert project_id is None | |
assert credentials.quota_project_id == "project-foo" | |
def test_load_credentials_from_file_service_account(): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.SERVICE_ACCOUNT_FILE | |
) | |
assert isinstance(credentials, service_account.Credentials) | |
assert project_id == test_default.SERVICE_ACCOUNT_FILE_DATA["project_id"] | |
def test_load_credentials_from_file_service_account_with_scopes(): | |
credentials, project_id = _default.load_credentials_from_file( | |
test_default.SERVICE_ACCOUNT_FILE, | |
scopes=["https://www.google.com/calendar/feeds"], | |
) | |
assert isinstance(credentials, service_account.Credentials) | |
assert project_id == test_default.SERVICE_ACCOUNT_FILE_DATA["project_id"] | |
assert credentials.scopes == ["https://www.google.com/calendar/feeds"] | |
def test_load_credentials_from_file_service_account_bad_format(tmpdir): | |
filename = tmpdir.join("serivce_account_bad.json") | |
filename.write(json.dumps({"type": "service_account"})) | |
with pytest.raises(exceptions.DefaultCredentialsError) as excinfo: | |
_default.load_credentials_from_file(str(filename)) | |
assert excinfo.match(r"Failed to load service account") | |
assert excinfo.match(r"missing fields") | |
def test__get_explicit_environ_credentials_no_env(): | |
assert _default._get_explicit_environ_credentials() == (None, None) | |
def test__get_explicit_environ_credentials(load, quota_project_id, monkeypatch): | |
monkeypatch.setenv(environment_vars.CREDENTIALS, "filename") | |
credentials, project_id = _default._get_explicit_environ_credentials( | |
quota_project_id=quota_project_id | |
) | |
assert credentials is MOCK_CREDENTIALS | |
assert project_id is mock.sentinel.project_id | |
load.assert_called_with("filename", quota_project_id=quota_project_id) | |
def test__get_explicit_environ_credentials_no_project_id(load, monkeypatch): | |
load.return_value = MOCK_CREDENTIALS, None | |
monkeypatch.setenv(environment_vars.CREDENTIALS, "filename") | |
credentials, project_id = _default._get_explicit_environ_credentials() | |
assert credentials is MOCK_CREDENTIALS | |
assert project_id is None | |
def test__get_explicit_environ_credentials_fallback_to_gcloud( | |
get_gcloud_creds, get_adc_path, quota_project_id, monkeypatch | |
): | |
# Set explicit credentials path to cloud sdk credentials path. | |
get_adc_path.return_value = "filename" | |
monkeypatch.setenv(environment_vars.CREDENTIALS, "filename") | |
_default._get_explicit_environ_credentials(quota_project_id=quota_project_id) | |
# Check we fall back to cloud sdk flow since explicit credentials path is | |
# cloud sdk credentials path | |
get_gcloud_creds.assert_called_with(quota_project_id=quota_project_id) | |
def test__get_gcloud_sdk_credentials(get_adc_path, load, quota_project_id): | |
get_adc_path.return_value = test_default.SERVICE_ACCOUNT_FILE | |
credentials, project_id = _default._get_gcloud_sdk_credentials( | |
quota_project_id=quota_project_id | |
) | |
assert credentials is MOCK_CREDENTIALS | |
assert project_id is mock.sentinel.project_id | |
load.assert_called_with( | |
test_default.SERVICE_ACCOUNT_FILE, quota_project_id=quota_project_id | |
) | |
def test__get_gcloud_sdk_credentials_non_existent(get_adc_path, tmpdir): | |
non_existent = tmpdir.join("non-existent") | |
get_adc_path.return_value = str(non_existent) | |
credentials, project_id = _default._get_gcloud_sdk_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gcloud_sdk_credentials_project_id(load, unused_isfile, get_project_id): | |
# Don't return a project ID from load file, make the function check | |
# the Cloud SDK project. | |
load.return_value = MOCK_CREDENTIALS, None | |
credentials, project_id = _default._get_gcloud_sdk_credentials() | |
assert credentials == MOCK_CREDENTIALS | |
assert project_id == mock.sentinel.project_id | |
assert get_project_id.called | |
def test__get_gcloud_sdk_credentials_no_project_id(load, unused_isfile, get_project_id): | |
# Don't return a project ID from load file, make the function check | |
# the Cloud SDK project. | |
load.return_value = MOCK_CREDENTIALS, None | |
credentials, project_id = _default._get_gcloud_sdk_credentials() | |
assert credentials == MOCK_CREDENTIALS | |
assert project_id is None | |
assert get_project_id.called | |
class _AppIdentityModule(object): | |
"""The interface of the App Idenity app engine module. | |
See https://cloud.google.com/appengine/docs/standard/python/refdocs\ | |
/google.appengine.api.app_identity.app_identity | |
""" | |
def get_application_id(self): | |
raise NotImplementedError() | |
def app_identity(monkeypatch): | |
"""Mocks the app_identity module for google.auth.app_engine.""" | |
app_identity_module = mock.create_autospec(_AppIdentityModule, instance=True) | |
monkeypatch.setattr(app_engine, "app_identity", app_identity_module) | |
yield app_identity_module | |
def test__get_gae_credentials_gen1(app_identity): | |
os.environ[environment_vars.LEGACY_APPENGINE_RUNTIME] = "python27" | |
app_identity.get_application_id.return_value = mock.sentinel.project | |
