gcli2api / src /auth.py
bibibi12345's picture
fixed login link not showing
4fe6125
import os
import json
import base64
import time
import logging
from datetime import datetime
from fastapi import Request, HTTPException, Depends
from fastapi.security import HTTPBasic
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import urlparse, parse_qs
from google.oauth2.credentials import Credentials
from google_auth_oauthlib.flow import Flow
from google.auth.transport.requests import Request as GoogleAuthRequest
from .utils import get_user_agent, get_client_metadata
from .config import (
CLIENT_ID, CLIENT_SECRET, SCOPES, CREDENTIAL_FILE,
CODE_ASSIST_ENDPOINT, GEMINI_AUTH_PASSWORD
)
# --- Global State ---
credentials = None
user_project_id = None
onboarding_complete = False
credentials_from_env = False # Track if credentials came from environment variable
security = HTTPBasic()
class _OAuthCallbackHandler(BaseHTTPRequestHandler):
auth_code = None
def do_GET(self):
query_components = parse_qs(urlparse(self.path).query)
code = query_components.get("code", [None])[0]
if code:
_OAuthCallbackHandler.auth_code = code
self.send_response(200)
self.send_header("Content-type", "text/html")
self.end_headers()
self.wfile.write(b"<h1>OAuth authentication successful!</h1><p>You can close this window. Please check the proxy server logs to verify that onboarding completed successfully. No need to restart the proxy.</p>")
else:
self.send_response(400)
self.send_header("Content-type", "text/html")
self.end_headers()
self.wfile.write(b"<h1>Authentication failed.</h1><p>Please try again.</p>")
def authenticate_user(request: Request):
"""Authenticate the user with multiple methods."""
# Check for API key in query parameters first (for Gemini client compatibility)
api_key = request.query_params.get("key")
if api_key and api_key == GEMINI_AUTH_PASSWORD:
return "api_key_user"
# Check for API key in x-goog-api-key header (Google SDK format)
goog_api_key = request.headers.get("x-goog-api-key", "")
if goog_api_key and goog_api_key == GEMINI_AUTH_PASSWORD:
return "goog_api_key_user"
# Check for API key in Authorization header (Bearer token format)
auth_header = request.headers.get("authorization", "")
if auth_header.startswith("Bearer "):
bearer_token = auth_header[7:]
if bearer_token == GEMINI_AUTH_PASSWORD:
return "bearer_user"
# Check for HTTP Basic Authentication
if auth_header.startswith("Basic "):
try:
encoded_credentials = auth_header[6:]
decoded_credentials = base64.b64decode(encoded_credentials).decode('utf-8')
username, password = decoded_credentials.split(':', 1)
if password == GEMINI_AUTH_PASSWORD:
return username
except Exception:
pass
# If none of the authentication methods work
raise HTTPException(
status_code=401,
detail="Invalid authentication credentials. Use HTTP Basic Auth, Bearer token, 'key' query parameter, or 'x-goog-api-key' header.",
headers={"WWW-Authenticate": "Basic"},
)
def save_credentials(creds, project_id=None):
global credentials_from_env
# Don't save credentials to file if they came from environment variable,
# but still save project_id if provided and no file exists or file lacks project_id
if credentials_from_env:
if project_id and os.path.exists(CREDENTIAL_FILE):
try:
with open(CREDENTIAL_FILE, "r") as f:
existing_data = json.load(f)
# Only update project_id if it's missing from the file
if "project_id" not in existing_data:
existing_data["project_id"] = project_id
with open(CREDENTIAL_FILE, "w") as f:
json.dump(existing_data, f, indent=2)
logging.info(f"Added project_id {project_id} to existing credential file")
except Exception as e:
logging.warning(f"Could not update project_id in credential file: {e}")
return
creds_data = {
"client_id": CLIENT_ID,
"client_secret": CLIENT_SECRET,
"token": creds.token,
"refresh_token": creds.refresh_token,
"scopes": creds.scopes if creds.scopes else SCOPES,
"token_uri": "https://oauth2.googleapis.com/token",
}
if creds.expiry:
if creds.expiry.tzinfo is None:
from datetime import timezone
expiry_utc = creds.expiry.replace(tzinfo=timezone.utc)
else:
expiry_utc = creds.expiry
# Keep the existing ISO format for backward compatibility, but ensure it's properly handled during loading
creds_data["expiry"] = expiry_utc.isoformat()
if project_id:
creds_data["project_id"] = project_id
elif os.path.exists(CREDENTIAL_FILE):
try:
with open(CREDENTIAL_FILE, "r") as f:
existing_data = json.load(f)
if "project_id" in existing_data:
creds_data["project_id"] = existing_data["project_id"]
except Exception:
pass
with open(CREDENTIAL_FILE, "w") as f:
json.dump(creds_data, f, indent=2)
def get_credentials(allow_oauth_flow=True):
"""Loads credentials matching gemini-cli OAuth2 flow."""
