
    .gL                     B   S r SSKJr  SSKrSSKrSSKr SSKJr  SSK
JrJr  SSKrSSKrSSKrSSKrSSKrSSKr\R,                  " \5      r " S S\5      r " S S	\5      r " S
 S\R8                  R:                  5      r " S S\5      rg! \ a	    SSK	Jr   Nf = f)a  OAuth 2.0 Authorization Flow

This module provides integration with `requests-oauthlib`_ for running the
`OAuth 2.0 Authorization Flow`_ and acquiring user credentials.  See
`Using OAuth 2.0 to Access Google APIs`_ for an overview of OAuth 2.0
authorization scenarios Google APIs support.

Here's an example of using :class:`InstalledAppFlow`::

    from google_auth_oauthlib.flow import InstalledAppFlow

    # Create the flow using the client secrets file from the Google API
    # Console.
    flow = InstalledAppFlow.from_client_secrets_file(
        'client_secrets.json',
        scopes=['profile', 'email'])

    flow.run_local_server()

    # You can use flow.credentials, or you can just get a requests session
    # using flow.authorized_session.
    session = flow.authorized_session()

    profile_info = session.get(
        'https://www.googleapis.com/userinfo/v2/me').json()

    print(profile_info)
    # {'name': '...',  'email': '...', ...}

.. _requests-oauthlib: http://requests-oauthlib.readthedocs.io/en/latest/
.. _OAuth 2.0 Authorization Flow:
    https://tools.ietf.org/html/rfc6749#section-1.2
.. _Using OAuth 2.0 to Access Google APIs:
    https://developers.google.com/identity/protocols/oauth2

    )urlsafe_b64encodeN)SystemRandom)ascii_lettersdigitsc                       \ rS rSrSr   SS jr\S 5       r\S 5       r\	S 5       r
\
R                  S 5       r
S	 rS
 r\	S 5       rS rSrg)FlowJ   a}  OAuth 2.0 Authorization Flow

This class uses a :class:`requests_oauthlib.OAuth2Session` instance at
:attr:`oauth2session` to perform all of the OAuth 2.0 logic. This class
just provides convenience methods and sane defaults for doing Google's
particular flavors of OAuth 2.0.

Typically you'll construct an instance of this flow using
:meth:`from_client_secrets_file` and a `client secrets file`_ obtained
from the `Google API Console`_.

.. _client secrets file:
    https://developers.google.com/identity/protocols/oauth2/web-server
    #creatingcred
.. _Google API Console:
    https://console.developers.google.com/apis/credentials
Nc                 X    X l          X2   U l         Xl         X@l        XPl        X`l        g)a  
Args:
    oauth2session (requests_oauthlib.OAuth2Session):
        The OAuth 2.0 session from ``requests-oauthlib``.
    client_type (str): The client type, either ``web`` or
        ``installed``.
    client_config (Mapping[str, Any]): The client
        configuration in the Google `client secrets`_ format.
    redirect_uri (str): The OAuth 2.0 redirect URI if known at flow
        creation time. Otherwise, it will need to be set using
        :attr:`redirect_uri`.
    code_verifier (str): random string of 43-128 chars used to verify
        the key exchange.using PKCE.
    autogenerate_code_verifier (bool): If true, auto-generate a
        code_verifier.
.. _client secrets:
    https://github.com/googleapis/google-api-python-client/blob
    /main/docs/client-secrets.md
N)client_typeclient_configoauth2sessionredirect_uricode_verifierautogenerate_code_verifier)selfr   r   r   r   r   r   s          ^C:\Suresh\moveshuttle\MDcreated\moveengine\venv\Lib\site-packages\google_auth_oauthlib/flow.py__init__Flow.__init__]   s6    8 'G*7D*E(**D'    c                 
   SU;   a  SnOSU;   a  SnO[        S5      eUR                  SS5      nUR                  SS5      n[        R                  R                  " X40 UD6u  nnUR                  SS5      nU " UUUUUU5      $ )a  Creates a :class:`requests_oauthlib.OAuth2Session` from client
configuration loaded from a Google-format client secrets file.

Args:
    client_config (Mapping[str, Any]): The client
        configuration in the Google `client secrets`_ format.
    scopes (Sequence[str]): The list of scopes to request during the
        flow.
    kwargs: Any additional parameters passed to
        :class:`requests_oauthlib.OAuth2Session`

Returns:
    Flow: The constructed Flow instance.

