mirror of
https://github.com/GAM-team/GAM.git
synced 2025-07-08 21:53:36 +00:00
Use os.environ.get, remove try/except
This commit is contained in:
55
src/gam.py
55
src/gam.py
@ -285,10 +285,7 @@ def checkErrorCode(e, service):
|
|||||||
def tryOAuth(gdataObject):
|
def tryOAuth(gdataObject):
|
||||||
global domain
|
global domain
|
||||||
global customerId
|
global customerId
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE', 'oauth2.txt'))
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
if credentials is None or credentials.invalid:
|
if credentials is None or credentials.invalid:
|
||||||
@ -300,14 +297,8 @@ def tryOAuth(gdataObject):
|
|||||||
disable_ssl_certificate_validation = True
|
disable_ssl_certificate_validation = True
|
||||||
credentials.refresh(httplib2.Http(disable_ssl_certificate_validation=disable_ssl_certificate_validation))
|
credentials.refresh(httplib2.Http(disable_ssl_certificate_validation=disable_ssl_certificate_validation))
|
||||||
gdataObject.additional_headers = {u'Authorization': u'Bearer %s' % credentials.access_token}
|
gdataObject.additional_headers = {u'Authorization': u'Bearer %s' % credentials.access_token}
|
||||||
try:
|
domain = os.environ.get(u'GA_DOMAIN', credentials.id_token[u'hd']).lower()
|
||||||
domain = os.environ[u'GA_DOMAIN'].lower()
|
customerId = os.environ.get(u'CUSTOMER_ID', 'my_customer')
|
||||||
except KeyError:
|
|
||||||
domain = credentials.id_token[u'hd'].lower()
|
|
||||||
try:
|
|
||||||
customerId = os.environ[u'CUSTOMER_ID']
|
|
||||||
except KeyError:
|
|
||||||
customerId = u'my_customer'
|
|
||||||
gdataObject.domain = domain
|
gdataObject.domain = domain
|
||||||
return True
|
return True
|
||||||
|
|
||||||
@ -499,10 +490,7 @@ def getAPIScope(api):
|
|||||||
|
|
||||||
def buildGAPIObject(api):
|
def buildGAPIObject(api):
|
||||||
global domain, customerId
|
global domain, customerId
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE', 'oauth2.txt'))
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
if credentials is None or credentials.invalid:
|
if credentials is None or credentials.invalid:
|
||||||
@ -565,10 +553,7 @@ def buildGAPIObject(api):
|
|||||||
return service
|
return service
|
||||||
|
|
||||||
def buildGAPIServiceObject(api, act_as=None, soft_errors=False):
|
def buildGAPIServiceObject(api, act_as=None, soft_errors=False):
|
||||||
try:
|
oauth2servicefile = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHSERVICEFILE', 'oauth2service'))
|
||||||
oauth2servicefile = os.path.join(gamUserConfigDir, os.environ[u'OAUTHSERVICEFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2servicefile = os.path.join(gamUserConfigDir, u'oauth2service')
|
|
||||||
oauth2servicefilejson = u'%s.json' % oauth2servicefile
|
oauth2servicefilejson = u'%s.json' % oauth2servicefile
|
||||||
oauth2servicefilep12 = u'%s.p12' % oauth2servicefile
|
oauth2servicefilep12 = u'%s.p12' % oauth2servicefile
|
||||||
try:
|
try:
|
||||||
@ -5903,10 +5888,7 @@ def doGetUserInfo(user_email=None):
|
|||||||
try:
|
try:
|
||||||
user_email = sys.argv[3]
|
user_email = sys.argv[3]
|
||||||
except IndexError:
|
except IndexError:
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE'), 'oauth2.txt')
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
if credentials is None or credentials.invalid:
|
if credentials is None or credentials.invalid:
|
||||||
@ -8345,10 +8327,7 @@ def OAuthInfo():
|
|||||||
try:
|
try:
|
||||||
access_token = sys.argv[3]
|
access_token = sys.argv[3]
|
||||||
except IndexError:
|
except IndexError:
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE', 'oauth2.txt'))
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
if credentials is None or credentials.invalid:
|
if credentials is None or credentials.invalid:
|
||||||
@ -8383,10 +8362,7 @@ def OAuthInfo():
|
|||||||
print u'Google Apps Admin: Unknown'
|
print u'Google Apps Admin: Unknown'
|
||||||
|
|
||||||
def doDeleteOAuth():
|
def doDeleteOAuth():
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE', 'oauth2.txt'))
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
try:
|
try:
|
||||||
@ -8571,10 +8547,7 @@ access or an 'a' to grant action-only access.
