 5d37139374
			
		
	
	5d37139374
	
	
	
		
			
			BUG= Review URL: https://webrtc-codereview.appspot.com/1166004 git-svn-id: http://webrtc.googlecode.com/svn/trunk@3627 4adac7df-926f-26a2-2b94-8c16560cd09d
		
			
				
	
	
		
			141 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
| #!/usr/bin/env python
 | |
| #-*- coding: utf-8 -*-
 | |
| # Copyright (c) 2012 The WebRTC project authors. All Rights Reserved.
 | |
| #
 | |
| # Use of this source code is governed by a BSD-style license
 | |
| # that can be found in the LICENSE file in the root of the source
 | |
| # tree. An additional intellectual property rights grant can be found
 | |
| # in the file PATENTS.  All contributing project authors may
 | |
| # be found in the AUTHORS file in the root of the source tree.
 | |
| 
 | |
| """This script request an access token from the appengine running the dashboard.
 | |
| 
 | |
|    The script is intended to be run manually whenever we wish to change which
 | |
|    dashboard administrator we act on behalf of when running the
 | |
|    track_coverage.py script. For example, this will be useful if the current
 | |
|    dashboard administrator leaves the project. This script can also be used to
 | |
|    launch a new dashboard if that is desired.
 | |
| 
 | |
|    This script should be run on the build bot which runs the track_coverage.py
 | |
|    script. This script will present a link during its execution, which the new
 | |
|    administrator should follow and then click approve on the web page that
 | |
|    appears. The new administrator should have admin rights on the coverage
 | |
|    dashboard, otherwise the track_* scripts will not work.
 | |
| 
 | |
|    If successful, this script will write the access token to a file access.token
 | |
|    in the current directory, which later can be read by the track_* scripts.
 | |
|    The token is stored in string form (as reported by the web server) using the
 | |
|    shelve module. The consumer secret passed in as an argument to this script
 | |
|    will also similarly be stored in a file consumer.secret. The shelve keys
 | |
|    will be 'access_token' and 'consumer_secret', respectively.
 | |
| """
 | |
| 
 | |
| import shelve
 | |
| import sys
 | |
| import urlparse
 | |
| import oauth2 as oauth
 | |
| 
 | |
| import constants
 | |
| 
 | |
| 
 | |
| class FailedToRequestPermissionException(Exception):
 | |
|   pass
 | |
| 
 | |
| 
 | |
| def _ensure_token_response_is_200(response, queried_url, token_type):
 | |
|   if response.status != 200:
 | |
|     raise FailedToRequestPermissionException('Failed to request %s from %s: '
 | |
|                                              'received status %d, reason %s.' %
 | |
|                                              (token_type,
 | |
|                                               queried_url,
 | |
|                                               response.status,
 | |
|                                               response.reason))
 | |
| 
 | |
| 
 | |
| def _request_unauthorized_token(consumer, request_token_url):
 | |
|   """Requests the initial token from the dashboard service.
 | |
| 
 | |
|      Given that the response from the server is correct, we will return a
 | |
|      dictionary containing oauth_token and oauth_token_secret mapped to the
 | |
|      token and secret value, respectively.
 | |
|   """
 | |
|   client = oauth.Client(consumer)
 | |
| 
 | |
|   try:
 | |
|     response, content = client.request(request_token_url, 'POST')
 | |
|   except AttributeError as error:
 | |
|     # This catch handler is here since we'll get very confusing messages
 | |
|     # if the target server is down for some reason.
 | |
|     raise FailedToRequestPermissionException('Failed to request token: '
 | |
|                                              'the dashboard is likely down.',
 | |
|                                              error)
 | |
| 
 | |
|   _ensure_token_response_is_200(response, request_token_url,
 | |
|                                 'unauthorized token')
 | |
| 
 | |
|   return dict(urlparse.parse_qsl(content))
 | |
| 
 | |
| 
 | |
| def _ask_user_to_authorize_us(unauthorized_token):
 | |
|   """This function will block until the user enters y + newline."""
 | |
|   print 'Go to the following link in your browser:'
 | |
|   print '%s?oauth_token=%s' % (constants.AUTHORIZE_TOKEN_URL,
 | |
|                                unauthorized_token['oauth_token'])
 | |
| 
 | |
|   accepted = 'n'
 | |
|   while accepted.lower() != 'y':
 | |
|     accepted = raw_input('Have you authorized me yet? (y/n) ')
 | |
| 
 | |
| 
 | |
| def _request_access_token(consumer, unauthorized_token):
 | |
|   token = oauth.Token(unauthorized_token['oauth_token'],
 | |
|                       unauthorized_token['oauth_token_secret'])
 | |
|   client = oauth.Client(consumer, token)
 | |
|   response, content = client.request(constants.ACCESS_TOKEN_URL, 'POST')
 | |
| 
 | |
|   _ensure_token_response_is_200(response, constants.ACCESS_TOKEN_URL,
 | |
|                                 'access token')
 | |
| 
 | |
|   return content
 | |
| 
 | |
| 
 | |
| def _write_access_token_to_file(access_token, filename):
 | |
|   output = shelve.open(filename)
 | |
|   output['access_token'] = access_token
 | |
|   output.close()
 | |
| 
 | |
|   print 'Wrote the access token to the file %s.' % filename
 | |
| 
 | |
| 
 | |
| def _write_consumer_secret_to_file(consumer_secret, filename):
 | |
|   output = shelve.open(filename)
 | |
|   output['consumer_secret'] = consumer_secret
 | |
|   output.close()
 | |
| 
 | |
|   print 'Wrote the consumer secret to the file %s.' % filename
 | |
| 
 | |
| 
 | |
| def _main():
 | |
|   if len(sys.argv) != 2:
 | |
|     print ('Usage: %s <consumer secret>.\n\nThe consumer secret is an OAuth '
 | |
|            'concept and is obtained from the Google Accounts domain dashboard.'
 | |
|            % sys.argv[0])
 | |
|     return
 | |
| 
 | |
|   consumer_secret = sys.argv[1]
 | |
|   consumer = oauth.Consumer(constants.CONSUMER_KEY, consumer_secret)
 | |
| 
 | |
|   unauthorized_token = _request_unauthorized_token(consumer,
 | |
|                                                    constants.REQUEST_TOKEN_URL)
 | |
| 
 | |
|   _ask_user_to_authorize_us(unauthorized_token)
 | |
| 
 | |
|   access_token_string = _request_access_token(consumer, unauthorized_token)
 | |
| 
 | |
|   _write_access_token_to_file(access_token_string, constants.ACCESS_TOKEN_FILE)
 | |
|   _write_consumer_secret_to_file(consumer_secret,
 | |
|                                  constants.CONSUMER_SECRET_FILE)
 | |
| 
 | |
| if __name__ == '__main__':
 | |
|   _main()
 |