This SDK provides a convenient Pythonic interface to Globus REST APIs, including the Transfer API and the Globus Auth API. Documentation for the REST APIs is available at https://docs.globus.org.
Two interfaces are provided - a low level interface, supporting only
GET
, PUT
, POST
, and DELETE
operations, and a high level
interface providing helper methods for common API resources.
Source code is available at https://github.com/globus/globus-sdk-python.
The Globus SDK requires Python 2.7+ or 3.3+. If a supported version of Python is not already installed on your system, see this Python installation guide .
The simplest way to install the Globus SDK is using the pip
package manager
(https://pypi.python.org/pypi/pip), which is included in most Python
installations:
pip install globus-sdk
This will install the Globus SDK and it’s dependencies.
Bleeding edge versions of the Globus SDK can be installed by checking out the git repository and installing it manually:
git clone https://github.com/globus/globus-sdk-python.git
cd globus-sdk-python
python setup.py install
This is a tutorial in the use of the Globus SDK. It takes you through a simple step-by-step flow for registering your application, getting tokens, and using them with our service.
These are the steps we will take:
That should be enough to get you up and started. You can also proceed to the Advanced Tutorial steps to dig deeper into the SDK.
In order to complete an OAuth2 flow to get tokens, you must have a client or “app” definition registered with Globus.
Navigate to the Developer Site and select “Register an App with Globus.” You will be prompted to login – do so with the account you wish to use as your app’s administrator.
When prompted, create a Project named “SDK Tutorial Project”. Projects let you share the administrative burden of a collection of apps, but we won’t be sharing the SDK Tutorial Project.
In the “Manage Project” menu for “SDK Tutorial Project”, select “Add new App”.
Enter the following pieces of information:
and click “Create App”.
On the “Apps” screen you should now see all of your Projects, probably just “SDK Tutorial Project”, and all of the Apps they contain, probably just “SDK Tutorial App”. Expand the dropdown for the tutorial App, and you should see an array of attributes of your client, including the ones we specified in Step 1, and a bunch of new things.
We want to get the Client ID from this screen. Feel free to think of this as your App’s “username”. You can hardcode it into scripts, store it in a config file, or even put it into a database. It’s non-secure information and you can treat it as such.
In the rest of the tutorial we will assume in all code samples that it is
available in the variable, CLIENT_ID
.
Talking to Globus Services as a user requires that you authenticate to your new App and get it Tokens, credentials proving that you logged into it and gave it permission to access the service.
No need to worry about creating your own login pages and such – for this type of app, Globus provides all of that for you. Run the following code sample to get your Access Tokens:
import globus_sdk
CLIENT_ID = '<YOUR_ID_HERE>'
client = globus_sdk.NativeAppAuthClient(CLIENT_ID)
client.oauth2_start_flow()
authorize_url = client.oauth2_get_authorize_url()
print('Please go to this URL and login: {0}'.format(authorize_url))
# this is to work on Python2 and Python3 -- you can just use raw_input() or
# input() for your specific version
get_input = getattr(__builtins__, 'raw_input', input)
auth_code = get_input(
'Please enter the code you get after login here: ').strip()
token_response = client.oauth2_exchange_code_for_tokens(auth_code)
globus_auth_data = token_response.by_resource_server['auth.globus.org']
globus_transfer_data = token_response.by_resource_server['transfer.api.globus.org']
# most specifically, you want these tokens as strings
AUTH_TOKEN = globus_auth_data['access_token']
TRANSFER_TOKEN = globus_transfer_data['access_token']
Managing credentials is one of the more advanced features of the SDK. If you want to read in depth about these steps, please look through our various Examples.
Continuing from the example above, you have two credentials to Globus Services
on hand: the AUTH_TOKEN
and the TRANSFER_TOKEN
.
We’ll focus on the TRANSFER_TOKEN
for now. It’s how you authorize access to
the Globus Transfer service.
# a GlobusAuthorizer is an auxiliary object we use to wrap the token. In
# more advanced scenarios, other types of GlobusAuthorizers give us
# expressive power
authorizer = globus_sdk.AccessTokenAuthorizer(TRANSFER_TOKEN)
tc = globus_sdk.TransferClient(authorizer=authorizer)
# high level interface; provides iterators for list responses
print("My Endpoints:")
for ep in tc.endpoint_search(filter_scope="my-endpoints"):
print("[{}] {}".format(ep["id"], ep["display_name"]))
Note that the TRANSFER_TOKEN
is only valid for a limited time. You’ll have
to login again when it expires.
In the first 4 steps of the Tutorial, we did a lot of hocus-pocus to procure Access Tokens, but we didn’t dive into how we are getting them (or why they exist at all). Not only will we talk through more detail on Access Tokens, but we’ll also explore more advanced use cases and their near-cousins, Refresh Tokens.
We powered through the OAuth2 flow in the basic tutorial. It’s worth looking closer at the token response itself, as it is of particular interest. This is the ultimate product of the flow, and it contains all of the credentials that we’ll want and need moving forward.
Remember:
client = globus_sdk.NativeAppAuthClient(CLIENT_ID)
client.oauth2_start_flow()
print('Please go to this URL and login: {0}'
.format(client.oauth2_get_authorize_url()))
get_input = getattr(__builtins__, 'raw_input', input)
auth_code = get_input('Please enter the code here: ').strip()
token_response = client.oauth2_exchange_code_for_tokens(auth_code)
Though it has a few attributes and methods, by far the most important thing
about token_response
to understand is
token_response.by_resource_server
.
Let’s take a look at str(token_response.by_resource_server)
:
>>> str(token_response.by_resource_server)
{
"auth.globus.org": {
"access_token": "AQBX8YvVAAAAAAADxhAtF46RxjcFuoxN1oSOmEk-hBqvOejY4imMbZlC0B8THfoFuOK9rshN6TV7I0uwf0hb",
"scope": "openid email profile",
"token_type": "Bearer",
"expires_at_seconds": 1476121216,
"refresh_token": None
},
"transfer.api.globus.org": {
"access_token": "AQBX8YvVAAAAAAADxg-u9uULMyTkLw4_15ReO_f2E056wLqjAWeLP51pgakLxYmyUDfGTd4SnYCiRjFq3mnj",
"scope": "urn:globus:auth:scope:transfer.api.globus.org:all",
"token_type": "Bearer",
"expires_at_seconds": 1476121286,
"refresh_token": None
}
}
A token response is structured with the following info:
Logging in to Globus through the web interface gets pretty old pretty fast. In fact, as soon as you write your first cron job against Globus, you’ll need something better. Enter Refresh Tokens: credentials which never expire unless revoked, and which can be used to get new Access Tokens whenever those do expire.
Getting yourself refresh tokens to play with is actually pretty easy. Just tweak your login flow with one argument:
client = globus_sdk.NativeAppAuthClient(CLIENT_ID)
client.oauth2_start_flow(refresh_tokens=True)
print('Please go to this URL and login: {0}'
.format(client.oauth2_get_authorize_url()))
get_input = getattr(__builtins__, 'raw_input', input)
auth_code = get_input('Please enter the code here: ').strip()
token_response = client.oauth2_exchange_code_for_tokens(auth_code)
If you peek at the token_response
now, you’ll see that the
"refresh_token"
fields are no longer nulled.
Now we’ve got a problem though: it’s great to say that you can refresh tokens whenever you want, but how do you know when to do that? And what if an Access Token gets revoked before it’s ready to expire? It turns out that using these correctly is pretty delicate, but there is a way forward that’s pretty much painless.
Let’s assume you want to do this with the globus_sdk.TransferClient
.
# let's get stuff for the Globus Transfer service
globus_transfer_data = token_response.by_resource_server['transfer.api.globus.org']
# the refresh token and access token, often abbr. as RT and AT
transfer_rt = globus_transfer_data['refresh_token']
transfer_at = globus_transfer_data['access_token']
expires_at_s = globus_transfer_data['expires_at_seconds']
# Now we've got the data we need, but what do we do?
# That "GlobusAuthorizer" from before is about to come to the rescue
authorizer = globus_sdk.RefreshTokenAuthorizer(
transfer_rt, client, access_token=transfer_at, expires_at=expires_at_s)
# and try using `tc` to make TransferClient calls. Everything should just
# work -- for days and days, months and months, even years
tc = globus_sdk.TransferClient(authorizer=authorizer)
A couple of things to note about this: access_token
and expires_at
are
optional arguments to RefreshTokenAuthorizer
. So, if all you’ve got on hand
is a refresh token, it can handle the bootstrapping problem.
