#!/usr/bin/env python """Earth Engine OAuth2 helper functions for generating client tokens. Typical use-case consists of: 1. Calling 'get_authorization_url' 2. Using a browser to access the output URL and copy the generated OAuth2 code 3. Calling 'request_token' to request a token using that code and the OAuth API 4. Calling 'write_private_json' to save the token at the path given by 'get_credentials_path' """ from __future__ import print_function import base64 import errno import hashlib import json import os import sys import webbrowser from google.auth import _cloud_sdk import six from six.moves import input from six.moves.urllib import parse from six.moves.urllib import request from six.moves.urllib.error import HTTPError # Optional imports used for specific shells. # pylint: disable=g-import-not-at-top try: import IPython except ImportError: pass CLIENT_ID = ('517222506229-vsmmajv00ul0bs7p89v5m89qs8eb9359.' 'apps.googleusercontent.com') CLIENT_SECRET = 'RUP0RZ6e0pPhDzsqIJ7KlNd1' SCOPES = [ 'https://www.googleapis.com/auth/earthengine', 'https://www.googleapis.com/auth/devstorage.full_control' ] REDIRECT_URI = 'urn:ietf:wg:oauth:2.0:oob' # Prompts user to copy-paste code TOKEN_URI = 'https://accounts.google.com/o/oauth2/token' AUTH_URI = 'https://accounts.google.com/o/oauth2/auth' AUTH_PAGE_URL = 'https://code.earthengine.google.com/client-auth' MODE_URL = AUTH_PAGE_URL + '/mode' FETCH_URL = AUTH_PAGE_URL + '/fetch' SCOPE_PARAM = 'scopes=' + parse.quote(' '.join(SCOPES)) AUTH_URL_TEMPLATE = AUTH_PAGE_URL + '?' + SCOPE_PARAM + ( '&request_id={request_id}&tc={token_challenge}&cc={client_challenge}') # Command to execute in gcloud mode GCLOUD_COMMAND = ('gcloud auth application-default login --scopes={scopes} ' '--client-id-file={client_id_file}') # Command-line browsers cannot handle the auth pages. TEXT_BROWSERS = ['elinks', 'links', 'lynx', 'w3m', 'www-browser'] def get_credentials_path(): cred_path = os.path.expanduser( '~/.config/earthengine/credentials', ) return cred_path def get_credentials_arguments(): with open(get_credentials_path()) as creds: stored = json.load(creds) args = {} args['token_uri'] = TOKEN_URI # Not overridable in file args['refresh_token'] = stored['refresh_token'] # Must be present args['client_id'] = stored.get('client_id', CLIENT_ID) args['client_secret'] = stored.get('client_secret', CLIENT_SECRET) args['scopes'] = stored.get('scopes', SCOPES) return args def get_authorization_url(code_challenge): """Returns a URL to generate an auth code.""" return 'https://accounts.google.com/o/oauth2/auth?' + parse.urlencode({ 'client_id': CLIENT_ID, 'scope': ' '.join(SCOPES), 'redirect_uri': REDIRECT_URI, 'response_type': 'code', 'code_challenge': code_challenge, 'code_challenge_method': 'S256', }) def request_token(auth_code, code_verifier, client_id=None, client_secret=None, redirect_uri=None): """Uses authorization code to request tokens.""" request_args = { 'code': auth_code, 'client_id': client_id or CLIENT_ID, 'client_secret': client_secret or CLIENT_SECRET, 'redirect_uri': redirect_uri or REDIRECT_URI, 'grant_type': 'authorization_code', 'code_verifier': code_verifier, } refresh_token = None try: response = request.urlopen( TOKEN_URI, parse.urlencode(request_args).encode()).read().decode() refresh_token = json.loads(response)['refresh_token'] except HTTPError as e: raise Exception('Problem requesting tokens. Please try again. %s %s' % (e, e.read())) return refresh_token def write_private_json(json_path, info_dict): """Attempts to write the passed token to the given user directory.""" dirname = os.path.dirname(json_path) try: os.makedirs(dirname) except OSError as e: if e.errno != errno.EEXIST: raise Exception('Error creating directory %s: %s' % (dirname, e)) file_content = json.dumps(info_dict) if os.path.exists(json_path): # Remove file because os.open will not change permissions of existing files os.remove(json_path) with os.fdopen( os.open(json_path, os.O_WRONLY | os.O_CREAT, 0o600), 'w') as f: f.write(file_content) def _in_colab_shell(): """Tests if the code is being executed within Google Colab.""" try: import google.colab # pylint: disable=unused-import return True except ImportError: return False def _in_jupyter_shell(): """Tests if the code is being executed within Jupyter.""" try: import ipykernel.zmqshell return isinstance(IPython.get_ipython(), ipykernel.zmqshell.ZMQInteractiveShell) except ImportError: return False except NameError: return False def _obtain_and_write_token(auth_code=None, code_verifier=None): """Obtains and writes credentials token based on an authorization code.""" fetch_data = {} if code_verifier and ':' in code_verifier: request_id, code_verifier, client_verifier = code_verifier.split(':') fetch_data = dict(request_id=request_id, client_verifier=client_verifier) if not auth_code: auth_code = input('Enter verification code: ') assert isinstance(auth_code, six.string_types) client_info = {} scopes = SCOPES if fetch_data: data = json.dumps(fetch_data).encode() headers = {'Content-Type': 'application/json; charset=UTF-8'} fetch_client = request.Request(FETCH_URL, data=data, headers=headers) fetched_info = json.loads(request.urlopen(fetch_client).read().decode()) client_info = {k: fetched_info[k] for k in ['client_id', 'client_secret']} scopes = fetched_info.get('scopes') or SCOPES token = request_token(auth_code.strip(), code_verifier, **client_info) client_info['refresh_token'] = token client_info['scopes'] = scopes write_private_json(get_credentials_path(), client_info) print('\nSuccessfully saved authorization token.') def _display_auth_instructions_for_noninteractive(auth_url, code_verifier): """Displays instructions for authenticating without blocking for user input.""" print('Paste the following address into a web browser:\n' '\n' ' {0}\n' '\n' 'On the web page, please authorize access to your ' 'Earth Engine account and copy the authentication code. ' 'Next authenticate with the following command:\n' '\n' ' earthengine authenticate --code-verifier={1} ' '--authorization-code=PLACE_AUTH_CODE_HERE\n'.format( auth_url, six.ensure_str(code_verifier))) def _display_auth_instructions_with_print(auth_url): """Displays instructions for authenticating using a print statement.""" print('To authorize access needed by Earth Engine, open the following ' 'URL in a web browser and follow the instructions. If the web ' 'browser does not start automatically, please manually browse the ' 'URL below.\n' '\n' ' {0}\n' '\n' 'The authorization workflow will generate a code, which you ' 'should paste in the box below. '.format(auth_url)) def _display_auth_instructions_with_html(auth_url): """Displays instructions for authenticating using HTML code.""" try: IPython.display.display(IPython.display.HTML( """
To authorize access needed by Earth Engine, open the following URL in a web browser and follow the instructions:
The authorization workflow will generate a code, which you should paste in the box below
""".format(auth_url))) except NameError: print('The IPython module must be installed to use HTML.') raise def _base64param(byte_string): """Encodes bytes for use as a URL parameter.""" return base64.urlsafe_b64encode(byte_string).rstrip(b'=') def _nonce_table(*nonce_keys): """Makes random nonces, and adds PKCE challenges for each _verifier nonce.""" table = {} for key in nonce_keys: table[key] = _base64param(os.urandom(32)) if key.endswith('_verifier'): # Generate a challenge that the server will use to ensure that requests # only work with our verifiers. https://tools.ietf.org/html/rfc7636 pkce_challenge = _base64param(hashlib.sha256(table[key]).digest()) table[key.replace('_verifier', '_challenge')] = pkce_challenge return {k: v.decode() for k, v in table.items()} def _open_new_browser(url): """Open a web browser if possible.""" try: browser = webbrowser.get() if hasattr(browser, 'name') and browser.name in TEXT_BROWSERS: return except webbrowser.Error: return webbrowser.open_new(url) def _get_mode(): """Determines