Raises:
    ValueError: If the client configuration is not in the correct
        format.

.. _client secrets:
    https://github.com/googleapis/google-api-python-client/blob/main/docs/client-secrets.md
web	installedz2Client secrets must be for a web or installed app.r   Nr   r   )
ValueErrorpopgoogle_auth_oauthlibhelperssession_from_client_configget)	clsr   scopeskwargsr   r   r   sessionr   s	            r   from_client_configFlow.from_client_config   s    . M!KM)%KQRR 

?D9%+ZZ0Ld%S"
 !((CC
%+
	

 zz.$7&
 	
r   c                     [        US5       n[        R                  " U5      nSSS5        U R                  " W4SU0UD6$ ! , (       d  f       N#= f)a  Creates a :class:`Flow` instance from a Google client secrets file.

Args:
    client_secrets_file (str): The path to the client secrets .json
        file.
    scopes (Sequence[str]): The list of scopes to request during the
        flow.
    kwargs: Any additional parameters passed to
        :class:`requests_oauthlib.OAuth2Session`

Returns:
    Flow: The constructed Flow instance.
rNr    )openjsonloadr#   )r   client_secrets_filer    r!   	json_filer   s         r   from_client_secrets_fileFlow.from_client_secrets_file   sJ     %s+y IIi0M , %%mMFMfMM ,+s   A
Ac                 .    U R                   R                  $ )PThe OAuth 2.0 redirect URI. Pass-through to
``self.oauth2session.redirect_uri``.r   r   r   s    r   r   Flow.redirect_uri   s     !!...r   c                 $    XR                   l        g)r/   Nr0   )r   values     r   r   r2      s     +0'r   c                    UR                  SS5        U R                  (       aZ  [        [        -   S-   n[	        5       n[        SS5       Vs/ s H  oCR                  U5      PM     nnSR                  U5      U l        U R                  (       a  [        R                  " 5       nUR                  [        R                  U R                  5      5        UR                  5       n[        U5      nUR!                  5       R#                  S5      S   n	UR                  SU	5        UR                  S	S
5        U R$                  R&                  " U R(                  S   40 UD6u  pX4$ s  snf )a  Generates an authorization URL.

This is the first step in the OAuth 2.0 Authorization Flow. The user's
browser should be redirected to the returned URL.

This method calls
:meth:`requests_oauthlib.OAuth2Session.authorization_url`
and specifies the client configuration's authorization URI (usually
Google's authorization server) and specifies that "offline" access is
desired. This is required in order to obtain a refresh token.

Args:
    kwargs: Additional arguments passed through to
        :meth:`requests_oauthlib.OAuth2Session.authorization_url`

Returns:
    Tuple[str, str]: The generated authorization URL and state. The
        user must visit the URL to complete the flow. The state is used
        when completing the flow to verify that the request originated
        from your application. If your application is using a different
        :class:`Flow` instance to obtain the token, you will need to
        specify the ``state`` when constructing the :class:`Flow`.
access_typeofflinez-._~r       =code_challengecode_challenge_methodS256auth_uri)
setdefaultr   r   r   r   rangechoicejoinr   hashlibsha256updatestrencodedigestr   decodesplitr   authorization_urlr   )r   r!   charsrnd_random_verifier	code_hashunencoded_challengeb64_challenger;   urlstates               r   rK   Flow.authorization_url   s/   0 	-3**!F*V3E.C:?3-H-Qzz%0-OH!#!9D(ISZZ(:(:;<"+"2"2"4-.ABM*11399#>qAN.?5v>''99z*
.4

 z Is   E"c                     UR                  SU R                  S   5        UR                  SU R                  5        U R                  R                  " U R                  S   40 UD6$ )a  Completes the Authorization Flow and obtains an access token.

This is the final step in the OAuth 2.0 Authorization Flow. This is
called after the user consents.

This method calls
:meth:`requests_oauthlib.OAuth2Session.fetch_token`
and specifies the client configuration's token URI (usually Google's
token server).

Args:
    kwargs: Arguments passed through to
        :meth:`requests_oauthlib.OAuth2Session.fetch_token`. At least
        one of ``code`` or ``authorization_response`` must be
        specified.