Also, it’s good to know that the RefreshTokenAuthorizer
will retry the
first call that fails with an authorization error. If the second call also
fails, it won’t try anymore.
Finally, and perhaps most importantly, we must stress that you need to protect your Refresh Tokens. They are an infinite lifetime credential to act as you, so, like passwords, they should only be stored in secure locations.
The Globus SDK provides a client class for every public Globus API. Each client object takes authentication credentials from config files, environment variables, or programmatically via GlobusAuthorizers.
Once instantiated, a Client gives you high-level interface to make API calls, without needing to know Globus API endpoints or their various parameters.
For example, you could use the TransferClient
to list your task history
very simply:
from globus_sdk import TransferClient
# you must have transfer_token in your config for this to work
tc = TransferClient()
print("My Last 25 Tasks:")
# `filter` to get Delete Tasks (default is just Transfer Tasks)
for task in tc.task_list(num_results=25, filter="type:TRANSFER,DELETE"):
print(task["task_id"], task["type"], task["status"])
Client Types
globus_sdk.
TransferClient
(authorizer=None, **kwargs)[source]¶Bases: globus_sdk.base.BaseClient
Client for the Globus Transfer API.
This class provides helper methods for most common resources in the
REST API, and basic get
, put
, post
, and delete
methods
from the base rest client that can be used to access any REST resource.
There are two types of helper methods: list methods which return an
iterator of GlobusResponse
objects, and simple methods that return a single
TransferResponse
object.
Some calls are paginated. If a call returns a PaginatedResource
object, the result is an
iterator which can only be walked once. If you need to do multiple passes
over the result, call list()
on the PaginatedResource
or call the
original method again to get fresh results.
Detailed documentation is available in the official REST API documentation, which is linked to from the method documentation. Methods that allow arbitrary keyword arguments will pass the extra arguments as query parameters.
Parameters
authorizer
(GlobusAuthorizer
)An authorizer instance used for all calls to Globus Transfer
get_endpoint
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> endpoint = tc.get_endpoint(endpoint_id)
>>> print("Endpoint name:",
>>> endpoint["display_name"] or endpoint["canonical_name"])
External Documentation
See Get Endpoint by ID in the REST documentation for details.
update_endpoint
(endpoint_id, data, **params)[source]¶PUT /endpoint/<endpoint_id>
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> epup = dict(display_name="My New Endpoint Name",
>>> description="Better Description")
>>> update_result = tc.update_endpoint(endpoint_id, epup)
External Documentation
See Update Endpoint by ID in the REST documentation for details.
create_endpoint
(data)[source]¶POST /endpoint/<endpoint_id>
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> ep_data = {
>>> "DATA_TYPE": "endpoint",
>>> "display_name": display_name,
>>> "DATA": [
>>> {
>>> "DATA_TYPE": "server",
>>> "hostname": "gridftp.example.edu",
>>> },
>>> ],
>>> }
>>> create_result = tc.create_endpoint(ep_data)
>>> endpoint_id = create_result["id"]
External Documentation
See Create endpoint in the REST documentation for details.
delete_endpoint
(endpoint_id)[source]¶DELETE /endpoint/<endpoint_id>
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> delete_result = tc.delete_endpoint(endpoint_id)
External Documentation
See Delete endpoint by id in the REST documentation for details.
endpoint_search
(filter_fulltext=None, filter_scope=None, num_results=25, **params)[source]¶GET /endpoint_search?filter_fulltext=<filter_fulltext>&filter_scope=<filter_scope>
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
filter_fulltext
(string)- The string to use in a full text search on endpoints. Effectively, the “search query” which is being requested.
filter_scope
(string)- A “scope” within which to search for endpoints. This must be one of the limited and known names known to the service, which can be found documented in the External Documentation below.
num_results
(int or None)- default
25
The number of search results to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
Examples
Search for a given string as a fulltext search:
>>> tc = globus_sdk.TransferClient(...)
>>> for ep in tc.endpoint_search('String to search for!'):
>>> print(ep['display_name'])
Search for a given string, but only on endpoints that you own:
>>> for ep in tc.endpoint_search('foo', filter_scope='my-endpoints'):
>>> print('{0} has ID {1}'.format(ep['display_name'], ep['id']))
Search results are capped at a number of elements equal to the
num_results
parameter.
If you want more than the default, 25, elements, do like so:
>>> for ep in tc.endpoint_search('String to search for!',
>>> num_results=120):
>>> print(ep['display_name'])
It is important to be aware that the Endpoint Search API limits
you to 1000 results for any search query.
You can request the maximum number of results either explicitly, with
num_results=1000
, or by stating that you want no limit by setting
it to None
:
>>> for ep in tc.endpoint_search('String to search for!',
>>> num_results=None):
>>> print(ep['display_name'])
External Documentation
For additional information, see Endpoint Search. in the REST documentation for details.
endpoint_autoactivate
(endpoint_id, **params)[source]¶POST /endpoint/<endpoint_id>/autoactivate
Return type: | TransferResponse |
---|
The following example will try to “auto” activate the endpoint using a credential available from another endpoint or sign in by the user with the same identity provider, but only if the endpoint is not already activated or going to expire within an hour (3600 seconds). If that fails, direct the user to the globus website to perform activation:
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> r = tc.endpoint_autoactivate(ep_id, if_expires_in=3600)
>>> while (r["code"] == "AutoActivationFailed"):
>>> print("Endpoint requires manual activation, please open "
>>> "the following URL in a browser to activate the "
>>> "endpoint:")
>>> print("https://www.globus.org/app/endpoints/%s/activate"
>>> % ep_id)
>>> # For python 2.X, use raw_input() instead
>>> input("Press ENTER after activating the endpoint:")
>>> r = tc.endpoint_autoactivate(ep_id, if_expires_in=3600)
This is the recommended flow for most thick client applications, because many endpoints require activation via OAuth MyProxy, which must be done in a browser anyway. Web based clients can link directly to the URL.
You also might want messaging or logging depending on why and how the operation succeeded, in which case you’ll need to look at the value of the “code” field and either decide on your own messaging or use the response’s “message” field.
>>> tc = globus_sdk.TransferClient(...)
>>> r = tc.endpoint_autoactivate(ep_id, if_expires_in=3600)
>>> if r['code'] == 'AutoActivationFailed':
>>> print('Endpoint({}) Not Active! Error! Source message: {}'
>>> .format(ep_id, r['message']))
>>> sys.exit(1)
>>> elif r['code'] == 'AutoActivated.CachedCredential':
>>> print('Endpoint({}) autoactivated using a cached credential.'
>>> .format(ep_id))
>>> elif r['code'] == 'AutoActivated.GlobusOnlineCredential':
>>> print(('Endpoint({}) autoactivated using a built-in Globus '
>>> 'credential.').format(ep_id))
>>> elif r['code'] = 'AlreadyActivated':
>>> print('Endpoint({}) already active until at least {}'
>>> .format(ep_id, 3600))
External Documentation
See Autoactivate endpoint in the REST documentation for details.
endpoint_deactivate
(endpoint_id, **params)[source]¶POST /endpoint/<endpoint_id>/deactivate
Return type: | TransferResponse |
---|
External Documentation
See Deactive endpoint in the REST documentation for details.
endpoint_activate
(endpoint_id, requirements_data, **params)[source]¶POST /endpoint/<endpoint_id>/activate
Return type: | TransferResponse |
---|
Consider using autoactivate and web activation instead, described
in the example for
endpoint_autoactivate()
.
External Documentation
See Activate endpoint in the REST documentation for details.
endpoint_get_activation_requirements
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>/activation_requirements
Return type: | ActivationRequirementsResponse |
---|
External Documentation
See Get activation requirements in the REST documentation for details.
my_effective_pause_rule_list
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>/my_effective_pause_rule_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get my effective endpoint pause rules in the REST documentation for details.
GET /endpoint/<endpoint_id>/my_shared_endpoint_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get shared endpoint list in the REST documentation for details.
