उपयोगकर्ता के क्रेडेंशियल जनरेट करें

Python

#!/usr/bin/env python
# Copyright 2018 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""This example will create an OAuth2 refresh token for the Search Ads 360 Reporting API.

This example works with both web and desktop app OAuth client ID types.

https://console.cloud.google.com

IMPORTANT: For web app clients types, you must add "http://127.0.0.1" to the
"Authorized redirect URIs" list in your Google Cloud Console project before
running this example. Desktop app client types do not require the local
redirect to be explicitly configured in the console.

Once complete, download the credentials and save the file path so it can be
passed into this example.

This example is a very simple implementation, for a more detailed example see:
https://developers.google.com/identity/protocols/oauth2/web-server#python
"""

import argparse
import hashlib
import os
import re
import socket
import sys
import urllib.parse

# If using Web flow, the redirect URL must match exactly what’s configured in
# GCP for the OAuth client.  If using Desktop flow, the redirect must be a
# localhost URL and is not explicitly set in GCP.
from google_auth_oauthlib.flow import Flow

_SCOPE = "https://www.googleapis.com/auth/doubleclicksearch"
_SERVER = "127.0.0.1"
_PORT = 8080
_REDIRECT_URI = f"http://{_SERVER}:{_PORT}"

# The environment variable used historically to read credentials.
_DSAPICRED_ENV = "DSAPICRED"


def main(client_secrets_path, scopes):
  """The main method, starts a basic server and initializes an auth request.

  Args:
    client_secrets_path: a path to where the client secrets JSON file is
          located on the machine running this example.
    scopes: a list of API scopes to include in the auth request, see:
            https://developers.google.com/identity/protocols/oauth2/scopes
  """
  flow = Flow.from_client_secrets_file(client_secrets_path, scopes=scopes)
  flow.redirect_uri = _REDIRECT_URI

  # Create an anti-forgery state token as described here:
  # https://developers.google.com/identity/protocols/OpenIDConnect#createxsrftoken
  passthrough_val = hashlib.sha256(os.urandom(1024)).hexdigest()

  authorization_url, unused_state = flow.authorization_url(
      access_type="offline",
      state=passthrough_val,
      prompt="consent",
      include_granted_scopes="true",
  )

  os.environ["OAUTHLIB_RELAX_TOKEN_SCOPE"] = "1"

  # Prints the authorization URL so you can paste into your browser. In a
  # typical web application you would redirect the user to this URL, and they
  # would be redirected back to "redirect_url" provided earlier after
  # granting permission.
  print("Paste this URL into your browser: ")
  print(authorization_url)
  print(f"\nWaiting for authorization and callback to: {_REDIRECT_URI}")

  # Retrieves an authorization code by opening a socket to receive the
  # redirect request and parsing the query parameters set in the URL.
  code = urllib.parse.unquote(get_authorization_code(passthrough_val))

  # Pass the code back into the OAuth module to get a refresh token.
  flow.fetch_token(code=code)
  refresh_token = flow.credentials.refresh_token

  print(f"\nYour refresh token is: {refresh_token}\n")

  credentials = flow.credentials
  cid = credentials.client_id
  csc = credentials.client_secret
  print('# DSAPI credentials: "client_id,client_secret,refresh_token"')
  print('%s="%s,%s,%s"' % (_DSAPICRED_ENV, cid, csc, refresh_token))


def get_authorization_code(passthrough_val):
  """Opens a socket to handle a single HTTP request containing auth tokens.

  Args:
    passthrough_val: an anti-forgery token used to verify the request
          received by the socket.

  Returns:
    a str access token from the Google Auth service.
  """
  # Open a socket at _SERVER:_PORT and listen for a request
  sock = socket.socket()
  sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  sock.bind((_SERVER, _PORT))
  sock.listen(1)
  connection, unused_address = sock.accept()
  data = connection.recv(1024)
  # Parse the raw request to retrieve the URL query parameters.
  params = parse_raw_query_params(data)

  try:
    if not params.get("code"):
      # If no code is present in the query params then there will be an
      # error message with more details.
      error = params.get("error")
      message = f"Failed to retrieve authorization code. Error: {error}"
      raise ValueError(message)
    elif params.get("state") != passthrough_val:
      message = "State token does not match the expected state."
      raise ValueError(message)
    else:
      message = "Authorization code was successfully retrieved."
  except ValueError as error:
    print(error)
    sys.exit(1)
  finally:
    response = ("HTTP/1.1 200 OK\n"
                "Content-Type: text/html\n\n"
                f"<b>{message}</b>"
                "<p>Please check the console output.</p>\n")

    connection.sendall(response.encode())
    connection.close()

  return params.get("code")


def parse_raw_query_params(data):
  """Parses a raw HTTP request to extract its query params as a dict.

    Note that this logic is likely irrelevant if you're building OAuth logic
    into a complete web application, where response parsing is handled by a
    framework.

  Args:
    data: raw request data as bytes.

  Returns:
    a dict of query parameter key value pairs.
  """
  # Decode the request into a utf-8 encoded string
  decoded = data.decode("utf-8")
  # Use a regular expression to extract the URL query parameters string
  match = re.search(r"GET\s\/\?(.*) ", decoded)
  params = match.group(1)
  # Split the parameters to isolate the key/value pairs
  pairs = [pair.split("=") for pair in params.split("&")]
  # Convert pairs to a dict to make it easy to access the values
  return {key: val for key, val in pairs}


if __name__ == "__main__":
  parser = argparse.ArgumentParser(
      description=(
          "Generates OAuth2 refresh token using the Web application flow. "
          "To retrieve the necessary client_secrets JSON file, first "
          "generate OAuth 2.0 credentials of type Web application in the "
          "Google Cloud Console (https://console.cloud.google.com). "
          "Make sure 'http://_SERVER:_PORT' is included the list of "
          "'Authorized redirect URIs' for this client ID."),)
  # The following argument(s) should be provided to run the example.
  parser.add_argument(
      "-c",
      "--client_secrets_path",
      required=True,
      type=str,
      help=("Path to the client secrets JSON file from the Google Developers "
            "Console that contains your client ID, client secret, and "
            "redirect URIs."),
  )
  parser.add_argument(
      "--additional_scopes",
      default=None,
      type=str,
      nargs="+",
      help="Additional scopes to apply when generating the refresh token.",
  )
  args = parser.parse_args()

  configured_scopes = [_SCOPE]

  if args.additional_scopes:
    print("Using additional scopes: ", args.additional_scopes)
    configured_scopes.extend(args.additional_scopes)

  main(args.client_secrets_path, configured_scopes)

generate_user_credentials.py डाउनलोड करें