diff options
| author | CoprDistGit <infra@openeuler.org> | 2023-05-18 04:00:58 +0000 |
|---|---|---|
| committer | CoprDistGit <infra@openeuler.org> | 2023-05-18 04:00:58 +0000 |
| commit | d014cdc9d8a8f6c85b8f824c3af84baa07b11007 (patch) | |
| tree | 3c3484f08ea551710eb73b44b410d7953ba262f4 | |
| parent | 3790c489401f362f18b46890512245fa751f0e0b (diff) | |
automatic import of python-google-oauth2l
| -rw-r--r-- | .gitignore | 1 | ||||
| -rw-r--r-- | python-google-oauth2l.spec | 489 | ||||
| -rw-r--r-- | sources | 1 |
3 files changed, 491 insertions, 0 deletions
@@ -0,0 +1 @@ +/google-oauth2l-1.0.2.tar.gz diff --git a/python-google-oauth2l.spec b/python-google-oauth2l.spec new file mode 100644 index 0000000..8000fbf --- /dev/null +++ b/python-google-oauth2l.spec @@ -0,0 +1,489 @@ +%global _empty_manifest_terminate_build 0 +Name: python-google-oauth2l +Version: 1.0.2 +Release: 1 +Summary: command-line google oauth tools +License: Apache 2.0 +URL: http://github.com/google/oauth2l +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/22/b7/3747bcded8681cc6ce52d9c668939013b7658f49dcd30a9cc1653b00be67/google-oauth2l-1.0.2.tar.gz +BuildArch: noarch + +Requires: python3-httplib2 +Requires: python3-oauth2client +Requires: python3-setuptools +Requires: python3-six +Requires: python3-fasteners +Requires: python3-pyopenssl + +%description +[](https://travis-ci.org/google/oauth2l) +[](https://coveralls.io/r/google/oauth2l?branch=master) +[](https://pypi.python.org/pypi/google-oauth2l) +[](https://pypi.python.org/pypi/google-oauth2l) +`oauth2l` (pronounced "oauth tool") is a simple command-line tool for +working with +[Google OAuth 2.0](https://developers.google.com/identity/protocols/OAuth2). +Its primary use is to fetch and +print OAuth 2.0 access tokens, which can be used with other command-line +tools and shell scripts. +This tool also demonstrates how to design a simple and easy-to-use OAuth +2.0 client experience. If you need to reimplement this functionality in +another programming language, please use [Go OAuth2l](go/oauth2client) +as reference code. +## Overview +`oauth2l` supports all Google OAuth 2.0 authentication flows for both user +accounts and service accounts in different environments: +* When running inside Google Compute Engine (GCE) and Google Container + Engine (GKE), it uses the credentials of the current service account + if it is available. +* When running inside user context that has an active Google Cloud SDK + (gcloud) session, it uses the current gcloud credentials. +* When running with command option `--json xxx`, where `xxx` points to + a JSON credential file downloaded from + [Google Cloud Console](https://console.cloud.google.com/apis/credentials), + `oauth2l` uses the file to start an OAuth session. The file can be + either a service account key or an OAuth client ID. +* When running with command option `--sso {email}`, it invokes an + external `sso` command to retrieve Single Sign-on (SSO) access token. +NOTE: `oauth2l` caches the OAuth credentials in user's home directory to +avoid prompting user repeatedly. +## Install +``` +# Mac only. Install `pip` first. +$ sudo easy_install pip +# Install `oauth2l` under the OS, typically "/usr/local/bin". +$ pip install google-oauth2l --upgrade +# If you see an error on OS X El Capitan or up, please try +$ pip install google-oauth2l --upgrade --ignore-installed +# Install `oauth2l` under the current user, typically "~/.local/bin" (on Linux) +# and "~/Library/Python/2.7/bin" (on Mac). +$ pip install --user google-oauth2l +``` +## Command Options +### --json +Specifies an OAuth credential file, either an OAuth client ID or a Service +Account key, to start the OAuth flow. You can download the file from +[Google Cloud Console](https://console.cloud.google.com/apis/credentials). +``` +$ oauth2l fetch --json ~/service_account.json cloud-platform +``` +### --sso and --sso_cli +Using an external Single Sign-on (SSO) command to fetch OAuth token. +The command outputs an OAuth access token to its stdout. The default +command is for Google's corporate SSO. For example: +``` +$ sso me@example.com scope1 scope2 +``` +Then use oauth2l with the SSO CLI: +``` +$ oauth2l header --sso me@example.com --sso_cli /usr/bin/sso cloud-platform +$ oauth2l header --sso me@google.com cloud-platform +``` +### --jwt +When this option is set and the json file specified in the `--json` option +is a service account key file, a JWT token signed by the service account +private key will be generated. When this option is set, no scope list is +needed but a single JWT audience must be provided. +Example: +``` +oauth2l fetch --jwt --json ~/service_account.json https://pubsub.googleapis.com/google.pubsub.v1.Publisher +``` +## Commands +### fetch +Fetch and print an access token for the specified OAuth scopes. For example, +the following command prints access token for the following OAuth2 scopes: +* https://www.googleapis.com/auth/userinfo.email +* https://www.googleapis.com/auth/cloud-platform +``` +$ oauth2l fetch userinfo.email cloud-platform +ya29.zyxwvutsrqpnmolkjihgfedcba +$ oauth2l fetch -f json userinfo.email cloud-platform +{ + "access_token": "ya29.zyxwvutsrqpnmolkjihgfedcba", + "token_expiry": "2017-02-27T21:20:47Z", + "user_agent": "oauth2l/1.0.0", +} +``` +NOTE: the `-f` flag specifies the output format. The supported formats are: +bare (default), header, json, json_compact, pretty. +### header +The same as `fetch`, except the output is in HTTP header format: +``` +$ oauth2l header userinfo.email +Authorization: Bearer ya29.zyxwvutsrqpnmolkjihgfedcba +``` +The `header` command is designed to be easy to use with `curl`. For example, +the following command uses the PubSub API to list all PubSub topics. +``` +$ curl -H "$(oauth2l header pubsub)" https://pubsub.googleapis.com/v1/projects/my-project-id/topics +``` +If you need to call Google APIs frequently using `curl`, you can define a +shell alias for it. For example: +``` +$ alias gcurl='curl -H "$(oauth2l header cloud-platform)" -H "Content-Type: application/json" ' +$ gcurl 'https://pubsub.googleapis.com/v1/projects/my-project-id/topics' +``` +### info +Print information about a valid token. This always includes the list of scopes +and expiration time. If the token has either the +`https://www.googleapis.com/auth/userinfo.email` or +`https://www.googleapis.com/auth/plus.me` scope, it also prints the email +address of the authenticated identity. +``` +$ oauth2l info $(oauth2l fetch pubsub) +{ + "expires_in": 3599, + "scope": "https://www.googleapis.com/auth/pubsub", + "email": "user@gmail.com" +} +``` +### test +Test a token. This sets an exit code of 0 for a valid token and 1 otherwise, +which can be useful in shell pipelines. +``` +$ oauth2l test ya29.zyxwvutsrqpnmolkjihgfedcba +$ echo $? +0 +$ oauth2l test ya29.justkiddingmadethisoneup +$ echo $? +1 +``` +### reset +Reset all tokens cached locally. We cache previously retrieved tokens in the +file `~/.oauth2l.token`. +``` +$ oauth2l reset +``` + +%package -n python3-google-oauth2l +Summary: command-line google oauth tools +Provides: python-google-oauth2l +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-google-oauth2l +[](https://travis-ci.org/google/oauth2l) +[](https://coveralls.io/r/google/oauth2l?branch=master) +[](https://pypi.python.org/pypi/google-oauth2l) +[](https://pypi.python.org/pypi/google-oauth2l) +`oauth2l` (pronounced "oauth tool") is a simple command-line tool for +working with +[Google OAuth 2.0](https://developers.google.com/identity/protocols/OAuth2). +Its primary use is to fetch and +print