POST /shared_endpoint
Parameters
data
(dict)- A python dict representation of a
shared_endpoint
document
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> shared_ep_data = {
>>> "DATA_TYPE": "shared_endpoint",
>>> "host_endpoint": host_endpoint_id,
>>> "host_path": host_path,
>>> "display_name": display_name,
>>> # optionally specify additional endpoint fields
>>> "description": "my test share"
>>> }
>>> create_result = tc.create_shared_endpoint(shared_ep_data)
>>> endpoint_id = create_result["id"]
External Documentation
See Create shared endpoint in the REST documentation for details.
endpoint_server_list
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>/server_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get endpoint server list in the REST documentation for details.
get_endpoint_server
(endpoint_id, server_id, **params)[source]¶GET /endpoint/<endpoint_id>/server/<server_id>
Return type: | TransferResponse |
---|
External Documentation
See Get endpoint server by id in the REST documentation for details.
add_endpoint_server
(endpoint_id, server_data)[source]¶POST /endpoint/<endpoint_id>/server
Return type: | TransferResponse |
---|
External Documentation
See Add endpoint server in the REST documentation for details.
update_endpoint_server
(endpoint_id, server_id, server_data)[source]¶PUT /endpoint/<endpoint_id>/server/<server_id>
Return type: | TransferResponse |
---|
External Documentation
See Update endpoint server by id in the REST documentation for details.
delete_endpoint_server
(endpoint_id, server_id)[source]¶DELETE /endpoint/<endpoint_id>/server/<server_id>
Return type: | TransferResponse |
---|
External Documentation
See Delete endpoint server by id in the REST documentation for details.
endpoint_role_list
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>/role_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get list of endpoint roles in the REST documentation for details.
add_endpoint_role
(endpoint_id, role_data)[source]¶POST /endpoint/<endpoint_id>/role
Return type: | TransferResponse |
---|
External Documentation
See Create endpoint role in the REST documentation for details.
get_endpoint_role
(endpoint_id, role_id, **params)[source]¶GET /endpoint/<endpoint_id>/role/<role_id>
Return type: | TransferResponse |
---|
External Documentation
See Get endpoint role by id in the REST documentation for details.
delete_endpoint_role
(endpoint_id, role_id)[source]¶DELETE /endpoint/<endpoint_id>/role/<role_id>
Return type: | TransferResponse |
---|
External Documentation
See Delete endpoint role by id in the REST documentation for details.
endpoint_acl_list
(endpoint_id, **params)[source]¶GET /endpoint/<endpoint_id>/access_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get list of access rules in the REST documentation for details.
get_endpoint_acl_rule
(endpoint_id, rule_id, **params)[source]¶GET /endpoint/<endpoint_id>/access/<rule_id>
Return type: | TransferResponse |
---|
External Documentation
See Get access rule by id in the REST documentation for details.
add_endpoint_acl_rule
(endpoint_id, rule_data)[source]¶POST /endpoint/<endpoint_id>/access
Parameters
endpoint_id
(string)- ID of endpoint to which to add the acl
rule_data
(dict)- A python dict representation of an
access
document
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> rule_data = {
>>> "DATA_TYPE": "access",
>>> "principal_type": "identity",
>>> "principal": identity_id,
>>> "path": "/dataset1/",
>>> "permissions": "rw",
>>> }
>>> result = tc.add_endpoint_acl_rule(endpoint_id, rule_data)
>>> rule_id = result["access_id"]
External Documentation
See Create access rule in the REST documentation for details.
update_endpoint_acl_rule
(endpoint_id, rule_id, rule_data)[source]¶PUT /endpoint/<endpoint_id>/access/<rule_id>
Return type: | TransferResponse |
---|
External Documentation
See Update access rule in the REST documentation for details.
delete_endpoint_acl_rule
(endpoint_id, rule_id)[source]¶DELETE /endpoint/<endpoint_id>/access/<rule_id>
Return type: | TransferResponse |
---|
External Documentation
See Delete access rule in the REST documentation for details.
bookmark_list
(**params)[source]¶GET /bookmark_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get list of bookmarks in the REST documentation for details.
create_bookmark
(bookmark_data)[source]¶POST /bookmark
Return type: | TransferResponse |
---|
External Documentation
See Create bookmark in the REST documentation for details.
get_bookmark
(bookmark_id, **params)[source]¶GET /bookmark/<bookmark_id>
Return type: | TransferResponse |
---|
External Documentation
See Get bookmark by id in the REST documentation for details.
update_bookmark
(bookmark_id, bookmark_data)[source]¶PUT /bookmark/<bookmark_id>
Return type: | TransferResponse |
---|
External Documentation
See Update bookmark in the REST documentation for details.
delete_bookmark
(bookmark_id)[source]¶DELETE /bookmark/<bookmark_id>
Return type: | TransferResponse |
---|
External Documentation
See Delete bookmark by id in the REST documentation for details.
operation_ls
(endpoint_id, **params)[source]¶GET /operation/endpoint/<endpoint_id>/ls
Return type: | IterableTransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> for entry in tc.operation_ls(ep_id, path="/~/project1/"):
>>> print(entry["name"], entry["type"])
External Documentation
See List Directory Contents in the REST documentation for details.
operation_mkdir
(endpoint_id, path, **params)[source]¶POST /operation/endpoint/<endpoint_id>/mkdir
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> tc.operation_mkdir(ep_id, path="/~/newdir/")
External Documentation
See Make Directory in the REST documentation for details.
operation_rename
(endpoint_id, oldpath, newpath, **params)[source]¶POST /operation/endpoint/<endpoint_id>/rename
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> tc.operation_rename(ep_id, oldpath="/~/file1.txt",
>>> newpath="/~/project1data.txt")
External Documentation
See Rename in the REST documentation for details.
operation_symlink
(endpoint_id, symlink_target, path, **params)[source]¶POST /operation/endpoint/<endpoint_id>/symlink
Return type: | TransferResponse |
---|
The path
is the name of the symlink, and the symlink_target
is
the path referenced by the symlink.
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> tc.operation_symlink(ep_id, symlink_target="/~/file1.txt",
>>> path="/~/link-to-file1.txt")
External Documentation
See Symlink in the REST documentation for details.
get_submission_id
(**params)[source]¶GET /submission_id
Return type: | TransferResponse |
---|
Submission IDs are required to submit tasks to the Transfer service
via the submit_transfer
and
submit_delete
methods.
Most users will not need to call this method directly, as the
convenience classes TransferData
and DeleteData
will call it
automatically if they are not passed a submission_id
explicitly.
External Documentation
See Get a submission id in the REST documentation for more details.
submit_transfer
(data)[source]¶POST /transfer
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> tdata = globus_sdk.TransferData(tc, source_endpoint_id,
>>> destination_endpoint_id,
>>> label="SDK example",
>>> sync_level="checksum")
>>> tdata.add_item("/source/path/dir/", "/dest/path/dir/",
>>> recursive=True)
>>> tdata.add_item("/source/path/file.txt",
>>> "/dest/path/file.txt")
>>> transfer_result = tc.submit_transfer(tdata)
>>> print("task_id =", transfer_result["task_id"])
The data parameter can be a normal Python dictionary, or
a TransferData
object.
External Documentation
See Submit a transfer task in the REST documentation for more details.
submit_delete
(data)[source]¶POST /delete
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> ddata = globus_sdk.DeleteData(tc, endpoint_id, recursive=True)
>>> ddata.add_item("/dir/to/delete/")
>>> ddata.add_item("/file/to/delete/file.txt")
>>> delete_result = tc.submit_delete(ddata)
>>> print("task_id =", delete_result["task_id"])
The data parameter can be a normal Python dictionary, or
a DeleteData
object.
External Documentation
See Submit a delete task in the REST documentation for details.
task_list
(num_results=10, **params)[source]¶Get an iterable of task documents owned by the current user.
GET /task_list
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
num_results
(int or None)- default
10
The number of tasks to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
Examples
Fetch the default number (10) of tasks and print some basic info:
>>> tc = TransferClient(...)
>>> for task in tc.task_list():
>>> print("Task({}): {} -> {}".format(
>>> task["task_id"], task["source_endpoint"],
>>> task["destination_endpoint"))
External Documentation
See Task list in the REST documentation for details.
task_event_list
(task_id, num_results=10, **params)[source]¶List events (for example, faults and errors) for a given Task.
GET /task/<task_id>/event_list
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
task_id
(string)- The task to inspect.
num_results
(int or None)- default
10
The number of events to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
Examples
Fetch the default number (10) of events and print some basic info:
>>> tc = TransferClient(...)
>>> task_id = ...
>>> for event in tc.task_event_list(task_id):
>>> print("Event on Task({}) at {}:\n{}".format(
>>> task_id, event["time"], event["description"])
External Documentation
See Get event list in the REST documentation for details.
get_task
(task_id, **params)[source]¶GET /task/<task_id>
Return type: | TransferResponse |
---|
External Documentation
See Get task by id in the REST documentation for details.
update_task
(task_id, data, **params)[source]¶PUT /task/<task_id>
Return type: | TransferResponse |
---|
External Documentation
See Update task by id in the REST documentation for details.
cancel_task
(task_id)[source]¶POST /task/<task_id>/cancel
Return type: | TransferResponse |
---|
External Documentation
See Cancel task by id in the REST documentation for details.
task_wait
(task_id, timeout=10, polling_interval=10)[source]¶Wait until a Task is complete or fails, with a time limit. If the task
is “ACTIVE” after time runs out, returns False
. Otherwise returns
True
.