global credentials, credentials_from_env, user_project_id
if credentials and credentials.token:
return credentials
# Check for credentials in environment variable (JSON string)
env_creds_json = os.getenv("GEMINI_CREDENTIALS")
if env_creds_json:
# First, check if we have a refresh token - if so, we should always be able to load credentials
try:
raw_env_creds_data = json.loads(env_creds_json)
# SAFEGUARD: If refresh_token exists, we should always load credentials successfully
if "refresh_token" in raw_env_creds_data and raw_env_creds_data["refresh_token"]:
logging.info("Environment refresh token found - ensuring credentials load successfully")
try:
creds_data = raw_env_creds_data.copy()
# Handle different credential formats
if "access_token" in creds_data and "token" not in creds_data:
creds_data["token"] = creds_data["access_token"]
if "scope" in creds_data and "scopes" not in creds_data:
creds_data["scopes"] = creds_data["scope"].split()
# Handle problematic expiry formats that cause parsing errors
if "expiry" in creds_data:
expiry_str = creds_data["expiry"]
# If expiry has timezone info that causes parsing issues, try to fix it
if isinstance(expiry_str, str) and ("+00:00" in expiry_str or "Z" in expiry_str):
try:
# Try to parse and reformat the expiry to a format Google Credentials can handle
from datetime import datetime
if "+00:00" in expiry_str:
# Handle ISO format with timezone offset
parsed_expiry = datetime.fromisoformat(expiry_str)
elif expiry_str.endswith("Z"):
# Handle ISO format with Z suffix
parsed_expiry = datetime.fromisoformat(expiry_str.replace('Z', '+00:00'))
else:
parsed_expiry = datetime.fromisoformat(expiry_str)
# Convert to UTC timestamp format that Google Credentials library expects
import time
timestamp = parsed_expiry.timestamp()
creds_data["expiry"] = datetime.utcfromtimestamp(timestamp).strftime("%Y-%m-%dT%H:%M:%SZ")
logging.info(f"Converted environment expiry format from '{expiry_str}' to '{creds_data['expiry']}'")
except Exception as expiry_error:
logging.warning(f"Could not parse environment expiry format '{expiry_str}': {expiry_error}, removing expiry field")
# Remove problematic expiry field - credentials will be treated as expired but still loadable
del creds_data["expiry"]
credentials = Credentials.from_authorized_user_info(creds_data, SCOPES)
credentials_from_env = True # Mark as environment credentials
# Extract project_id from environment credentials if available
if "project_id" in raw_env_creds_data:
user_project_id = raw_env_creds_data["project_id"]
logging.info(f"Extracted project_id from environment credentials: {user_project_id}")
# Try to refresh if expired and refresh token exists
if credentials.expired and credentials.refresh_token:
try:
logging.info("Environment credentials expired, attempting refresh...")
credentials.refresh(GoogleAuthRequest())
logging.info("Environment credentials refreshed successfully")
except Exception as refresh_error:
logging.warning(f"Failed to refresh environment credentials: {refresh_error}")
logging.info("Using existing environment credentials despite refresh failure")
elif not credentials.expired:
logging.info("Environment credentials are still valid, no refresh needed")
elif not credentials.refresh_token:
logging.warning("Environment credentials expired but no refresh token available")
return credentials
except Exception as parsing_error:
# SAFEGUARD: Even if parsing fails, try to create minimal credentials with refresh token
logging.warning(f"Failed to parse environment credentials normally: {parsing_error}")
logging.info("Attempting to create minimal environment credentials with refresh token")
try:
minimal_creds_data = {
"client_id": raw_env_creds_data.get("client_id", CLIENT_ID),
"client_secret": raw_env_creds_data.get("client_secret", CLIENT_SECRET),
"refresh_token": raw_env_creds_data["refresh_token"],
"token_uri": "https://oauth2.googleapis.com/token",
}
credentials = Credentials.from_authorized_user_info(minimal_creds_data, SCOPES)
credentials_from_env = True # Mark as environment credentials
# Extract project_id from environment credentials if available
if "project_id" in raw_env_creds_data:
user_project_id = raw_env_creds_data["project_id"]
logging.info(f"Extracted project_id from minimal environment credentials: {user_project_id}")
# Force refresh since we don't have a valid token
try:
logging.info("Refreshing minimal environment credentials...")
