Skip to content

Commit 7dbf05a

Browse files
daniel-sanchegemini-code-assist[bot]chalmerloweparthea
authored
chore: rename _refresh_token to _perform_refresh_token (#1900)
[A recent change](36ecb1d#diff-4762e5cf4088fa77af8bf63829f842548a4cad6e76be593786876e314807cd8f) added an internal _refresh_token method to some credentials files. Parts of the codebase were already using `_refresh_token` as an internal variable, holding a token value This causes some inconsistencies in the codebase, where it's not always clear if `_refresh_token` is referring to an action or an object It was also causing complications in internal code that depended on _refresh_token objects This PR renames the methods to `_perform_refresh_token`, to avoid the duplicate naming --------- Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com> Co-authored-by: Chalmer Lowe <chalmerlowe@google.com> Co-authored-by: Anthonios Partheniou <partheniou@google.com>
1 parent 855a45a commit 7dbf05a

12 files changed

+31
-30
lines changed

google/auth/compute_engine/credentials.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ def _retrieve_info(self, request):
123123
def _metric_header_for_usage(self):
124124
return metrics.CRED_TYPE_SA_MDS
125125

126-
def _refresh_token(self, request):
126+
def _perform_refresh_token(self, request):
127127
"""Refresh the access token and scopes.
128128
129129
Args:

google/auth/credentials.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ class CredentialsWithTrustBoundary(Credentials):
292292
"""Abstract base for credentials supporting ``with_trust_boundary`` factory"""
293293

294294
@abc.abstractmethod
295-
def _refresh_token(self, request):
295+
def _perform_refresh_token(self, request):
296296
"""Refreshes the access token.
297297
298298
Args:
@@ -303,7 +303,7 @@ def _refresh_token(self, request):
303303
google.auth.exceptions.RefreshError: If the credentials could
304304
not be refreshed.
305305
"""
306-
raise NotImplementedError("_refresh_token must be implemented")
306+
raise NotImplementedError("_perform_refresh_token must be implemented")
307307

308308
def with_trust_boundary(self, trust_boundary):
309309
"""Returns a copy of these credentials with a modified trust boundary.
@@ -362,7 +362,7 @@ def refresh(self, request):
362362
This method calls the subclass's token refresh logic and then
363363
refreshes the trust boundary if applicable.
364364
"""
365-
self._refresh_token(request)
365+
self._perform_refresh_token(request)
366366
self._refresh_trust_boundary(request)
367367

368368
def _refresh_trust_boundary(self, request):

google/auth/external_account.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -420,7 +420,7 @@ def refresh(self, request):
420420
source credentials and the impersonated credentials. For non-impersonated
421421
credentials, it will refresh the access token and the trust boundary.
422422
"""
423-
self._refresh_token(request)
423+
self._perform_refresh_token(request)
424424
self._handle_trust_boundary(request)
425425

426426
def _handle_trust_boundary(self, request):
@@ -432,7 +432,7 @@ def _handle_trust_boundary(self, request):
432432
# Otherwise, refresh the trust boundary for the external account.
433433
self._refresh_trust_boundary(request)
434434

435-
def _refresh_token(self, request, cert_fingerprint=None):
435+
def _perform_refresh_token(self, request, cert_fingerprint=None):
436436
scopes = self._scopes if self._scopes is not None else self._default_scopes
437437

438438
# Inject client certificate into request.

google/auth/external_account_authorized_user.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ def __init__(
124124
self.token = token
125125
self.expiry = expiry
126126
self._audience = audience
127-
self._refresh_token_val = refresh_token
127+
self._refresh_token = refresh_token
128128
self._token_url = token_url
129129
self._token_info_url = token_info_url
130130
self._client_id = client_id
@@ -171,7 +171,7 @@ def info(self):
171171
def constructor_args(self):
172172
return {
173173
"audience": self._audience,
174-
"refresh_token": self._refresh_token_val,
174+
"refresh_token": self._refresh_token,
175175
"token_url": self._token_url,
176176
"token_info_url": self._token_info_url,
177177
"client_id": self._client_id,
@@ -215,7 +215,7 @@ def audience(self):
215215
@property
216216
def refresh_token(self):
217217
"""Optional[str]: The OAuth 2.0 refresh token."""
218-
return self._refresh_token_val
218+
return self._refresh_token
219219