Parameters
task_id
(string)- ID of the Task to wait on for completion
timeout
(int)- Number of seconds to wait in total. Minimum 1
polling_interval
(int)- Number of seconds between queries to Globus about the Task status. Minimum 1
Examples
If you want to wait for a task to terminate, but want to warn every minute that it doesn’t terminate, you could:
>>> tc = TransferClient(...)
>>> while not tc.task_wait(task_id, timeout=60):
>>> print("Another minute went by without {0} terminating"
>>> .format(task_id))
Or perhaps you want to check on a task every minute for 10 minutes, and give up if it doesn’t complete in that time:
>>> tc = TransferClient(...)
>>> done = tc.task_wait(task_id, timeout=600, polling_interval=60):
>>> if not done:
>>> print("{0} didn't successfully terminate!"
>>> .format(task_id))
>>> else:
>>> print("{0} completed".format(task_id))
You could print dots while you wait for a task by only waiting one second at a time:
>>> tc = TransferClient(...)
>>> while not tc.task_wait(task_id, timeout=1, polling_interval=1):
>>> print(".", end="")
>>> print("\n{0} completed!".format(task_id))
task_pause_info
(task_id, **params)[source]¶GET /task/<task_id>/pause_info
Return type: | TransferResponse |
---|
External Documentation
See Get task pause info in the REST documentation for details.
task_successful_transfers
(task_id, num_results=100, **params)[source]¶Get the successful file transfers for a completed Task.
GET /task/<task_id>/successful_transfers
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
task_id
(string)- The task to inspect.
num_results
(int or None)- default
100
The number of file transfer records to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
Examples
Fetch all transferred files for a task and print some basic info:
>>> tc = TransferClient(...)
>>> task_id = ...
>>> for info in tc.task_successful_transfers(task_id):
>>> print("{} -> {}".format(
>>> info["source_path"], info["destination_path"))
External Documentation
See Get Task Successful Transfers in the REST documentation for details.
endpoint_manager_monitored_endpoints
(**params)[source]¶Get endpoints the current user is a monitor or manager on.
GET endpoint_manager/monitored_endpoints
Return type: | iterable of GlobusResponse |
---|
See Get monitored endpoints in the REST documentation for details.
endpoint_manager_hosted_endpoint_list
(endpoint_id, **params)[source]¶Get shared endpoints hosted on the given endpoint.
GET /endpoint_manager/endpoint/<endpoint_id>/hosted_endpoint_list
Return type: | iterable of GlobusResponse |
---|
See Get hosted endpoint list in the REST documentation for details.
endpoint_manager_get_endpoint
(endpoint_id, **params)[source]¶Get endpoint details as an admin.
GET /endpoint_manager/endpoint/<endpoint_id>
Return type: | TransferResponse |
---|
External Documentation
See Get endpoint as admin in the REST documentation for details.
endpoint_manager_acl_list
(endpoint_id, **params)[source]¶Get a list of access control rules on specified endpoint as an admin.
GET endpoint_manager/endpoint/<endpoint_id>/access_list
Return type: | IterableTransferResponse |
---|
External Documentation
See Get endpoint access list as admin in the REST documentation for details.
endpoint_manager_task_list
(num_results=10, **params)[source]¶Get a list of tasks visible via activity_monitor
role, as opposed
to tasks owned by the current user.
GET endpoint_manager/task_list
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
num_results
(int or None)- default
10
The number of tasks to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
Examples
Fetch the default number (10) of tasks and print some basic info:
>>> tc = TransferClient(...)
>>> for task in tc.endpoint_manager_task_list():
>>> print("Task({}): {} -> {}\n was submitted by\n {}".format(
>>> task["task_id"], task["source_endpoint"],
>>> task["destination_endpoint"), task["owner_string"])
Do that same operation on all tasks visible via activity_monitor
status:
>>> tc = TransferClient(...)
>>> for task in tc.endpoint_manager_task_list(num_results=None):
>>> print("Task({}): {} -> {}\n was submitted by\n {}".format(
>>> task["task_id"], task["source_endpoint"],
>>> task["destination_endpoint"), task["owner_string"])
External Documentation
See Advanced Endpoint Management: Get tasks in the REST documentation for details.
endpoint_manager_get_task
(task_id, **params)[source]¶Get task info as an admin. Requires activity monitor effective role on the destination endpoint of the task.
GET /endpoint_manager/task/<task_id>
Return type: | TransferResponse |
---|
External Documentation
See Get task as admin in the REST documentation for details.
endpoint_manager_task_event_list
(task_id, num_results=10, **params)[source]¶List events (for example, faults and errors) for a given task as an admin. Requires activity monitor effective role on the destination endpoint of the task.
GET /task/<task_id>/event_list
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
task_id
(string)- The task to inspect.
num_results
(int or None)- default
10
The number of events to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
External Documentation
See Get task events as admin in the REST documentation for details.
endpoint_manager_task_pause_info
(task_id, **params)[source]¶Get details about why a task is paused as an admin. Requires activity monitor effective role on the destination endpoint of the task.
GET /endpoint_manager/task/<task_id>/pause_info
Return type: | TransferResponse |
---|
External Documentation
See Get task pause info as admin in the REST documentation for details.
endpoint_manager_task_successful_transfers
(task_id, num_results=100, **params)[source]¶Get the successful file transfers for a completed Task as an admin.
GET /endpoint_manager/task/<task_id>/successful_transfers
Return type: | PaginatedResource ,
an iterable of GlobusResponse |
---|
Parameters
task_id
(string)- The task to inspect.
num_results
(int or None)- default
100
The number of file transfer records to fetch from the service. May be set toNone
to request the maximum allowable number of results.params
- Any additional parameters will be passed through as query params.
External Documentation
See Get task successful transfers as admin in the REST documentation for details.
endpoint_manager_cancel_tasks
(task_ids, message, **params)[source]¶Cancel a list of tasks as an admin. Requires activity manager effective role on the task(s) source or destination endpoint(s).
POST /endpoint_manager/admin_cancel
Return type: | TransferResponse |
---|
Parameters
task_ids
(list of string)- List of task ids to cancel.
message
(string)- Message given to all users who’s tasks have been canceled.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Cancel tasks as admin in the REST documentation for details.
endpoint_manager_cancel_status
(admin_cancel_id, **params)[source]¶Get the status of an an admin cancel (result of endpoint_manager_cancel_tasks).
GET /endpoint_manager/admin_cancel/<admin_cancel_id>
Return type: | TransferResponse |
---|
Parameters
admin_cancel_id
(string)- The ID of the the cancel to inspect.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Get cancel status by id in the REST documentation for details.
endpoint_manager_pause_tasks
(task_ids, message, **params)[source]¶Pause a list of tasks as an admin. Requires activity manager effective role on the task(s) source or destination endpoint(s).
POST /endpoint_manager/admin_pause
Return type: | TransferResponse |
---|
Parameters
task_ids
(list of string)- List of task ids to pause.
message
(string)- Message given to all users who’s tasks have been paused.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Cancel tasks as admin in the REST documentation for details.
endpoint_manager_resume_tasks
(task_ids, **params)[source]¶Resume a list of tasks as an admin. Requires activity manager effective role on the task(s) source or destination endpoint(s).
POST /endpoint_manager/admin_resume
Return type: | TransferResponse |
---|
Parameters
task_ids
(list of string)- List of task ids to resume.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Resume tasks as admin in the REST documentation for details.
endpoint_manager_pause_rule_list
(filter_endpoint=None, **params)[source]¶Get a list of pause rules on endpoints that the current user has the activity monitor effective role on.
GET /endpoint_manager/pause_rule_list
Return type: | IterableTransferResponse |
---|
Parameters
filter_endpoint
(string)- Limit results to pause rules on this endpoint.
filter_endpoint
(string)- Limit results to rules on endpoints hosted by this endpoint. Must be activity monitor on this endpoint, not just the hosted endpoints.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Get pause rules in the REST documentation for details.
endpoint_manager_create_pause_rule
(data)[source]¶Create a new pause rule. Requires the activity manager effective role on the endpoint defined in the rule.