Returns:
    Mapping[str, str]: The obtained tokens. Typically, you will not use
        return value of this function and instead use
        :meth:`credentials` to obtain a
        :class:`~google.auth.credentials.Credentials` instance.
client_secretr   	token_uri)r?   r   r   r   fetch_token)r   r!   s     r   rY   Flow.fetch_token  s]    . 	/4+=+=o+NO/4+=+=>!!--d.@.@.MXQWXXr   c                 j    [         R                  R                  U R                  U R                  5      $ )a  Returns credentials from the OAuth 2.0 session.

:meth:`fetch_token` must be called before accessing this. This method
constructs a :class:`google.oauth2.credentials.Credentials` class using
the session's token and the client config.

Returns:
    google.oauth2.credentials.Credentials: The constructed credentials.

Raises:
    ValueError: If there is no access token in the session.
)r   r   credentials_from_sessionr   r   r1   s    r   credentialsFlow.credentials  s.     $++DD 2 2
 	
r   c                 |    [         R                  R                  R                  R	                  U R
                  5      $ )aZ  Returns a :class:`requests.Session` authorized with credentials.

:meth:`fetch_token` must be called before this method. This method
constructs a :class:`google.auth.transport.requests.AuthorizedSession`
class using this flow's :attr:`credentials`.

Returns:
    google.auth.transport.requests.AuthorizedSession: The constructed
        session.
)googleauth	transportrequestsAuthorizedSessionr]   r1   s    r   authorized_sessionFlow.authorized_session1  s+     {{$$--??@P@PQQr   )r   r   r   r   r   r   )NNT)__name__
__module____qualname____firstlineno____doc__r   classmethodr#   r,   propertyr   setterrK   rY   r]   re   __static_attributes__ r   r   r   r   J   s    . #'$EL 1
 1
f N N& / /
 0 0
+ZY6 
 
"Rr   r   c            
       F    \ rS rSrSrSr Sr SrSSS\\S	S	SSS4
S
 jrSr	g)InstalledAppFlowi?  a  Authorization flow helper for installed applications.

This :class:`Flow` subclass makes it easier to perform the
`Installed Application Authorization Flow`_. This flow is useful for
local development or applications that are installed on a desktop operating
system.

This flow uses a local server strategy provided by :meth:`run_local_server`.

Example::

    from google_auth_oauthlib.flow import InstalledAppFlow

    flow = InstalledAppFlow.from_client_secrets_file(
        'client_secrets.json',
        scopes=['profile', 'email'])

    flow.run_local_server()

    session = flow.authorized_session()

    profile_info = session.get(
        'https://www.googleapis.com/userinfo/v2/me').json()

    print(profile_info)
    # {'name': '...',  'email': '...', ...}


Note that this isn't the only way to accomplish the installed
application flow, just one of the most common. You can use the
:class:`Flow` class to perform the same flow with different methods of
presenting the authorization URL to the user or obtaining the authorization
response, such as using an embedded web view.

.. _Installed Application Authorization Flow:
    https://github.com/googleapis/google-api-python-client/blob/main/docs/oauth-installed.md
z:Please visit this URL to authorize this application: {url}zEnter the authorization code: zAThe authentication flow has completed. You may close this window.	localhostNi  Tc                    [        U5      nS[        R                  R                  l        [        R                  R                  U=(       d    UX<[        S9n U(       a  SOSnUR                  XR                  5      U l	        U R                  " S0 UD6u  nnU(       a%  [        R                  " U
5      R                  USSS9  U(       a  [        UR                  US95        Xl        UR!                  5         UR"                  R%                  S	S
5      nU R'                  UU	S9  UR)                  5         U R*                  $ ! UR)                  5         f = f)a  Run the flow using the server strategy.

The server strategy instructs the user to open the authorization URL in
their browser and will attempt to automatically open the URL for them.
It will start a local web server to listen for the authorization
response. Once authorization is complete the authorization server will
redirect the user's browser to the local web server. The web server
will get the authorization code from the response and shutdown. The
code is then exchanged for a token.