220220
@property
221221
def token_url(self):
@@ -241,7 +241,7 @@ def is_user(self):
241241
def can_refresh(self):
242242
return all(
243243
(
244-
self._refresh_token_val,
244+
self._refresh_token,
245245
self._token_url,
246246
self._client_id,
247247
self._client_secret,
@@ -279,7 +279,7 @@ def to_json(self, strip=None):
279279
strip = strip if strip else []
280280
return json.dumps({k: v for (k, v) in self.info.items() if k not in strip})
281281

282-
def _refresh_token(self, request):
282+
def _perform_refresh_token(self, request):
283283
"""Refreshes the access token.
284284
285285
Args:
@@ -298,15 +298,15 @@ def _refresh_token(self, request):
298298
)
299299

300300
now = _helpers.utcnow()
301-
response_data = self._sts_client.refresh_token(request, self._refresh_token_val)
301+
response_data = self._sts_client.refresh_token(request, self._refresh_token)
302302

303303
self.token = response_data.get("access_token")
304304

305305
lifetime = datetime.timedelta(seconds=response_data.get("expires_in"))
306306
self.expiry = now + lifetime
307307

308308
if "refresh_token" in response_data:
309-
self._refresh_token_val = response_data["refresh_token"]
309+
self._refresh_token = response_data["refresh_token"]
310310

311311
def _build_trust_boundary_lookup_url(self):
312312
"""Builds and returns the URL for the trust boundary lookup API."""
@@ -333,15 +333,15 @@ def revoke(self, request):
333333
google.auth.exceptions.OAuthError: If the token could not be
334334
revoked.
335335
"""
336-
if not self._revoke_url or not self._refresh_token_val:
336+
if not self._revoke_url or not self._refresh_token:
337337
raise exceptions.OAuthError(
338338
"The credentials do not contain the necessary fields to "
339339
"revoke the refresh token. You must specify revoke_url and "
340340
"refresh_token."
341341
)
342342

343343
self._sts_client.revoke_token(
344-
request, self._refresh_token_val, "refresh_token", self._revoke_url
344+
request, self._refresh_token, "refresh_token", self._revoke_url
345345
)
346346
self.token = None
347347
self._refresh_token = None

google/auth/identity_pool.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -571,5 +571,5 @@ def refresh(self, request):
571571
_agent_identity_utils.calculate_certificate_fingerprint(cert)
572572
)
573573

574-
self._refresh_token(request, cert_fingerprint=cert_fingerprint)
574+
self._perform_refresh_token(request, cert_fingerprint=cert_fingerprint)
575575
self._handle_trust_boundary(request)

google/auth/impersonated_credentials.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ def __init__(
272272
def _metric_header_for_usage(self):
273273
return metrics.CRED_TYPE_SA_IMPERSONATE
274274

275-
def _refresh_token(self, request):
275+
def _perform_refresh_token(self, request):
276276
"""Updates credentials with a new access_token representing
277277
the impersonated account.
278278

google/oauth2/service_account.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -434,7 +434,7 @@ def _metric_header_for_usage(self):
434434
return metrics.CRED_TYPE_SA_ASSERTION
435435

436436
@_helpers.copy_docstring(credentials.CredentialsWithTrustBoundary)
437-
def _refresh_token(self, request):
437+
def _perform_refresh_token(self, request):
438438
if self._always_use_jwt_access and not self._jwt_credentials:
439439
# If self signed jwt should be used but jwt credential is not
440440
# created, try to create one with scopes

tests/test_credentials.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727

2828

2929
class CredentialsImpl(credentials.CredentialsWithTrustBoundary):
30-
def _refresh_token(self, request):
30+
def _perform_refresh_token(self, request):
3131
self.token = "refreshed-token"
3232
self.expiry = (
3333
datetime.datetime.utcnow()

tests/test_external_account.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -737,7 +737,7 @@ def test_refresh_skips_trust_boundary_lookup_when_disabled(
737737
credentials.apply(headers_applied)
738738
assert "x-allowed-locations" not in headers_applied
739739