POST /endpoint_manager/pause_rule
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> rule_data = {
>>> "DATA_TYPE": "pause_rule",
>>> "message": "Message to users explaining why tasks are paused",
>>> "endpoint_id": "339abc22-aab3-4b45-bb56-8d40535bfd80",
>>> "identity_id": None, # affect all users on endpoint
>>> "start_time": None # start now
>>> }
>>> create_result = tc.endpoint_manager_create_pause_rule(ep_data)
>>> rule_id = create_result["id"]
External Documentation
See Create pause rule in the REST documentation for details.
endpoint_manager_get_pause_rule
(pause_rule_id, **params)[source]¶Get an existing pause rule by ID. Requires the activity manager effective role on the endpoint defined in the rule.
GET /endpoint_manager/pause_rule/<pause_rule_id>
rtype: TransferResponse
Parameters
pause_rule_id
(string)- ID of pause rule to get.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Create pause rule in the REST documentation for details.
endpoint_manager_update_pause_rule
(pause_rule_id, data)[source]¶Update an existing pause rule by ID. Requires the activity manager effective role on the endpoint defined in the rule. Note that non update-able fields in data will be ignored.
PUT /endpoint_manager/pause_rule/<pause_rule_id>
Return type: | TransferResponse |
---|
Examples
>>> tc = globus_sdk.TransferClient(...)
>>> rule_data = {
>>> "message": "Update to pause, reads are now allowed.",
>>> "pause_ls": False,
>>> "pause_task_transfer_read": False
>>> }
>>> update_result = tc.endpoint_manager_create_pause_rule(ep_data)
External Documentation
See Update pause rule in the REST documentation for details.
endpoint_manager_delete_pause_rule
(pause_rule_id, **params)[source]¶Delete an existing pause rule by ID. Requires the user to see the “editible” field of the rule as True. Any tasks affected by this rule will no longer be once it is deleted.
DELETE /endpoint_manager/pause_rule/<pause_rule_id>
rtype: TransferResponse
Parameters
pause_rule_id
(string)- ID of pause rule to delete.
params
- Any additional parameters will be passed through as query params.
External Documentation
See Delete pause rule in the REST documentation for details.
globus_sdk.
TransferData
(transfer_client, source_endpoint, destination_endpoint, label=None, submission_id=None, sync_level=None, verify_checksum=False, preserve_timestamp=False, encrypt_data=False, deadline=None, recursive_symlinks=u'ignore', **kwargs)[source]¶Bases: dict
Convenience class for constructing a transfer document, to use as the
data parameter to
submit_transfer
.
At least one item must be added using
add_item
.
For compatibility with older code and those knowledgeable about the API
sync_level can be 0
, 1
, 2
, or 3
, but it can also be
"exists"
, "size"
, "mtime"
, or "checksum"
if you want
greater clarity in client code.
If submission_id
isn’t passed, one will be fetched automatically. The
submission ID can be pulled out of here to inspect, but the document
can be used as-is multiple times over to retry a potential submission
failure (so there shouldn’t be any need to inspect it).
See the
submit_transfer
documentation for example usage.
add_item
(source_path, destination_path, recursive=False)[source]¶Add a file or directory to be transfered. If the item is a symlink to a file or directory, the file or directory at the target of the symlink will be transfered.
Appends a transfer_item document to the DATA key of the transfer document.
globus_sdk.
DeleteData
(transfer_client, endpoint, label=None, submission_id=None, recursive=False, deadline=None, **kwargs)[source]¶Bases: dict
Convenience class for constructing a delete document, to use as the
data parameter to
submit_delete
.
At least one item must be added using
add_item
.
If submission_id
isn’t passed, one will be fetched automatically. The
submission ID can be pulled out of here to inspect, but the document
can be used as-is multiple times over to retry a potential submission
failure (so there shouldn’t be any need to inspect it).
See the submit_delete
documentation for example usage.
globus_sdk.exc.
TransferAPIError
(r)[source]¶Bases: globus_sdk.exc.GlobusAPIError
Error class for the Transfer API client. In addition to the
inherited code
and message
instance variables, provides:
Variables: | request_id – Unique identifier for the request, which should be provided when contacting support@globus.org. |
---|
globus_sdk.
AuthClient
(client_id=None, authorizer=None, **kwargs)[source]¶Bases: globus_sdk.base.BaseClient
Client for the Globus Auth API
This class provides helper methods for most common resources in the
Auth API, and the common low-level interface from
BaseClient
of get
, put
,
post
, and delete
methods, which can be used to access any API
resource.
There are generally two types of resources, distinguished by the type of authentication which they use. Resources available to end users of Globus are authenticated with a Globus Auth Token (“Authentication: Bearer ...”), while resources available to OAuth Clients are authenticated using Basic Auth with the Client’s ID and Secret. Some resources may be available with either authentication type.
Examples
Initializing an AuthClient
to authenticate a user making calls to the
Globus Auth service with an access token takes the form
>>> from globus_sdk import AuthClient, AccessTokenAuthorizer
>>> ac = AuthClient(authorizer=AccessTokenAuthorizer('<token_string>'))
You can, of course, use other kinds of Authorizers (notably the
RefreshTokenAuthorizer
).
get_identities
(usernames=None, ids=None, provision=False, **params)[source]¶GET /v2/api/identities
Given usernames=<U>
or (exclusive) ids=<I>
as keyword
arguments, looks up identity information for the set of identities
provided.
<U>
and <I>
in this case are comma-delimited strings listing
multiple Identity Usernames or Identity IDs, or iterables of strings,
each of which is an Identity Username or Identity ID.
If Globus Auth’s identity auto-provisioning behavior is desired,
provision=True
may be specified.
Available with any authentication/client type.
Examples
>>> ac = globus_sdk.AuthClient(...)
>>> # by IDs
>>> r = ac.get_identities(ids="46bd0f56-e24f-11e5-a510-131bef46955c")
>>> r.data
{u'identities': [{u'email': None,
u'id': u'46bd0f56-e24f-11e5-a510-131bef46955c',
u'identity_provider': u'7daddf46-70c5-45ee-9f0f-7244fe7c8707',
u'name': None,
u'organization': None,
u'status': u'unused',
u'username': u'globus@globus.org'}]}
>>> ac.get_identities(
>>> ids=",".join(
>>> ("46bd0f56-e24f-11e5-a510-131bef46955c",
>>> "168edc3d-c6ba-478c-9cf8-541ff5ebdc1c"))
...
>>> # or by usernames
>>> ac.get_identities(usernames='globus@globus.org')
...
>>> ac.get_identities(
>>> usernames='globus@globus.org,auth@globus.org')
...
You could also use iterables:
>>> ac.get_identities(
>>> usernames=['globus@globus.org', 'auth@globus.org'])
...
>>> ac.get_identities(
>>> ids=["46bd0f56-e24f-11e5-a510-131bef46955c",
>>> "168edc3d-c6ba-478c-9cf8-541ff5ebdc1c"])
...
External Documentation
See Identities Resources in the API documentation for details.
Get the authorization URL to which users should be sent.
This method may only be called after oauth2_start_flow
has been called on this AuthClient
.
Parameters
additional_params
(dict)- A
dict
orNone
, which specifies additional query parameters to include in the authorize URL. Primarily for internal use
Return type: | string |
---|
oauth2_exchange_code_for_tokens
(auth_code)[source]¶Exchange an authorization code for a token or tokens.
Return type: | OAuthTokenResponse |
---|
auth_code
oauth2_refresh_token
(refresh_token, additional_params=None)[source]¶Exchange a refresh token for a OAuthTokenResponse
, containing
an access token.
Does a token call of the form
refresh_token=<refresh_token>
grant_type=refresh_token
plus any additional parameters you may specify.
refresh_token
additional_params
oauth2_validate_token
(token, additional_params=None)[source]¶Validate a token. It can be an Access Token or a Refresh token.
This call can be used to check tokens issued to your client,
confirming that they are or are not still valid. The resulting response
has the form {"active": True}
when the token is valid, and
{"active": False}
when it is not.
It is not necessary to validate tokens immediately after receiving them from the service – any tokens which you are issued will be valid at that time. This is more for the purpose of doing checks like
oauth2_revoke_token
succeededParameters
token
(string)- The token which should be validated. Can be a refresh token or an access token
additional_params
(dict)- A
dict
orNone
, which specifies additional parameters to include in the validation body. Primarily for internal use
Examples
Revoke a token and confirm that it is no longer active:
>>> from globus_sdk import ConfidentialAppAuthClient
>>> ac = ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
>>> ac.oauth2_revoke_token('<token_string>')
>>> data = ac.oauth2_validate_token('<token_string>')
>>> assert not data['active']
During application boot, check if the user needs to do a login, even if a token is present:
>>> from globus_sdk import ConfidentialAppAuthClient
>>> ac = ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
>>> # this is not an SDK function, but a hypothetical function which
>>> # you use to load a token out of configuration data
>>> tok = load_token_from_config(...)
