diff options
| author | Teddy Wing | 2022-09-20 21:00:42 +0200 | 
|---|---|---|
| committer | Teddy Wing | 2022-09-20 21:00:42 +0200 | 
| commit | 2cc79c6873dc59b0510045717b0359bc64513fc1 (patch) | |
| tree | cdac0f9a3671cc21374f43d1d5dae829e021737c /vendor/golang.org/x/oauth2/token.go | |
| parent | 426afbfbee72c8c1e66c67c6837f62a9f5633698 (diff) | |
| download | gdrive-2cc79c6873dc59b0510045717b0359bc64513fc1.tar.bz2 | |
Untrack and ignore the vendor directory
I don't think this should be in version control.
Diffstat (limited to 'vendor/golang.org/x/oauth2/token.go')
| -rw-r--r-- | vendor/golang.org/x/oauth2/token.go | 158 | 
1 files changed, 0 insertions, 158 deletions
| diff --git a/vendor/golang.org/x/oauth2/token.go b/vendor/golang.org/x/oauth2/token.go deleted file mode 100644 index 7a3167f..0000000 --- a/vendor/golang.org/x/oauth2/token.go +++ /dev/null @@ -1,158 +0,0 @@ -// Copyright 2014 The Go Authors. All rights reserved. -// Use of this source code is governed by a BSD-style -// license that can be found in the LICENSE file. - -package oauth2 - -import ( -	"net/http" -	"net/url" -	"strconv" -	"strings" -	"time" - -	"golang.org/x/net/context" -	"golang.org/x/oauth2/internal" -) - -// expiryDelta determines how earlier a token should be considered -// expired than its actual expiration time. It is used to avoid late -// expirations due to client-server time mismatches. -const expiryDelta = 10 * time.Second - -// Token represents the crendentials used to authorize -// the requests to access protected resources on the OAuth 2.0 -// provider's backend. -// -// Most users of this package should not access fields of Token -// directly. They're exported mostly for use by related packages -// implementing derivative OAuth2 flows. -type Token struct { -	// AccessToken is the token that authorizes and authenticates -	// the requests. -	AccessToken string `json:"access_token"` - -	// TokenType is the type of token. -	// The Type method returns either this or "Bearer", the default. -	TokenType string `json:"token_type,omitempty"` - -	// RefreshToken is a token that's used by the application -	// (as opposed to the user) to refresh the access token -	// if it expires. -	RefreshToken string `json:"refresh_token,omitempty"` - -	// Expiry is the optional expiration time of the access token. -	// -	// If zero, TokenSource implementations will reuse the same -	// token forever and RefreshToken or equivalent -	// mechanisms for that TokenSource will not be used. -	Expiry time.Time `json:"expiry,omitempty"` - -	// raw optionally contains extra metadata from the server -	// when updating a token. -	raw interface{} -} - -// Type returns t.TokenType if non-empty, else "Bearer". -func (t *Token) Type() string { -	if strings.EqualFold(t.TokenType, "bearer") { -		return "Bearer" -	} -	if strings.EqualFold(t.TokenType, "mac") { -		return "MAC" -	} -	if strings.EqualFold(t.TokenType, "basic") { -		return "Basic" -	} -	if t.TokenType != "" { -		return t.TokenType -	} -	return "Bearer" -} - -// SetAuthHeader sets the Authorization header to r using the access -// token in t. -// -// This method is unnecessary when using Transport or an HTTP Client -// returned by this package. -func (t *Token) SetAuthHeader(r *http.Request) { -	r.Header.Set("Authorization", t.Type()+" "+t.AccessToken) -} - -// WithExtra returns a new Token that's a clone of t, but using the -// provided raw extra map. This is only intended for use by packages -// implementing derivative OAuth2 flows. -func (t *Token) WithExtra(extra interface{}) *Token { -	t2 := new(Token) -	*t2 = *t -	t2.raw = extra -	return t2 -} - -// Extra returns an extra field. -// Extra fields are key-value pairs returned by the server as a -// part of the token retrieval response. -func (t *Token) Extra(key string) interface{} { -	if raw, ok := t.raw.(map[string]interface{}); ok { -		return raw[key] -	} - -	vals, ok := t.raw.(url.Values) -	if !ok { -		return nil -	} - -	v := vals.Get(key) -	switch s := strings.TrimSpace(v); strings.Count(s, ".") { -	case 0: // Contains no "."; try to parse as int -		if i, err := strconv.ParseInt(s, 10, 64); err == nil { -			return i -		} -	case 1: // Contains a single "."; try to parse as float -		if f, err := strconv.ParseFloat(s, 64); err == nil { -			return f -		} -	} - -	return v -} - -// expired reports whether the token is expired. -// t must be non-nil. -func (t *Token) expired() bool { -	if t.Expiry.IsZero() { -		return false -	} -	return t.Expiry.Add(-expiryDelta).Before(time.Now()) -} - -// Valid reports whether t is non-nil, has an AccessToken, and is not expired. -func (t *Token) Valid() bool { -	return t != nil && t.AccessToken != "" && !t.expired() -} - -// tokenFromInternal maps an *internal.Token struct into -// a *Token struct. -func tokenFromInternal(t *internal.Token) *Token { -	if t == nil { -		return nil -	} -	return &Token{ -		AccessToken:  t.AccessToken, -		TokenType:    t.TokenType, -		RefreshToken: t.RefreshToken, -		Expiry:       t.Expiry, -		raw:          t.Raw, -	} -} - -// retrieveToken takes a *Config and uses that to retrieve an *internal.Token. -// This token is then mapped from *internal.Token into an *oauth2.Token which is returned along -// with an error.. -func retrieveToken(ctx context.Context, c *Config, v url.Values) (*Token, error) { -	tk, err := internal.RetrieveToken(ctx, c.ClientID, c.ClientSecret, c.Endpoint.TokenURL, v) -	if err != nil { -		return nil, err -	} -	return tokenFromInternal(tk), nil -} | 