740-
def test_refresh_token_with_cert_fingerprint(self):
740+
def test_perform_refresh_token_with_cert_fingerprint(self):
741741
credentials = self.make_credentials()
742742
credentials._sts_client = mock.MagicMock()
743743
credentials._sts_client.exchange_token.return_value = {
@@ -748,7 +748,7 @@ def test_refresh_token_with_cert_fingerprint(self):
748748
return_value="subject_token"
749749
)
750750

751-
credentials._refresh_token(
751+
credentials._perform_refresh_token(
752752
request=mock.sentinel.request, cert_fingerprint="my-fingerprint"
753753
)
754754

tests/test_external_account_authorized_user.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ def test_refresh_auth_success(self, utcnow):
194194
assert creds.valid
195195
assert not creds.requires_scopes
196196
assert creds.is_user
197-
assert creds._refresh_token_val == REFRESH_TOKEN
197+
assert creds._refresh_token == REFRESH_TOKEN
198198

199199
request.assert_called_once_with(
200200
url=TOKEN_URL,
@@ -228,7 +228,7 @@ def test_refresh_auth_success_new_refresh_token(self, utcnow):
228228
assert creds.valid
229229
assert not creds.requires_scopes
230230
assert creds.is_user
231-
assert creds._refresh_token_val == NEW_REFRESH_TOKEN
231+
assert creds._refresh_token == NEW_REFRESH_TOKEN
232232

233233
request.assert_called_once_with(
234234
url=TOKEN_URL,
@@ -510,7 +510,7 @@ def test_with_quota_project(self):
510510
)
511511
new_creds = creds.with_quota_project(QUOTA_PROJECT_ID)
512512
assert new_creds._audience == creds._audience
513-
assert new_creds._refresh_token_val == creds.refresh_token
513+
assert new_creds._refresh_token == creds.refresh_token
514514
assert new_creds._token_url == creds._token_url
515515
assert new_creds._token_info_url == creds._token_info_url
516516
assert new_creds._client_id == creds._client_id
@@ -529,7 +529,7 @@ def test_with_token_uri(self):
529529
)
530530
new_creds = creds.with_token_uri("https://google.com")
531531
assert new_creds._audience == creds._audience
532-
assert new_creds._refresh_token_val == creds.refresh_token
532+
assert new_creds._refresh_token == creds.refresh_token
533533
assert new_creds._token_url == "https://google.com"
534534
assert new_creds._token_info_url == creds._token_info_url
535535
assert new_creds._client_id == creds._client_id
@@ -548,7 +548,7 @@ def test_with_universe_domain(self):
548548
)
549549
new_creds = creds.with_universe_domain(FAKE_UNIVERSE_DOMAIN)
550550
assert new_creds._audience == creds._audience
551-
assert new_creds._refresh_token_val == creds.refresh_token
551+
assert new_creds._refresh_token == creds.refresh_token
552552
assert new_creds._token_url == creds._token_url
553553
assert new_creds._token_info_url == creds._token_info_url
554554
assert new_creds._client_id == creds._client_id
@@ -568,7 +568,7 @@ def test_with_trust_boundary(self):
568568
)
569569
new_creds = creds.with_trust_boundary({"encodedLocations": "new_boundary"})
570570
assert new_creds._audience == creds._audience
571-
assert new_creds._refresh_token_val == creds.refresh_token
571+
assert new_creds._refresh_token == creds.refresh_token
572572
assert new_creds._token_url == creds._token_url
573573
assert new_creds._token_info_url == creds._token_info_url
574574
assert new_creds._client_id == creds._client_id

0 commit comments

Comments
 (0)