Args:
    host (str): The hostname for the local redirect server. This will
        be served over http, not https.
    bind_addr (str): Optionally provide an ip address for the redirect
        server to listen on when it is not the same as host
        (e.g. in a container). Default value is None,
        which means that the redirect server will listen
        on the ip address specified in the host parameter.
    port (int): The port for the local redirect server.
    authorization_prompt_message (str | None): The message to display to tell
        the user to navigate to the authorization URL. If None or empty,
        don't display anything.
    success_message (str): The message to display in the web browser
        the authorization flow is complete.
    open_browser (bool): Whether or not to open the authorization URL
        in the user's browser.
    redirect_uri_trailing_slash (bool): whether or not to add trailing
        slash when constructing the redirect_uri. Default value is True.
    timeout_seconds (int): It will raise an error after the timeout timing
        if there are no credentials response. The value is in seconds.
        When set to None there is no timeout.
        Default value is None.
    token_audience (str): Passed along with the request for an access
        token. Determines the endpoints with which the token can be
        used. Optional.
    browser (str): specify which browser to open for authentication. If not
        specified this defaults to default browser.
    kwargs: Additional keyword arguments passed through to
        :meth:`authorization_url`.

Returns:
    google.oauth2.credentials.Credentials: The OAuth 2.0 credentials
        for the user.
F)handler_classzhttp://{}:{}/zhttp://{}:{}   T)new	autoraise)rS   httphttps)authorization_responseaudiencerp   )_RedirectWSGIAppwsgirefsimple_server
WSGIServerallow_reuse_addressmake_server_WSGIRequestHandlerformatserver_portr   rK   
webbrowserr   r'   printtimeouthandle_requestlast_request_urireplacerY   server_closer]   )r   host	bind_addrportauthorization_prompt_messagesuccess_messageopen_browserredirect_uri_trailing_slashtimeout_secondstoken_audiencebrowserr!   wsgi_applocal_serverredirect_uri_formatauth_urlrN   r{   s                     r   run_local_server!InstalledAppFlow.run_local_servers  s=   t $O4?D((<,,88t=P 9 
	(#>N   !4 : :..!D 00:6:KHaw',,X1,M+299h9GH#2 '') &.%>%>%F%Fvw%W"'=   %%' %%'s   CE E)r   )
rg   rh   ri   rj   rk   _DEFAULT_AUTH_PROMPT_MESSAGE_DEFAULT_AUTH_CODE_MESSAGE_DEFAULT_WEB_SUCCESS_MESSAGEr   ro   rp   r   r   rr   rr   ?  sT    $N 	E !!A> 	L ! %A4$(] r   rr   c                       \ rS rSrSrS rSrg)r   i  zOCustom WSGIRequestHandler.

Uses a named logger instead of printing to stderr.
c                 2    [         R                  " U/UQ76   g )N)_LOGGERinfo)r   r   argss      r   log_message_WSGIRequestHandler.log_message  s     	V#d#r   rp   N)rg   rh   ri   rj   rk   r   ro   rp   r   r   r   r     s    
$r   r   c                   $    \ rS rSrSrS rS rSrg)r}   i  zoWSGI app to handle the authorization redirect.

Stores the request URI and displays the given success message.
c                     SU l         Xl        g)zx
Args:
    success_message (str): The message to display in the web browser
        the authorization flow is complete.
N)r   _success_message)r   r   s     r   r   _RedirectWSGIApp.__init__  s     !% /r   c                     U" SS/5        [         R                  R                  U5      U l        U R                  R                  S5      /$ )zWSGI Callable.

Args:
    environ (Mapping[str, Any]): The WSGI environment.
    start_response (Callable[str, list]): The WSGI start_response
        callable.

Returns:
    Iterable[bytes]: The response body.
z200 OK)zContent-typeztext/plain; charset=utf-8zutf-8)r~   utilrequest_urir   r   rG   )r   environstart_responses      r   __call___RedirectWSGIApp.__call__  sC     	x"O!PQ ' 8 8 A%%,,W566r   )r   r   N)rg   rh   ri   rj   rk   r   r   ro   rp   r   r   r}   r}     s    
07r   r}   ) rk   base64r   rC   r(   loggingsecretsr   ImportErrorrandomstringr   r   r   wsgiref.simple_serverr~   wsgiref.utilgoogle.auth.transport.requestsr`   google.oauth2.credentialsgoogle_auth_oauthlib.helpersr   	getLoggerrg   r   objectr   rr   r   WSGIRequestHandlerr   r}   rp   r   r   <module>r      s   #H %   $$ )    %   # 

H
%rR6 rRjQ t Q h	$'//BB 	$7v 7K  $#$s   B BB