>>>
>>> if not tok or not ac.oauth2_validate_token(tok)['active']:
>>> # do_new_login() is another hypothetical helper
>>> tok = do_new_login()
>>> # at this point, tok is expected to be a valid token
oauth2_revoke_token
(token, additional_params=None)[source]¶Revoke a token. It can be an Access Token or a Refresh token.
This call should be used to revoke tokens issued to your client, rendering them inert and not further usable. Typically, this is incorporated into “logout” functionality, but it should also be used if the client detects that its tokens are in an unsafe location (e.x. found in a world-readable logfile).
You can check the “active” status of the token after revocation if you want to confirm that it was revoked.
Parameters
token
(string)- The token which should be revoked
additional_params
(dict)- A
dict
orNone
, which specifies additional parameters to include in the revocation body, which can help speed the revocation process. Primarily for internal use
Examples
>>> from globus_sdk import ConfidentialAppAuthClient
>>> ac = ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
>>> ac.oauth2_revoke_token('<token_string>')
oauth2_token
(form_data, response_class=<class 'globus_sdk.auth.token_response.OAuthTokenResponse'>)[source]¶This is the generic form of calling the OAuth2 Token endpoint.
It takes form_data
, a dict which will be encoded in a form POST
body on the request.
Generally, users of the SDK should not call this method unless they are implementing OAuth2 flows.
Parameters
response_type
- Defaults to
OAuthTokenResponse
. This is used by calls to the oauth2_token endpoint which need to specialize their responses. For example,oauth2_get_dependent_tokens
requires a specialize response class to handle the dramatically different nature of the Dependent Token Grant response
Return type: | response_class |
---|
oauth2_userinfo
()[source]¶Call the Userinfo endpoint of Globus Auth. Userinfo is specified as part of the OpenID Connect (OIDC) standard, and Globus Auth’s Userinfo is OIDC-compliant.
The exact data returned will depend upon the set of OIDC-related scopes which were used to acquire the token being used for this call. For details, see the External Documentation below.
Examples
>>> ac = AuthClient(...)
>>> info = ac.oauth2_userinfo()
>>> print('Effective Identity "{}" has Full Name "{}" and Email "{}"'
>>> .format(info["sub"], info["name"], info["email"]))
External Documentation
See Userinfo in the API documentation for details.
globus_sdk.
NativeAppAuthClient
(client_id, **kwargs)[source]¶Bases: globus_sdk.auth.client_types.base.AuthClient
This type of AuthClient
is used to represent a Native App’s
communications with Globus Auth.
It requires a Client ID, and cannot take an authorizer
.
Native Apps are applications, like the Globus CLI, which are run client-side and therefore cannot keep secrets. Unable to possess client credentials, several Globus Auth interactions have to be specialized to accommodate the absence of a secret.
Any keyword arguments given are passed through to the AuthClient
constructor.
oauth2_start_flow
(requested_scopes=None, redirect_uri=None, state='_default', verifier=None, refresh_tokens=False, prefill_named_grant=None)[source]¶Starts a Native App OAuth2 flow.
This is done internally by instantiating a
GlobusNativeAppFlowManager
While the flow is in progress, the NativeAppAuthClient
becomes
non thread-safe as temporary state is stored during the flow.
Parameters
requested_scopes
(iterable or string)- The scopes on the token(s) being requested, as a space-separated string or iterable of strings. Defaults to
openid profile email urn:globus:auth:scope:transfer.api.globus.org:all
redirect_uri
(string)- The page that users should be directed to after authenticating at the authorize URL. Defaults to ‘https://auth.globus.org/v2/web/auth-code‘, which displays the resulting
auth_code
for users to copy-paste back into your application (and thereby be passed back to theGlobusNativeAppFlowManager
)state
(string)- Typically is not meaningful in the Native App Grant flow, but you may have a specialized use case for it. The
redirect_uri
page will have this included in a query parameter, so you can use it to pass information to that page. It defaults to the string ‘_default’verifier
(string)- A secret used for the Native App flow. It will by default be a freshly generated random string, known only to this
GlobusNativeAppFlowManager
instancerefresh_tokens
(bool)- When True, request refresh tokens in addition to access tokens
prefill_named_grant
(string)- Optionally prefill the named grant label on the consent page
Examples
You can see an example of this flow in the usage examples
External Documentation
The Globus Auth specification for Native App grants details the modifications to the Authorization Code grant flow as The PKCE Security Protocol
globus_sdk.
ConfidentialAppAuthClient
(client_id, client_secret, **kwargs)[source]¶Bases: globus_sdk.auth.client_types.base.AuthClient
This is a specialized type of AuthClient
used to represent an App with
a Client ID and Client Secret wishing to communicate with Globus Auth.
It must be given a Client ID and a Client Secret, and furthermore, these
will be used to establish a BasicAuthorizer
<globus_sdk.authorizers.BasicAuthorizer
for authorization purposes.
Additionally, the Client ID is stored for use in various calls.
Confidential Applications (i.e. Applications with are not Native Apps) are those like the Sample Data Portal, which have their own credentials for authenticating against Globus Auth.
Any keyword arguments given are passed through to the AuthClient
constructor.
oauth2_client_credentials_tokens
(requested_scopes=None)[source]¶Perform an OAuth2 Client Credentials Grant to get access tokens which
directly represent your client and allow it to act on its own
(independent of any user authorization).
This method does not use a GlobusOAuthFlowManager
because it is not
at all necessary to do so.
requested_scopes
Return type: | OAuthTokenResponse |
---|
For example, with a Client ID of “CID1001” and a Client Secret of “RAND2002”, you could use this grant type like so:
>>> client = ConfidentialAppAuthClient("CID1001", "RAND2002")
>>> tokens = client.oauth2_client_credentials_tokens()
>>> transfer_token_info = (
... tokens.by_resource_server["transfer.api.globus.org"])
>>> transfer_token = transfer_token_info["access_token"]
oauth2_start_flow
(redirect_uri, requested_scopes=None, state='_default', refresh_tokens=False)[source]¶Starts or resumes an Authorization Code OAuth2 flow.
Under the hood, this is done by instantiating a
GlobusAuthorizationCodeFlowManager
Parameters
redirect_uri
(string)- The page that users should be directed to after authenticating at the authorize URL. Required.
requested_scopes
(iterable or string)- The scopes on the token(s) being requested, as a space-separated string or an iterable of strings. Defaults to
openid profile email urn:globus:auth:scope:transfer.api.globus.org:all
state
(string)- This is a way of your application passing information back to itself in the course of the OAuth flow. Because the user will navigate away from your application to complete the flow, this parameter lets you pass an arbitrary string from the starting page to the
redirect_uri
refresh_tokens
(bool)- When True, request refresh tokens in addition to access tokens
Examples
You can see an example of this flow in the usage examples
External Documentation
The Authorization Code Grant flow is described in the Globus Auth Specification
oauth2_get_dependent_tokens
(token)[source]¶Does a Dependent Token Grant against Globus Auth. This exchanges a token given to this client for a new set of tokens which give it access to resource servers on which it depends. This grant type is intended for use by Resource Servers playing out the following scenario:
- User has tokens for Service A, but Service A requires access to Service B on behalf of the user
- Service B should not see tokens scoped for Service A
- Service A therefore requests tokens scoped only for Service B, based on tokens which were originally scoped for Service A...
In order to do this exchange, the tokens for Service A must have scopes which depend on scopes for Service B (the services’ scopes must encode their relationship). As long as that is the case, Service A can use this Grant to get those “Dependent” or “Downstream” tokens for Service B.
Parameters
token
(string)- An Access Token as a raw string, being exchanged.
Return type: | OAuthTokenResponse |
---|
oauth2_token_introspect
(token, include=None)[source]¶POST /v2/oauth2/token/introspect
Get information about a Globus Auth token.
>>> ac = globus_sdk.ConfidentialAppAuthClient(
... CLIENT_ID, CLIENT_SECRET)
>>> ac.oauth2_token_introspect('<token_string>')
Parameters
token
(string)- An Access Token as a raw string, being evaluated
include
(string)- A value for the
include
parameter in the request body. Default is to omit the parameter, also supports"identity_set"
.
External Documentation
See Token Introspection in the API documentation for details.
All service clients support the low level interface, provided by the
BaseClient
.
globus_sdk.base.