OAuth 2.0 access tokens, which can be used with other command-line +tools and shell scripts. +This tool also demonstrates how to design a simple and easy-to-use OAuth +2.0 client experience. If you need to reimplement this functionality in +another programming language, please use [Go OAuth2l](go/oauth2client) +as reference code. +## Overview +`oauth2l` supports all Google OAuth 2.0 authentication flows for both user +accounts and service accounts in different environments: +* When running inside Google Compute Engine (GCE) and Google Container + Engine (GKE), it uses the credentials of the current service account + if it is available. +* When running inside user context that has an active Google Cloud SDK + (gcloud) session, it uses the current gcloud credentials. +* When running with command option `--json xxx`, where `xxx` points to + a JSON credential file downloaded from + [Google Cloud Console](https://console.cloud.google.com/apis/credentials), + `oauth2l` uses the file to start an OAuth session. The file can be + either a service account key or an OAuth client ID. +* When running with command option `--sso {email}`, it invokes an + external `sso` command to retrieve Single Sign-on (SSO) access token. +NOTE: `oauth2l` caches the OAuth credentials in user's home directory to +avoid prompting user repeatedly. +## Install +``` +# Mac only. Install `pip` first. +$ sudo easy_install pip +# Install `oauth2l` under the OS, typically "/usr/local/bin". +$ pip install google-oauth2l --upgrade +# If you see an error on OS X El Capitan or up, please try +$ pip install google-oauth2l --upgrade --ignore-installed +# Install `oauth2l` under the current user, typically "~/.local/bin" (on Linux) +# and "~/Library/Python/2.7/bin" (on Mac). +$ pip install --user google-oauth2l +``` +## Command Options +### --json +Specifies an OAuth credential file, either an OAuth client ID or a Service +Account key, to start the OAuth flow. You can download the file from +[Google Cloud Console](https://console.cloud.google.com/apis/credentials). +``` +$ oauth2l fetch --json ~/service_account.json cloud-platform +``` +### --sso and --sso_cli +Using an external Single Sign-on (SSO) command to fetch OAuth token. +The command outputs an OAuth access token to its stdout. The default +command is for Google's corporate SSO. For example: +``` +$ sso me@example.com scope1 scope2 +``` +Then use oauth2l with the SSO CLI: +``` +$ oauth2l header --sso me@example.com --sso_cli /usr/bin/sso cloud-platform +$ oauth2l header --sso me@google.com cloud-platform +``` +### --jwt +When this option is set and the json file specified in the `--json` option +is a service account key file, a JWT token signed by the service account +private key will be generated. When this option is set, no scope list is +needed but a single JWT audience must be provided. +Example: +``` +oauth2l fetch --jwt --json ~/service_account.json https://pubsub.googleapis.com/google.pubsub.v1.Publisher +``` +## Commands +### fetch +Fetch and print an access token for the specified OAuth scopes. For example, +the following command prints access token for the following OAuth2 scopes: +* https://www.googleapis.com/auth/userinfo.email +* https://www.googleapis.com/auth/cloud-platform +``` +$ oauth2l fetch userinfo.email cloud-platform +ya29.zyxwvutsrqpnmolkjihgfedcba +$ oauth2l fetch -f json userinfo.email cloud-platform +{ + "access_token": "ya29.zyxwvutsrqpnmolkjihgfedcba", + "token_expiry": "2017-02-27T21:20:47Z", + "user_agent": "oauth2l/1.0.0", +} +``` +NOTE: the `-f` flag specifies the output format. The supported formats are: +bare (default), header, json, json_compact, pretty. +### header +The same as `fetch`, except the output is in HTTP header format: +``` +$ oauth2l header userinfo.email +Authorization: Bearer ya29.zyxwvutsrqpnmolkjihgfedcba +``` +The `header` command is designed to be easy to use with `curl`. For example, +the following command uses the PubSub API to list all PubSub topics. +``` +$ curl -H "$(oauth2l header pubsub)" https://pubsub.googleapis.com/v1/projects/my-project-id/topics +``` +If you need to call Google APIs frequently using `curl`, you can define a +shell alias for it. For example: +``` +$ alias gcurl='curl -H "$(oauth2l header cloud-platform)" -H "Content-Type: application/json" ' +$ gcurl 'https://pubsub.googleapis.com/v1/projects/my-project-id/topics' +``` +### info +Print information about a valid token. This always includes the list of scopes +and expiration time. If the token has either the +`https://www.googleapis.com/auth/userinfo.email` or +`https://www.googleapis.com/auth/plus.me` scope, it also prints the email +address of the authenticated identity. +``` +$ oauth2l info $(oauth2l fetch pubsub) +{ + "expires_in": 3599, + "scope": "https://www.googleapis.com/auth/pubsub", + "email": "user@gmail.com" +} +``` +### test +Test a token. This sets an exit code of 0 for a valid token and 1 otherwise, +which can be useful in shell pipelines. +``` +$ oauth2l test ya29.zyxwvutsrqpnmolkjihgfedcba +$ echo $? +0 +$ oauth2l test ya29.justkiddingmadethisoneup +$ echo $? +1 +``` +### reset +Reset all tokens cached locally. We cache previously retrieved tokens in the +file `~/.oauth2l.token`. +``` +$ oauth2l reset +``` + +%package help +Summary: Development documents and examples for google-oauth2l +Provides: python3-google-oauth2l-doc +%description help +[](https://travis-ci.org/google/oauth2l) +[](https://coveralls.io/r/google/oauth2l?branch=master) +[](https://pypi.python.org/pypi/google-oauth2l) +[](https://pypi.python.org/pypi/google-oauth2l) +`oauth2l` (pronounced "oauth tool") is a simple command-line tool for +working with +[Google OAuth 2.0](https://developers.google.com/identity/protocols/OAuth2). +Its primary use is to fetch and +print OAuth 2.0 access tokens, which can be used with other command-line +tools and shell scripts. +This tool also demonstrates how to design a simple and easy-to-use OAuth +2.0 client experience. If you need to reimplement this functionality in +another programming language, please use [Go OAuth2l](go/oauth2client) +as reference code. +## Overview +`oauth2l` supports all Google OAuth 2.0 authentication flows for both user +accounts and service accounts in different environments: +* When running inside Google Compute Engine (GCE) and Google Container + Engine (GKE), it uses the credentials of the current service account + if it is available. +* When running inside user context that has an active Google Cloud SDK + (gcloud) session, it uses the current gcloud credentials. +* When running with command option `--json xxx`, where `xxx` points to + a JSON credential file downloaded from + [Google Cloud Console](https://console.cloud.google.com/apis/credentials), + `oauth2l` uses the file to start an OAuth session. The file can be + either a service account key or an OAuth client ID. +* When running with command option `--sso {email}`, it invokes an + external `sso` command to retrieve Single Sign-on (SSO) access token. +NOTE: `oauth2l` caches the OAuth credentials in user's home directory to +avoid prompting user repeatedly. +## Install +``` +# Mac only. Install `pip` first. +$ sudo easy_install pip +# Install `oauth2l` under the OS, typically "/usr/local/bin". +$ pip install google-oauth2l --upgrade +# If you see an error on OS X El Capitan or up, please try +$ pip install google-oauth2l --upgrade --ignore-installed +# Install `oauth2l` under the current user, typically "~/.local/bin" (on Linux) +# and "~/Library/Python/2.7/bin" (on Mac). +$ pip install --user google-oauth2l +``` +## Command Options +### --json +Specifies an OAuth credential file, either an OAuth client ID or a Service +Account key, to start the OAuth flow. You can download the file from +[Google Cloud Console](https://console.cloud.google.com/apis/credentials). +``` +$ oauth2l fetch --json ~/service_account.json cloud-platform +``` +### --sso and --sso_cli +Using an external Single Sign-on (SSO) command to fetch OAuth token. +The command outputs an OAuth access token to its stdout. The default +command is for Google's corporate SSO. For example: +``` +$ sso me@example.com scope1 scope2 +``` +Then use oauth2l with the SSO CLI: +``` +$ oauth2l header --sso me@example.com --sso_cli /usr/bin/sso cloud-platform +$ oauth2l header --sso me@google.com cloud-platform +``` +### --jwt +When this option is set and the json file specified in the `--json` option +is a service account key file, a JWT token signed by the service account +private key will be generated. When this option is set, no scope list is +needed but a single JWT audience must be provided. +Example: +``` +oauth2l fetch --jwt --json ~/service_account.json https://pubsub.googleapis.com/google.pubsub.v1.Publisher +``` +## Commands +### fetch +Fetch and print an access token for the specified OAuth scopes. For example, +the following command prints access token for the following OAuth2 scopes: +* https://www.googleapis.com/auth/userinfo.email +* https://www.googleapis.com/auth/cloud-platform +``` +$ oauth2l fetch userinfo.email cloud-platform +ya29.zyxwvutsrqpnmolkjihgfedcba +$ oauth2l fetch -f json userinfo.email cloud-platform +{ + "access_token": "ya29.zyxwvutsrqpnmolkjihgfedcba", + "token_expiry": "2017-02-27T21:20:47Z", + "user_agent": "oauth2l/1.0.0", +} +``` +NOTE: the `-f` flag specifies the output format. The supported formats are: +bare (default), header, json, json_compact, pretty. +### header +The same as `fetch`, except the output is in HTTP header format: +``` +$ oauth2l header userinfo.email +Authorization: Bearer ya29.zyxwvutsrqpnmolkjihgfedcba +``` +The `header` command is designed to be easy to use with `curl`. For example, +the following command uses the PubSub API to list all PubSub topics. +``` +$ curl -H "$(oauth2l header pubsub)" https://pubsub.googleapis.com/v1/projects/my-project-id/topics +``` +If you need to call Google APIs frequently using `curl`, you can define a +shell alias for it. For example: +``` +$ alias gcurl='curl -H "$(oauth2l header cloud-platform)" -H "Content-Type: application/json" ' +$ gcurl 'https://pubsub.googleapis.com/v1/projects/my-project-id/topics' +``` +### info +Print information about a valid token. This always includes the list of scopes +and expiration time. If the token has either the +`https://www.googleapis.com/auth/userinfo.email` or +`https://www.googleapis.com/auth/plus.me` scope, it also prints the email +address of the authenticated identity. +``` +$ oauth2l info $(oauth2l fetch pubsub) +{ + "expires_in": 3599, + "scope": "https://www.googleapis.com/auth/pubsub", + "email": "user@gmail.com" +} +``` +### test +Test a token. This sets an exit code of 0 for a valid token and 1 otherwise, +which can be useful in shell pipelines. +``` +$ oauth2l test ya29.zyxwvutsrqpnmolkjihgfedcba +$ echo $? +0 +$ oauth2l test ya29.justkiddingmadethisoneup +$ echo $? +1 +``` +### reset +Reset all tokens cached locally. We cache previously retrieved tokens in the +file `~/.oauth2l.token`. +``` +$ oauth2l reset +``` + +%prep +%autosetup -n google-oauth2l-1.0.2 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-google-oauth2l -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Thu May 18 2023 Python_Bot <Python_Bot@openeuler.org> - 1.0.2-1 +- Package Spec generated @@ -0,0 +1 @@ +fd47796db276980cab275bc5d2becf58 google-oauth2l-1.0.2.tar.gz |