credentials.refresh(GoogleAuthRequest())
logging.info("Minimal environment credentials refreshed successfully")
return credentials
except Exception as refresh_error:
logging.error(f"Failed to refresh minimal environment credentials: {refresh_error}")
# Even if refresh fails, return the credentials - they might still work
return credentials
except Exception as minimal_error:
logging.error(f"Failed to create minimal environment credentials: {minimal_error}")
# Fall through to file-based credentials
else:
logging.warning("No refresh token found in environment credentials")
# Fall through to file-based credentials
except Exception as e:
logging.error(f"Failed to parse environment credentials JSON: {e}")
# Fall through to file-based credentials
# Check for credentials file (CREDENTIAL_FILE now includes GOOGLE_APPLICATION_CREDENTIALS path if set)
if os.path.exists(CREDENTIAL_FILE):
# First, check if we have a refresh token - if so, we should always be able to load credentials
try:
with open(CREDENTIAL_FILE, "r") as f:
raw_creds_data = json.load(f)
# SAFEGUARD: If refresh_token exists, we should always load credentials successfully
if "refresh_token" in raw_creds_data and raw_creds_data["refresh_token"]:
logging.info("Refresh token found - ensuring credentials load successfully")
try:
creds_data = raw_creds_data.copy()
# Handle different credential formats
if "access_token" in creds_data and "token" not in creds_data:
creds_data["token"] = creds_data["access_token"]
if "scope" in creds_data and "scopes" not in creds_data:
creds_data["scopes"] = creds_data["scope"].split()
# Handle problematic expiry formats that cause parsing errors
if "expiry" in creds_data:
expiry_str = creds_data["expiry"]
# If expiry has timezone info that causes parsing issues, try to fix it
if isinstance(expiry_str, str) and ("+00:00" in expiry_str or "Z" in expiry_str):
try:
# Try to parse and reformat the expiry to a format Google Credentials can handle
from datetime import datetime
if "+00:00" in expiry_str:
# Handle ISO format with timezone offset
parsed_expiry = datetime.fromisoformat(expiry_str)
elif expiry_str.endswith("Z"):
# Handle ISO format with Z suffix
parsed_expiry = datetime.fromisoformat(expiry_str.replace('Z', '+00:00'))
else:
parsed_expiry = datetime.fromisoformat(expiry_str)
# Convert to UTC timestamp format that Google Credentials library expects
import time
timestamp = parsed_expiry.timestamp()
creds_data["expiry"] = datetime.utcfromtimestamp(timestamp).strftime("%Y-%m-%dT%H:%M:%SZ")
logging.info(f"Converted expiry format from '{expiry_str}' to '{creds_data['expiry']}'")
except Exception as expiry_error:
logging.warning(f"Could not parse expiry format '{expiry_str}': {expiry_error}, removing expiry field")
# Remove problematic expiry field - credentials will be treated as expired but still loadable
del creds_data["expiry"]
credentials = Credentials.from_authorized_user_info(creds_data, SCOPES)
# Mark as environment credentials if GOOGLE_APPLICATION_CREDENTIALS was used
credentials_from_env = bool(os.getenv("GOOGLE_APPLICATION_CREDENTIALS"))
# Try to refresh if expired and refresh token exists
if credentials.expired and credentials.refresh_token:
try:
logging.info("File-based credentials expired, attempting refresh...")