|
|||||||
FLOW = oauth2client.client.flow_from_clientsecrets(CLIENT_SECRETS,
|
FLOW = oauth2client.client.flow_from_clientsecrets(CLIENT_SECRETS,
|
||||||
scope=scopes,
|
scope=scopes,
|
||||||
message=MISSING_CLIENT_SECRETS_MESSAGE)
|
message=MISSING_CLIENT_SECRETS_MESSAGE)
|
||||||
try:
|
oauth2file = os.path.join(gamUserConfigDir, os.environ.get(u'OAUTHFILE', 'oauth2.txt'))
|
||||||
oauth2file = os.path.join(gamUserConfigDir, os.environ[u'OAUTHFILE'])
|
|
||||||
except KeyError:
|
|
||||||
oauth2file = os.path.join(gamUserConfigDir, u'oauth2.txt')
|
|
||||||
storage = oauth2client.file.Storage(oauth2file)
|
storage = oauth2client.file.Storage(oauth2file)
|
||||||
credentials = storage.get()
|
credentials = storage.get()
|
||||||
flags = cmd_flags()
|
flags = cmd_flags()
|
||||||
@ -8607,8 +8580,8 @@ def run_batch(items):
|
|||||||
if not getattr(sys, 'frozen', False): # we're not frozen
|
if not getattr(sys, 'frozen', False): # we're not frozen
|
||||||
python_cmd.append(os.path.realpath(sys.argv[0]))
|
python_cmd.append(os.path.realpath(sys.argv[0]))
|
||||||
try:
|
try:
|
||||||
num_worker_threads = int(os.environ[u'GAM_THREADS'])
|
num_worker_threads = int(os.environ.get(u'GAM_THREADS', '5'))
|
||||||
except (TypeError, KeyError):
|
except TypeError:
|
||||||
num_worker_threads = 5
|
num_worker_threads = 5
|
||||||
import Queue, threading
|
import Queue, threading
|
||||||
global q
|
global q
|
||||||
@ -8987,14 +8960,14 @@ try:
|
|||||||
print user
|
print user
|
||||||
sys.exit(0)
|
sys.exit(0)
|
||||||
try:
|
try:
|
||||||
autoBatch = int(os.environ[u'GAM_AUTOBATCH'])
|
autoBatch = int(os.environ[u'GAM_AUTOBATCH', '0'])
|
||||||
if len(users) > autoBatch:
|
if (autoBatch > 0) and (len(users) > autoBatch):
|
||||||
items = []
|
items = []
|
||||||
for user in users:
|
for user in users:
|
||||||
items.append([u'user', user] + sys.argv[3:])
|
items.append([u'user', user] + sys.argv[3:])
|
||||||
run_batch(items)
|
run_batch(items)
|
||||||
sys.exit(0)
|
sys.exit(0)
|
||||||
except (TypeError, KeyError):
|
except TypeError:
|
||||||
pass
|
pass
|
||||||
if command == u'transfer':
|
if command == u'transfer':
|
||||||
transferWhat = sys.argv[4].lower()
|
transferWhat = sys.argv[4].lower()
|
||||||
|
Reference in New Issue
Block a user