BaseClient
(service, environment=None, base_path=None, authorizer=None, app_name=None)[source]¶Simple client with error handling for Globus REST APIs. Implemented
as a wrapper around a requests.Session
object, with a simplified
interface that does not directly expose anything from requests.
You should never try to directly instantiate a BaseClient
.
Parameters
authorizer
(GlobusAuthorizer
)AGlobusAuthorizer
which will generate Authorization headers
app_name
(string)- Optional “nice name” for the application. Has no bearing on the semantics of client actions. It is just passed as part of the User-Agent string, and may be useful when debugging issues with the Globus Team
All other parameters are for internal use and should be ignored.
set_app_name
(app_name)[source]¶Set an application name to send to Globus services as part of the User Agent.
Application developers are encouraged to set an app name as a courtesy to the Globus Team, and to potentially speed resolution of issues when interacting with Globus Support.
get
(path, params=None, headers=None, response_class=None, retry_401=True)[source]¶Make a GET request to the specified path.
Parameters
path
(string)- Path for the request, with or without leading slash
params
(dict)- Parameters to be encoded as a query string
headers
(dict)- HTTP headers to add to the request
response_class
(class)- Class for response object, overrides the client’s
default_response_class
retry_401
(bool)- Retry on 401 responses with fresh Authorization if
self.authorizer
supports it
Returns: | GlobusHTTPResponse object |
---|
post
(path, json_body=None, params=None, headers=None, text_body=None, response_class=None, retry_401=True)[source]¶Make a POST request to the specified path.
Parameters
path
(string)- Path for the request, with or without leading slash
params
(dict)- Parameters to be encoded as a query string
headers
(dict)- HTTP headers to add to the request
json_body
(dict)- Data which will be JSON encoded as the body of the request
text_body
(string or dict)- Either a raw string that will serve as the request body, or a dict which will be HTTP Form encoded
response_class
(class)- Class for response object, overrides the client’s
default_response_class
retry_401
(bool)- Retry on 401 responses with fresh Authorization if
self.authorizer
supports it
Returns: | GlobusHTTPResponse object |
---|
delete
(path, params=None, headers=None, response_class=None, retry_401=True)[source]¶Make a DELETE request to the specified path.
Parameters
path
(string)- Path for the request, with or without leading slash
params
(dict)- Parameters to be encoded as a query string
headers
(dict)- HTTP headers to add to the request
response_class
(class)- Class for response object, overrides the client’s
default_response_class
retry_401
(bool)- Retry on 401 responses with fresh Authorization if
self.authorizer
supports it
Returns: | GlobusHTTPResponse object |
---|
put
(path, json_body=None, params=None, headers=None, text_body=None, response_class=None, retry_401=True)[source]¶Make a PUT request to the specified path.
Parameters
path
(string)- Path for the request, with or without leading slash
params
(dict)- Parameters to be encoded as a query string
headers
(dict)- HTTP headers to add to the request
json_body
(dict)- Data which will be JSON encoded as the body of the request
text_body
(string or dict)- Either a raw string that will serve as the request body, or a dict which will be HTTP Form encoded
response_class
(class)- Class for response object, overrides the client’s
default_response_class
retry_401
(bool)- Retry on 401 responses with fresh Authorization if
self.authorizer
supports it
Returns: | GlobusHTTPResponse object |
---|
Unless noted otherwise, all method return values for Globus SDK Clients are
GlobusResponse
objects.
Some GlobusResponse
objects are iterables.
In those cases, their contents will also be GlobusResponse
objects.
To customize client methods with additional detail, the SDK uses subclasses of
GlobusResponse
.
For example the GlobusHTTPResponse
attaches HTTP response information.
globus_sdk.response.
GlobusResponse
(data)[source]¶Generic response object, with a single data
member.
The most common response data is a JSON dictionary. To make
handling this type of response as seemless as possible, the
GlobusResponse
object also supports direct dictionary item
access, as an alias for accessing an item of the underlying
data
. If data
is not a dictionary, item access will raise
TypeError
.
>>> print("Response ID": r["id"]) # alias for r.data["id"]
data
¶Response data as a Python data structure. Usually a dict or list.
globus_sdk.response.
GlobusHTTPResponse
(http_response)[source]¶Bases: globus_sdk.response.GlobusResponse
Response object that wraps an HTTP response from the underlying HTTP
library. If the response is JSON, the parsed data will be available in
data
, otherwise data
will be None
and text
should
be used instead.
Variables: |
|
---|
text
¶The raw response data as a string.
globus_sdk.transfer.response.
TransferResponse
(http_response)[source]¶Bases: globus_sdk.response.GlobusHTTPResponse
Base class for TransferClient
responses.
globus_sdk.transfer.response.
IterableTransferResponse
(http_response)[source]¶Bases: globus_sdk.transfer.response.base.TransferResponse
Response class for non-paged list oriented resources. Allows top level
fields to be accessed normally via standard item access, and also
provides a convenient way to iterate over the sub-item list in the
DATA
key:
>>> print("Path:", r["path"])
>>> # Equivalent to: for item in r["DATA"]
>>> for item in r:
>>> print(item["name"], item["type"])
globus_sdk.transfer.response.
ActivationRequirementsResponse
(*args, **kwargs)[source]¶Bases: globus_sdk.transfer.response.base.TransferResponse
Response class for Activation Requirements responses.
All Activation Requirements documents refer to a specific Endpoint, from whence they were acquired. References to “the Endpoint” implicitly refer to that originating Endpoint, and not to some other Endpoint.
External Documentation
See Activation Requirements Document in the API documentation for details.
active_until
(time_seconds, relative_time=True)[source]¶Check if the Endpoint will be active until some time in the future,
given as an integer number of seconds.
When relative_time=False
, the time_seconds
is interpreted as a
POSIX timestamp.
This supports queries using both relative and absolute timestamps to better support a wide range of use cases. For example, if I have a task that I know will typically take N seconds, and I want an M second safety margin:
>>> num_secs_allowed = N + M
>>> tc = TransferClient(...)
>>> reqs_doc = tc.endpoint_get_activation_requirements(...)
>>> if not reqs_doc.active_until(num_secs_allowed):
>>> raise Exception("Endpoint won't be active long enough")
>>> ...
or, alternatively, if I know that the endpoint must be active until October 18th, 2016 for my tasks to complete:
>>> oct18_2016 = 1476803436
>>> tc = TransferClient(...)
>>> reqs_doc = tc.endpoint_get_activation_requirements(...)
>>> if not reqs_doc.active_until(oct18_2016, relative_time=False):
>>> raise Exception("Endpoint won't be active long enough")
>>> ...
Parameters
time_seconds
- Integer number of seconds into the future.
relative_time
- Defaults to True. When False,
time_seconds
is treated as a POSIX timestamp (i.e. seconds since epoch as an integer) instead of its ordinary behavior.
Return type: | bool |
---|
always_activated
¶Returns True if the endpoint activation never expires (e.g. shared endpoints, globus connect personal endpoints).
Return type: | bool |
---|
supports_auto_activation
¶Check if the document lists Auto-Activation as an available type of activation. Typically good to use when you need to catch endpoints that require web activation before proceeding.
>>> endpoint_id = "..."
>>> tc = TransferClient(...)
>>> reqs_doc = tc.endpoint_get_activation_requirements(endpoint_id)
>>> if not reqs_doc.supports_auto_activation:
>>> # use `from __future__ import print_function` in py2
>>> print(("This endpoint requires web activation. "
>>> "Please login and activate the endpoint here:\n"
>>> "https://www.globus.org/app/endpoints/{}/activate")
>>> .format(endpoint_id), file=sys.stderr)
>>> # py3 calls it `input()` in py2, use `raw_input()`
>>> input("Please Hit Enter When You Are Done")
Return type: | bool |
---|
supports_web_activation
¶Check if the document lists known types of activation that can be done
through the web. If this returns False
, it means that the endpoint
is of a highly unusual type, and you should directly inspect the
response’s data
attribute to see what is required. Sending users to
the web page for activation is also a fairly safe action to take.
Note that ActivationRequirementsResponse.supports_auto_activation
directly implies
ActivationRequirementsResponse.supports_web_activation
, so these
are not exclusive.
For example,
>>> tc = TransferClient(...)
>>> reqs_doc = tc.endpoint_get_activation_requirements(...)
>>> if not reqs_doc.supports_web_activation:
>>> # use `from __future__ import print_function` in py2
>>> print("Highly unusual endpoint. " +
>>> "Cannot webactivate. Raw doc: " +
>>> str(reqs_doc), file=sys.stderr)
>>> print("Sending user to web anyway, just in case.",
>>> file=sys.stderr)
>>> ...
