Package com.google.auth.oauth2
Class ImpersonatedCredentials
- java.lang.Object
-
- com.google.auth.Credentials
-
- com.google.auth.oauth2.OAuth2Credentials
-
- com.google.auth.oauth2.GoogleCredentials
-
- com.google.auth.oauth2.ImpersonatedCredentials
-
- All Implemented Interfaces:
IdTokenProvider,QuotaProjectIdProvider,ServiceAccountSigner,Serializable
public class ImpersonatedCredentials extends GoogleCredentials implements ServiceAccountSigner, IdTokenProvider
ImpersonatedCredentials allowing credentials issued to a user or service account to impersonate another. The source project using ImpersonatedCredentials must enable the "IAMCredentials" API. Also, the target service account must grant the originating principal the "Service Account Token Creator" IAM role.Usage:
String credPath = "/path/to/svc_account.json"; ServiceAccountCredentials sourceCredentials = ServiceAccountCredentials .fromStream(new FileInputStream(credPath)); sourceCredentials = (ServiceAccountCredentials) sourceCredentials .createScoped(Arrays.asList("https://www.googleapis.com/auth/iam")); ImpersonatedCredentials targetCredentials = ImpersonatedCredentials.create(sourceCredentials, "impersonated-account@project.iam.gserviceaccount.com", null, Arrays.asList("https://www.googleapis.com/auth/devstorage.read_only"), 300); Storage storage_service = StorageOptions.newBuilder().setProjectId("project-id") .setCredentials(targetCredentials).build().getService(); for (Bucket b : storage_service.list().iterateAll()) System.out.println(b);- See Also:
- Serialized Form
-
-
Nested Class Summary
Nested Classes Modifier and Type Class Description static classImpersonatedCredentials.Builder-
Nested classes/interfaces inherited from class com.google.auth.oauth2.OAuth2Credentials
OAuth2Credentials.CredentialsChangedListener
-
Nested classes/interfaces inherited from interface com.google.auth.oauth2.IdTokenProvider
IdTokenProvider.Option
-
Nested classes/interfaces inherited from interface com.google.auth.ServiceAccountSigner
ServiceAccountSigner.SigningException
-
-
Field Summary
-
Fields inherited from class com.google.auth.oauth2.GoogleCredentials
quotaProjectId
-
-
Method Summary
All Methods Static Methods Instance Methods Concrete Methods Modifier and Type Method Description static ImpersonatedCredentialscreate(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime)static ImpersonatedCredentialscreate(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory)static ImpersonatedCredentialscreate(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId)static ImpersonatedCredentialscreate(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId, String iamEndpointOverride)GoogleCredentialscreateScoped(Collection<String> scopes)If the credentials support scopes, creates a copy of the identity with the specified scopes; otherwise, returns the same instance.booleancreateScopedRequired()Indicates whether the credentials require scopes to be specified via a call toGoogleCredentials.createScoped(java.util.Collection<java.lang.String>)before use.ImpersonatedCredentialscreateWithCustomCalendar(Calendar calendar)Clones the impersonated credentials with a new calendar.booleanequals(Object obj)StringgetAccount()Returns the email field of the serviceAccount that is being impersonated.GoogleCredentialsgetSourceCredentials()inthashCode()IdTokenidTokenWithAudience(String targetAudience, List<IdTokenProvider.Option> options)Returns an IdToken for the current Credential.static ImpersonatedCredentials.BuildernewBuilder()AccessTokenrefreshAccessToken()Method to refresh the access token according to the specific type of credentials.voidsetTransportFactory(HttpTransportFactory httpTransportFactory)byte[]sign(byte[] toSign)Signs the provided bytes using the private key associated with the impersonated service accountImpersonatedCredentials.BuildertoBuilder()StringtoString()-
Methods inherited from class com.google.auth.oauth2.GoogleCredentials
create, createDelegated, createScoped, createScoped, createWithCustomRetryStrategy, createWithQuotaProject, fromStream, fromStream, getAdditionalHeaders, getApplicationDefault, getApplicationDefault, getQuotaProjectId
-
Methods inherited from class com.google.auth.oauth2.OAuth2Credentials
addChangeListener, getAccessToken, getAuthenticationType, getFromServiceLoader, getRequestMetadata, getRequestMetadata, getRequestMetadataInternal, hasRequestMetadata, hasRequestMetadataOnly, newInstance, refresh, refreshIfExpired, removeChangeListener
-
Methods inherited from class com.google.auth.Credentials
blockingGetToCallback, getRequestMetadata
-
-
-
-
Method Detail
-
create
public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory)
- Parameters:
sourceCredentials- the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.targetPrincipal- the service account to impersonatedelegates- the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.scopes- scopes to request during the authorization grantlifetime- number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.transportFactory- HTTP transport factory that creates the transport used to get access tokens- Returns:
- new credentials
-
create
public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId)
- Parameters:
sourceCredentials- the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.targetPrincipal- the service account to impersonatedelegates- the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.scopes- scopes to request during the authorization grantlifetime- number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.transportFactory- HTTP transport factory that creates the transport used to get access tokens.quotaProjectId- the project used for quota and billing purposes. Should be null unless the caller wants to use a project different from the one that owns the impersonated credential for billing/quota purposes.- Returns:
- new credentials
-
create
public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId, String iamEndpointOverride)
- Parameters:
sourceCredentials- the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.targetPrincipal- the service account to impersonatedelegates- the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.scopes- scopes to request during the authorization grantlifetime- number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.transportFactory- HTTP transport factory that creates the transport used to get access tokens.quotaProjectId- the project used for quota and billing purposes. Should be null unless the caller wants to use a project different from the one that owns the impersonated credential for billing/quota purposes.iamEndpointOverride- The full IAM endpoint override with the target_principal embedded. This is useful when supporting impersonation with regional endpoints.- Returns:
- new credentials
-
create
public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime)
- Parameters:
sourceCredentials- the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.targetPrincipal- the service account to impersonatedelegates- the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If left unset, sourceCredential must have that role on targetPrincipal.scopes- scopes to request during the authorization grantlifetime- number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials#sa-credentials-oauth If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.- Returns:
- new credentials
-
getAccount
public String getAccount()
Returns the email field of the serviceAccount that is being impersonated.- Specified by:
getAccountin interfaceServiceAccountSigner- Returns:
- email address of the impersonated service account
-
getSourceCredentials
public GoogleCredentials getSourceCredentials()
-
setTransportFactory
public void setTransportFactory(HttpTransportFactory httpTransportFactory)
-
sign
public byte[] sign(byte[] toSign)
Signs the provided bytes using the private key associated with the impersonated service account- Specified by:
signin interfaceServiceAccountSigner- Parameters:
toSign- bytes to sign- Returns:
- signed bytes
- Throws:
ServiceAccountSigner.SigningException- if the attempt to sign the provided bytes failed- See Also:
- Blob Signing
-
createScopedRequired
public boolean createScopedRequired()
Description copied from class:GoogleCredentialsIndicates whether the credentials require scopes to be specified via a call toGoogleCredentials.createScoped(java.util.Collection<java.lang.String>)before use.- Overrides:
createScopedRequiredin classGoogleCredentials- Returns:
- Whether the credentials require scopes to be specified.
-
createScoped
public GoogleCredentials createScoped(Collection<String> scopes)
Description copied from class:GoogleCredentialsIf the credentials support scopes, creates a copy of the identity with the specified scopes; otherwise, returns the same instance.- Overrides:
createScopedin classGoogleCredentials- Parameters:
scopes- Collection of scopes to request.- Returns:
- GoogleCredentials with requested scopes.
-
createWithCustomCalendar
public ImpersonatedCredentials createWithCustomCalendar(Calendar calendar)
Clones the impersonated credentials with a new calendar.- Parameters:
calendar- the calendar that will be used by the new ImpersonatedCredentials instance when parsing the received expiration time of the refreshed access token- Returns:
- the cloned impersonated credentials with the given custom calendar
-
refreshAccessToken
public AccessToken refreshAccessToken() throws IOException
Description copied from class:OAuth2CredentialsMethod to refresh the access token according to the specific type of credentials.Throws IllegalStateException if not overridden since direct use of OAuth2Credentials is only for temporary or non-refreshing access tokens.
- Overrides:
refreshAccessTokenin classOAuth2Credentials- Returns:
- never
- Throws:
IOException
-
idTokenWithAudience
public IdToken idTokenWithAudience(String targetAudience, List<IdTokenProvider.Option> options) throws IOException
Returns an IdToken for the current Credential.- Specified by:
idTokenWithAudiencein interfaceIdTokenProvider- Parameters:
targetAudience- the audience field for the issued ID tokenoptions- credential specific options for for the token. For example, an ID token for an ImpersonatedCredentials can return the email address within the token claims if "ImpersonatedCredentials.INCLUDE_EMAIL" is provided as a list option.
Only one option value is supported: "ImpersonatedCredentials.INCLUDE_EMAIL" If no options are set, the default excludes the "includeEmail" attribute in the API request.- Returns:
- IdToken object which includes the raw id_token, expiration, and audience
- Throws:
IOException- if the attempt to get an ID token failed
-
hashCode
public int hashCode()
- Overrides:
hashCodein classOAuth2Credentials
-
toString
public String toString()
- Overrides:
toStringin classOAuth2Credentials
-
equals
public boolean equals(Object obj)
- Overrides:
equalsin classOAuth2Credentials
-
toBuilder
public ImpersonatedCredentials.Builder toBuilder()
- Overrides:
toBuilderin classGoogleCredentials
-
newBuilder
public static ImpersonatedCredentials.Builder newBuilder()
-
-