credentials, project_id = _default._get_gae_credentials() | |
assert isinstance(credentials, app_engine.Credentials) | |
assert project_id == mock.sentinel.project | |
def test__get_gae_credentials_gen2(): | |
os.environ["GAE_RUNTIME"] = "python37" | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gae_credentials_gen2_backwards_compat(): | |
# compat helpers may copy GAE_RUNTIME to APPENGINE_RUNTIME | |
# for backwards compatibility with code that relies on it | |
os.environ[environment_vars.LEGACY_APPENGINE_RUNTIME] = "python37" | |
os.environ["GAE_RUNTIME"] = "python37" | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gae_credentials_env_unset(): | |
assert environment_vars.LEGACY_APPENGINE_RUNTIME not in os.environ | |
assert "GAE_RUNTIME" not in os.environ | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gae_credentials_no_app_engine(): | |
# test both with and without LEGACY_APPENGINE_RUNTIME setting | |
assert environment_vars.LEGACY_APPENGINE_RUNTIME not in os.environ | |
import sys | |
with mock.patch.dict(sys.modules, {"google.auth.app_engine": None}): | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
os.environ[environment_vars.LEGACY_APPENGINE_RUNTIME] = "python27" | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gae_credentials_no_apis(): | |
# test both with and without LEGACY_APPENGINE_RUNTIME setting | |
assert environment_vars.LEGACY_APPENGINE_RUNTIME not in os.environ | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
os.environ[environment_vars.LEGACY_APPENGINE_RUNTIME] = "python27" | |
credentials, project_id = _default._get_gae_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gce_credentials(unused_get, unused_ping): | |
credentials, project_id = _default._get_gce_credentials() | |
assert isinstance(credentials, compute_engine.Credentials) | |
assert project_id == "example-project" | |
def test__get_gce_credentials_no_ping(unused_ping): | |
credentials, project_id = _default._get_gce_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gce_credentials_no_project_id(unused_get, unused_ping): | |
credentials, project_id = _default._get_gce_credentials() | |
assert isinstance(credentials, compute_engine.Credentials) | |
assert project_id is None | |
def test__get_gce_credentials_no_compute_engine(): | |
import sys | |
with mock.patch.dict("sys.modules"): | |
sys.modules["google.auth.compute_engine"] = None | |
credentials, project_id = _default._get_gce_credentials() | |
assert credentials is None | |
assert project_id is None | |
def test__get_gce_credentials_explicit_request(ping): | |
_default._get_gce_credentials(mock.sentinel.request) | |
ping.assert_called_with(request=mock.sentinel.request) | |
def test_default_early_out(unused_get): | |
assert _default.default_async() == (MOCK_CREDENTIALS, mock.sentinel.project_id) | |
def test_default_explict_project_id(unused_get, monkeypatch): | |
monkeypatch.setenv(environment_vars.PROJECT, "explicit-env") | |
assert _default.default_async() == (MOCK_CREDENTIALS, "explicit-env") | |
def test_default_explict_legacy_project_id(unused_get, monkeypatch): | |
monkeypatch.setenv(environment_vars.LEGACY_PROJECT, "explicit-env") | |
assert _default.default_async() == (MOCK_CREDENTIALS, "explicit-env") | |
def test_default_without_project_id( | |
unused_gce, unused_gae, unused_sdk, unused_explicit, logger_warning | |
): | |
assert _default.default_async() == (MOCK_CREDENTIALS, None) | |
logger_warning.assert_called_with(mock.ANY, mock.ANY, mock.ANY) | |
def test_default_fail(unused_gce, unused_gae, unused_sdk, unused_explicit): | |
with pytest.raises(exceptions.DefaultCredentialsError): | |
assert _default.default_async() | |
def test_default_scoped(with_scopes, unused_get): | |
scopes = ["one", "two"] | |
credentials, project_id = _default.default_async(scopes=scopes) | |
assert credentials == with_scopes.return_value | |
assert project_id == mock.sentinel.project_id | |
with_scopes.assert_called_once_with(MOCK_CREDENTIALS, scopes) | |
def test_default_no_app_engine_compute_engine_module(unused_get): | |
""" | |
google.auth.compute_engine and google.auth.app_engine are both optional | |
to allow not including them when using this package. This verifies | |
that default fails gracefully if these modules are absent | |
""" | |
import sys | |
with mock.patch.dict("sys.modules"): | |
sys.modules["google.auth.compute_engine"] = None | |
sys.modules["google.auth.app_engine"] = None | |
assert _default.default_async() == (MOCK_CREDENTIALS, mock.sentinel.project_id) | |
def test_default_warning_without_quota_project_id_for_user_creds(get_adc_path): | |
get_adc_path.return_value = test_default.AUTHORIZED_USER_CLOUD_SDK_FILE | |
with pytest.warns(UserWarning, match="Cloud SDK"): | |
credentials, project_id = _default.default_async(quota_project_id=None) | |
def test_default_no_warning_with_quota_project_id_for_user_creds(get_adc_path): | |
get_adc_path.return_value = test_default.AUTHORIZED_USER_CLOUD_SDK_FILE | |
credentials, project_id = _default.default_async(quota_project_id="project-foo") | |