if we should use the new private OAuth client mode.""" try: content = request.urlopen(MODE_URL).read().decode().strip() if content in ['private', 'legacy']: return content except HTTPError: pass return 'legacy' def _in_notebook(): return _in_colab_shell() or _in_jupyter_shell() def _load_app_default_credentials(run_gcloud=True): """Initializes credentials from ADC, optionally running gcloud to get them.""" adc_path = _cloud_sdk.get_application_default_credentials_path() if run_gcloud: client_id_json = dict( client_id=CLIENT_ID, client_secret=CLIENT_SECRET, redirect_uri=REDIRECT_URI, auth_uri=AUTH_URI, token_uri=TOKEN_URI) client_id_file = get_credentials_path() + '-client-id.json' write_private_json(client_id_file, dict(installed=client_id_json)) command = GCLOUD_COMMAND.format( scopes=','.join(SCOPES), client_id_file=client_id_file) print('Fetching credentials using gcloud') return_code = os.system(command) os.remove(client_id_file) if return_code != 0: print('gcloud failed. ' 'Please check for any errors above and install gcloud if needed.') return else: # Only consult the environment variable in appdefault mode, because gcloud # always writes to the default location. adc_path = os.getenv('GOOGLE_APPLICATION_CREDENTIALS', adc_path) with open(adc_path) as adc_json: adc = json.load(adc_json) adc = {k: adc[k] for k in ['client_id', 'client_secret', 'refresh_token']} write_private_json(get_credentials_path(), adc) print('\nSuccessfully saved authorization token.') def authenticate( cli_authorization_code=None, quiet=False, cli_code_verifier=None, auth_mode=None): """Prompts the user to authorize access to Earth Engine via OAuth2. Args: cli_authorization_code: An optional authorization code. Supports CLI mode, where the code is passed as an argument to `earthengine authenticate`. quiet: If true, do not require interactive prompts. cli_code_verifier: PKCE verifier to prevent auth code stealing. Must be provided if cli_authorization_code is given. auth_mode: The authentication mode. One of: "paste" - send user to accounts.google.com to get a pastable token. This legacy mode will be disabled in April 2022 for security reasons. "notebook" - send user to notebook authenticator page. Intended for web users who do not run code locally. Credentials expire in 7 days. "gcloud" - use gcloud to obtain credentials. This runs a command line to set the appdefault file, which must run on your local machine. "appdefault" - read an existing $GOOGLE_APPLICATION_CREDENTIALS file without running gcloud. None - a default mode is chosen based on your environment. Raises: Exception: on invalid arguments. """ if cli_authorization_code: _obtain_and_write_token(cli_authorization_code, cli_code_verifier) return if auth_mode: if auth_mode not in ['paste', 'notebook', 'gcloud', 'appdefault']: raise Exception('Unknown auth_mode "%s"' % auth_mode) else: if _get_mode() == 'legacy': auth_mode = 'paste' else: auth_mode = 'notebook' if _in_notebook() else 'gcloud' if auth_mode in ['appdefault', 'gcloud']: _load_app_default_credentials(auth_mode == 'gcloud') return pkce = _nonce_table('code_verifier') code_verifier = pkce['code_verifier'] auth_url = get_authorization_url(pkce['code_challenge']) if auth_mode == 'notebook': nonces = ['request_id', 'token_verifier', 'client_verifier'] request_info = _nonce_table(*nonces) auth_url = AUTH_URL_TEMPLATE.format(**request_info) code_verifier = ':'.join(request_info[k] for k in nonces) if quiet: _display_auth_instructions_for_noninteractive(auth_url, code_verifier) _open_new_browser(auth_url) return if _in_colab_shell(): if sys.version_info[0] == 2: # Python 2 _display_auth_instructions_for_noninteractive(auth_url, code_verifier) return else: # Python 3 _display_auth_instructions_with_print(auth_url) elif _in_jupyter_shell(): _display_auth_instructions_with_html(auth_url) else: _display_auth_instructions_with_print(auth_url) _open_new_browser(auth_url) _obtain_and_write_token(None, code_verifier) # Will prompt for auth_code.