| // Copyright 2014 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package oauth2 |
| |
| import ( |
| "context" |
| "fmt" |
| "net/http" |
| "net/url" |
| "strconv" |
| "strings" |
| "time" |
| |
| "golang.org/x/oauth2/internal" |
| ) |
| |
| // expiryDelta determines how earlier a token should be considered |
| // expired than its actual expiration time. It is used to avoid late |
| // expirations due to client-server time mismatches. |
| const expiryDelta = 10 * time.Second |
| |
| // Token represents the credentials used to authorize |
| // the requests to access protected resources on the OAuth 2.0 |
| // provider's backend. |
| // |
| // Most users of this package should not access fields of Token |
| // directly. They're exported mostly for use by related packages |
| // implementing derivative OAuth2 flows. |
| type Token struct { |
| // AccessToken is the token that authorizes and authenticates |
| // the requests. |
| AccessToken string `json:"access_token"` |
| |
| // TokenType is the type of token. |
| // The Type method returns either this or "Bearer", the default. |
| TokenType string `json:"token_type,omitempty"` |
| |
| // RefreshToken is a token that's used by the application |
| // (as opposed to the user) to refresh the access token |
| // if it expires. |
| RefreshToken string `json:"refresh_token,omitempty"` |
| |
| // Expiry is the optional expiration time of the access token. |
| // |
| // If zero, TokenSource implementations will reuse the same |
| // token forever and RefreshToken or equivalent |
| // mechanisms for that TokenSource will not be used. |
| Expiry time.Time `json:"expiry,omitempty"` |
| |
| // raw optionally contains extra metadata from the server |
| // when updating a token. |
| raw interface{} |
| } |
| |
| // Type returns t.TokenType if non-empty, else "Bearer". |
| func (t *Token) Type() string { |
| if strings.EqualFold(t.TokenType, "bearer") { |
| return "Bearer" |
| } |
| if strings.EqualFold(t.TokenType, "mac") { |
| return "MAC" |
| } |
| if strings.EqualFold(t.TokenType, "basic") { |
| return "Basic" |
| } |
| if t.TokenType != "" { |
| return t.TokenType |
| } |
| return "Bearer" |
| } |
| |
| // SetAuthHeader sets the Authorization header to r using the access |
| // token in t. |
| // |
| // This method is unnecessary when using Transport or an HTTP Client |
| // returned by this package. |
| func (t *Token) SetAuthHeader(r *http.Request) { |
| r.Header.Set("Authorization", t.Type()+" "+t.AccessToken) |
| } |
| |
| // WithExtra returns a new Token that's a clone of t, but using the |
| // provided raw extra map. This is only intended for use by packages |
| // implementing derivative OAuth2 flows. |
| func (t *Token) WithExtra(extra interface{}) *Token { |
| t2 := new(Token) |
| *t2 = *t |
| t2.raw = extra |
| return t2 |
| } |
| |
| // Extra returns an extra field. |
| // Extra fields are key-value pairs returned by the server as a |
| // part of the token retrieval response. |
| func (t *Token) Extra(key string) interface{} { |
| if raw, ok := t.raw.(map[string]interface{}); ok { |
| return raw[key] |
| } |
| |
| vals, ok := t.raw.(url.Values) |
| if !ok { |
| return nil |
| } |
| |
| v := vals.Get(key) |
| switch s := strings.TrimSpace(v); strings.Count(s, ".") { |
| case 0: // Contains no "."; try to parse as int |
| if i, err := strconv.ParseInt(s, 10, 64); err == nil { |
| return i |
| } |
| case 1: // Contains a single "."; try to parse as float |
| if f, err := strconv.ParseFloat(s, 64); err == nil { |
| return f |
| } |
| } |
| |
| return v |
| } |
| |
| // timeNow is time.Now but pulled out as a variable for tests. |
| var timeNow = time.Now |
| |
| // expired reports whether the token is expired. |
| // t must be non-nil. |
| func (t *Token) expired() bool { |
| if t.Expiry.IsZero() { |
| return false |
| } |
| return t.Expiry.Round(0).Add(-expiryDelta).Before(timeNow()) |
| } |
| |
| // Valid reports whether t is non-nil, has an AccessToken, and is not expired. |
| func (t *Token) Valid() bool { |
| return t != nil && t.AccessToken != "" && !t.expired() |
| } |
| |
| // tokenFromInternal maps an *internal.Token struct into |
| // a *Token struct. |
| func tokenFromInternal(t *internal.Token) *Token { |
| if t == nil { |
| return nil |
| } |
| return &Token{ |
| AccessToken: t.AccessToken, |
| TokenType: t.TokenType, |
| RefreshToken: t.RefreshToken, |
| Expiry: t.Expiry, |
| raw: t.Raw, |
| } |
| } |
| |
| // retrieveToken takes a *Config and uses that to retrieve an *internal.Token. |
| // This token is then mapped from *internal.Token into an *oauth2.Token which is returned along |
| // with an error.. |
| func retrieveToken(ctx context.Context, c *Config, v url.Values) (*Token, error) { |
| tk, err := internal.RetrieveToken(ctx, c.ClientID, c.ClientSecret, c.Endpoint.TokenURL, v) |
| if err != nil { |
| if rErr, ok := err.(*internal.RetrieveError); ok { |
| return nil, (*RetrieveError)(rErr) |
| } |
| return nil, err |
| } |
| return tokenFromInternal(tk), nil |
| } |
| |
| // RetrieveError is the error returned when the token endpoint returns a |
| // non-2XX HTTP status code. |
| type RetrieveError struct { |
| Response *http.Response |
| // Body is the body that was consumed by reading Response.Body. |
| // It may be truncated. |
| Body []byte |
| } |
| |
| func (r *RetrieveError) Error() string { |
| return fmt.Sprintf("oauth2: cannot fetch token: %v\nResponse: %s", r.Response.Status, r.Body) |
| } |