credentials.refresh(GoogleAuthRequest())
logging.info("File-based credentials refreshed successfully")
save_credentials(credentials)
except Exception as refresh_error:
logging.warning(f"Failed to refresh file-based credentials: {refresh_error}")
logging.info("Using existing file-based credentials despite refresh failure")
elif not credentials.expired:
logging.info("File-based credentials are still valid, no refresh needed")
elif not credentials.refresh_token:
logging.warning("File-based credentials expired but no refresh token available")
return credentials
except Exception as parsing_error:
# SAFEGUARD: Even if parsing fails, try to create minimal credentials with refresh token
logging.warning(f"Failed to parse credentials normally: {parsing_error}")
logging.info("Attempting to create minimal credentials with refresh token")
try:
minimal_creds_data = {
"client_id": raw_creds_data.get("client_id", CLIENT_ID),
"client_secret": raw_creds_data.get("client_secret", CLIENT_SECRET),
"refresh_token": raw_creds_data["refresh_token"],
"token_uri": "https://oauth2.googleapis.com/token",
}
credentials = Credentials.from_authorized_user_info(minimal_creds_data, SCOPES)
credentials_from_env = bool(os.getenv("GOOGLE_APPLICATION_CREDENTIALS"))
# Force refresh since we don't have a valid token
try:
logging.info("Refreshing minimal credentials...")
credentials.refresh(GoogleAuthRequest())
logging.info("Minimal credentials refreshed successfully")
save_credentials(credentials)
return credentials
except Exception as refresh_error:
logging.error(f"Failed to refresh minimal credentials: {refresh_error}")
# Even if refresh fails, return the credentials - they might still work
return credentials
except Exception as minimal_error:
logging.error(f"Failed to create minimal credentials: {minimal_error}")
# Fall through to new login as last resort
else:
logging.warning("No refresh token found in credentials file")
# Fall through to new login
except Exception as e:
logging.error(f"Failed to read credentials file {CREDENTIAL_FILE}: {e}")
# Fall through to new login only if file is completely unreadable
# Only start OAuth flow if explicitly allowed
if not allow_oauth_flow:
logging.info("OAuth flow not allowed - returning None (credentials will be required on first request)")
return None
client_config = {
"installed": {
"client_id": CLIENT_ID,
"client_secret": CLIENT_SECRET,
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
}
}
flow = Flow.from_client_config(
client_config,
scopes=SCOPES,
redirect_uri="http://localhost:8080"
)
flow.oauth2session.scope = SCOPES
auth_url, _ = flow.authorization_url(
access_type="offline",
prompt="consent",
include_granted_scopes='true'
)
print(f"\n{'='*80}")
print(f"AUTHENTICATION REQUIRED")
print(f"{'='*80}")
print(f"Please open this URL in your browser to log in:")
print(f"{auth_url}")
print(f"{'='*80}\n")
logging.info(f"Please open this URL in your browser to log in: {auth_url}")
server = HTTPServer(("", 8080), _OAuthCallbackHandler)
server.handle_request()
auth_code = _OAuthCallbackHandler.auth_code
if not auth_code:
return None
import oauthlib.oauth2.rfc6749.parameters
original_validate = oauthlib.oauth2.rfc6749.parameters.validate_token_parameters
def patched_validate(params):
try:
return original_validate(params)
except Warning:
pass
oauthlib.oauth2.rfc6749.parameters.validate_token_parameters = patched_validate
try:
flow.fetch_token(code=auth_code)
credentials = flow.credentials
credentials_from_env = False # Mark as file-based credentials
save_credentials(credentials)
logging.info("Authentication successful! Credentials saved.")
return credentials
except Exception as e:
logging.error(f"Authentication failed: {e}")
return None
finally:
oauthlib.oauth2.rfc6749.parameters.validate_token_parameters = original_validate
def onboard_user(creds, project_id):
"""Ensures the user is onboarded, matching gemini-cli setupUser behavior."""
global onboarding_complete
if onboarding_complete:
return
if creds.expired and creds.refresh_token:
try:
creds.refresh(GoogleAuthRequest())
save_credentials(creds)
except Exception as e:
raise Exception(f"Failed to refresh credentials during onboarding: {str(e)}")
headers = {
"Authorization": f"Bearer {creds.token}",
"Content-Type": "application/json",
"User-Agent": get_user_agent(),
}
load_assist_payload = {
"cloudaicompanionProject": project_id,
"metadata": get_client_metadata(project_id),
}
try:
import requests
resp = requests.post(
f"{CODE_ASSIST_ENDPOINT}/v1internal:loadCodeAssist",
data=json.dumps(load_assist_payload),
headers=headers,
)
resp.raise_for_status()
load_data = resp.json()
tier = None
if load_data.get("currentTier"):
tier = load_data["currentTier"]
else:
for allowed_tier in load_data.get("allowedTiers", []):
if allowed_tier.get("isDefault"):
tier = allowed_tier
break
if not tier:
tier = {
"name": "",
"description": "",
"id": "legacy-tier",
"userDefinedCloudaicompanionProject": True,
}
if tier.get("userDefinedCloudaicompanionProject") and not project_id:
raise ValueError("This account requires setting the GOOGLE_CLOUD_PROJECT env var.")
if load_data.get("currentTier"):
onboarding_complete = True
return
onboard_req_payload = {
"tierId": tier.get("id"),
"cloudaicompanionProject": project_id,
"metadata": get_client_metadata(project_id),
}
while True:
onboard_resp = requests.post(
f"{CODE_ASSIST_ENDPOINT}/v1internal:onboardUser",
data=json.dumps(onboard_req_payload),
headers=headers,
)
onboard_resp.raise_for_status()
lro_data = onboard_resp.json()
if lro_data.get("done"):
onboarding_complete = True
break
time.sleep(5)
except requests.exceptions.HTTPError as e:
raise Exception(f"User onboarding failed. Please check your Google Cloud project permissions and try again. Error: {e.response.text if hasattr(e, 'response') else str(e)}")
except Exception as e:
raise Exception(f"User onboarding failed due to an unexpected error: {str(e)}")
def get_user_project_id(creds):
"""Gets the user's project ID matching gemini-cli setupUser logic."""
global user_project_id
# Priority 1: Check environment variable first (always check, even if user_project_id is set)
env_project_id = os.getenv("GOOGLE_CLOUD_PROJECT")
if env_project_id:
logging.info(f"Using project ID from GOOGLE_CLOUD_PROJECT environment variable: {env_project_id}")
user_project_id = env_project_id
save_credentials(creds, user_project_id)
return user_project_id
# If we already have a cached project_id and no env var override, use it
if user_project_id:
logging.info(f"Using cached project ID: {user_project_id}")
return user_project_id
# Priority 2: Check cached project ID in credential file
if os.path.exists(CREDENTIAL_FILE):
try:
with open(CREDENTIAL_FILE, "r") as f:
creds_data = json.load(f)
cached_project_id = creds_data.get("project_id")
if cached_project_id:
logging.info(f"Using cached project ID from credential file: {cached_project_id}")
user_project_id = cached_project_id
return user_project_id
except Exception as e:
logging.warning(f"Could not read project_id from credential file: {e}")
# Priority 3: Make API call to discover project ID
# Ensure we have valid credentials for the API call
if creds.expired and creds.refresh_token:
try:
logging.info("Refreshing credentials before project ID discovery...")
creds.refresh(GoogleAuthRequest())
save_credentials(creds)
logging.info("Credentials refreshed successfully for project ID discovery")
except Exception as e:
logging.error(f"Failed to refresh credentials while getting project ID: {e}")
# Continue with existing credentials - they might still work
if not creds.token:
raise Exception("No valid access token available for project ID discovery")
headers = {
"Authorization": f"Bearer {creds.token}",
"Content-Type": "application/json",
"User-Agent": get_user_agent(),
}
probe_payload = {
"metadata": get_client_metadata(),
}
try:
import requests
logging.info("Attempting to discover project ID via API call...")
resp = requests.post(
f"{CODE_ASSIST_ENDPOINT}/v1internal:loadCodeAssist",
data=json.dumps(probe_payload),
headers=headers,
)
resp.raise_for_status()
data = resp.json()
discovered_project_id = data.get("cloudaicompanionProject")
if not discovered_project_id:
raise ValueError("Could not find 'cloudaicompanionProject' in loadCodeAssist response.")
logging.info(f"Discovered project ID via API: {discovered_project_id}")
user_project_id = discovered_project_id
save_credentials(creds, user_project_id)
return user_project_id
except requests.exceptions.HTTPError as e:
logging.error(f"HTTP error during project ID discovery: {e}")
if hasattr(e, 'response') and e.response:
logging.error(f"Response status: {e.response.status_code}, body: {e.response.text}")
raise Exception(f"Failed to discover project ID via API: {e}")
except Exception as e:
logging.error(f"Unexpected error during project ID discovery: {e}")
raise Exception(f"Failed to discover project ID: {e}")