Return type: | bool |
---|
The PaginatedResource
class should not typically be instantiated directly,
but is returned from several TransferClient
methods.
It is an iterable of GlobusRepsonse
objects.
globus_sdk.transfer.paging.
PaginatedResource
(client_method, path, client_kwargs, num_results=None, max_results_per_call=1000, max_total_results=None, offset=0, paging_style=0)[source]¶Bases: globus_sdk.response.GlobusResponse
, six.Iterator
A PaginatedResource
is an iterable response which implements the Python
iterator interface. As such, you can only iterate over
PaginatedResources once. Future iterations will be empty.
If you need fresh results, make a call for a new PaginatedResource
, and
if you want to cache and reuse results, convert to a list or other
structure. You may also want to read the docs on the data
property.
Because paginated data can be large, you will tend to get the best performance by being sure to only iterate over the results once.
data
¶To get the “data” on a PaginatedResource, fetch all pages and convert them into the only python data structure that makes sense: a list.
Note that this forces iteration/evaluation of all pages from the API.
It therefore may cause singificant IO spikes when used. You should
avoid using the PaginatedResource.data
property whenever possible.
globus_sdk.auth.token_response.
OAuthTokenResponse
(*args, **kwargs)[source]¶Bases: globus_sdk.response.GlobusHTTPResponse
Class for responses from the OAuth2 code for tokens exchange used in 3-legged OAuth flows.
by_resource_server
¶Representation of the token response in a dict
indexed by resource
server.
Although OAuthTokenResponse.data
is still available and
valid, this representation is typically more desirable for applications
doing inspection of access tokens and refresh tokens.
globus_sdk.auth.token_response.
OAuthDependentTokenResponse
(*args, **kwargs)[source]¶Bases: globus_sdk.auth.token_response.OAuthTokenResponse
Class for responses from the OAuth2 code for tokens retrieved by the
OAuth2 Dependent Token Extension Grant. For more complete docs, see
oauth2_get_dependent_tokens
All Globus SDK errors inherit from GlobusError
, and all SDK error classes
are importable from globus_sdk
.
You can therefore capture all errors thrown by the SDK by looking for
GlobusError
, as in:
import logging
from globus_sdk import TransferClient, GlobusError
try:
tc = TransferClient()
# search with no parameters will throw an exception
eps = tc.endpoint_search()
except exc.GlobusError:
logging.exception("Globus Error!")
raise
In most cases, it’s best to look for specific subclasses of GlobusError
.
For example, to write code which is distinguishes between network failures and
unexpected API conditions, you’ll want to look for NetworkError
and
GlobusAPIError
:
import logging
from globus_sdk import (TransferClient,
GlobusError, GlobusAPIError, NetworkError)
try:
tc = TransferClient()
eps = tc.endpoint_search(filter_fulltext="myendpointsearch")
for ep in eps:
print(ep["display_name"])
...
except GlobusAPIError as e:
# Error response from the REST service, check the code and message for
# details.
logging.error(("Got a Globus API Error\n"
"Error Code: {}\n"
"Error Message: {}").format(e.code, e.message))
raise e
except NetworkError:
logging.error(("Network Failure. "
"Possibly a firewall or connectivity issue"))
raise
except GlobusError:
logging.exception("Totally unexpected GlobusError!")
raise
else:
...
Of course, if you want to learn more information about the response, you should
inspect it more than this.
Malformed calls to Globus SDK methods may raise standard python exceptions
(ValueError
, etc.), but for correct usage, all errors will be instances of
GlobusError
.
globus_sdk.exc.
GlobusError
[source]¶Bases: exceptions.Exception
Root of the Globus Exception hierarchy. Stub class.
globus_sdk.exc.
GlobusAPIError
(r, *args, **kw)[source]¶Bases: globus_sdk.exc.GlobusError
Wraps errors returned by a REST API.
Variables: |
|
---|
raw_json
¶Get the verbatim error message received from a Globus API, interpreted as a JSON string and evaluated as a dict
If the body cannot be loaded as JSON, this is None
raw_text
¶Get the verbatim error message receved from a Globus API as a string
globus_sdk.exc.
NetworkError
(msg, exc, *args, **kw)[source]¶Bases: globus_sdk.exc.GlobusError
Error communicating with the REST API server.
Holds onto original exception data, but also takes a message to explain potentially confusing or inconsistent exceptions passed to us
globus_sdk.exc.
GlobusConnectionError
(msg, exc, *args, **kw)[source]¶Bases: globus_sdk.exc.NetworkError
A connection error occured while making a REST request.
globus_sdk.exc.
GlobusTimeoutError
(msg, exc, *args, **kw)[source]¶Bases: globus_sdk.exc.NetworkError
The REST request timed out.
Globus offers Authentication and Authorization services through an OAuth2 service, Globus Auth.
Globus Auth acts as an Authorization Server, and allows users to authenticate with, and link together, identities from a wide range of Identity Providers.
Although the AuthClient
class documentation
covers normal interactions with Globus Auth, the OAuth2 flows are significantly
more complex.
This section documents the supported types of authentication and how to carry them out, as well as providing some necessary background on various OAuth2 elements.
Credentials are for Users and also for Applications
It is very important that our goal in OAuth2 is not to get credentials for an application on its own, but rather for the application as a client to Globus which is acting on behalf of a user.
Therefore, if you are writing an application called foo, and a user bar@example.com is using foo, the credentials produced belong to the combination of foo and bar@example.com. The resulting credentials represent the rights and permission for foo to perform actions for bar@example.com on systems authenticated via Globus.
OAuth2 Documentation
If you want to get started doing OAuth2 flows, you should read the tutorial and look at the examples.
These objects represent in-progress OAuth2 authentication flows.
Most typically, you should not use these objects, but rather rely on the
globus_sdk.AuthClient
object to manage one of these for you through
its oauth2_*
methods.
All Flow Managers inherit from the
GlobusOAuthFlowManager
abstract class.
They are a combination of a store for OAuth2 parameters specific to the
authentication method you are using and methods which act upon those parameters.
globus_sdk.auth.
GlobusNativeAppFlowManager
(auth_client, requested_scopes=None, redirect_uri=None, state='_default', verifier=None, refresh_tokens=False, prefill_named_grant=None)[source]¶Bases: globus_sdk.auth.oauth2_flow_manager.GlobusOAuthFlowManager
This is the OAuth flow designated for use by clients wishing to authenticate users in the absence of a Client Secret. Because these applications run “natively” in the user’s environment, they cannot protect a secret. Instead, a temporary secret is generated solely for this authentication attempt.
Parameters
auth_client
(AuthClient)- The
NativeAppAuthClient
object on which this flow is based. It is used to extract default values for the flow, and also to make calls to the Auth service. This SHOULD be aNativeAppAuthClient
requested_scopes
(iterable or string)- The scopes on the token(s) being requested, as a space-separated string or iterable of strings. Defaults to
openid profile email urn:globus:auth:scope:transfer.api.globus.org:all
redirect_uri
(string)- The page that users should be directed to after authenticating at the authorize URL. Defaults to ‘https://auth.globus.org/v2/web/auth-code‘, which displays the resulting
auth_code
for users to copy-paste back into your application (and thereby be passed back to theGlobusNativeAppFlowManager
)state
(string)- Typically is not meaningful in the Native App Grant flow, but you may have a specialized use case for it. The
redirect_uri
page will have this included in a query parameter, so you can use it to pass information to that page. It defaults to the string ‘_default’verifier
(string)- A secret used for the Native App flow. It will by default be a freshly generated random string, known only to this
GlobusNativeAppFlowManager
instancerefresh_tokens
(bool)- When True, request refresh tokens in addition to access tokens
prefill_named_grant
(string)- Optionally prefill the named grant label on the consent page
exchange_code_for_tokens
(auth_code)[source]¶The second step of the Native App flow, exchange an authorization code for access tokens (and refresh tokens if specified).
Return type: | OAuthTokenResponse |
---|
Start a Native App flow by getting the authorization URL to which users should be sent.
Parameters
additional_params
(dict)- A
dict
orNone
, which specifies additional query parameters to include in the authorize URL. Primarily for internal use
Return type: | string |
---|
The returned URL string is encoded to be suitable to display to users
in a link or to copy into their browser. Users will be redirected
either to your provided redirect_uri
or to the default location,
with the auth_code
embedded in a query parameter.
globus_sdk.auth.
GlobusAuthorizationCodeFlowManager
(auth_client, redirect_uri, requested_scopes=None, state='_default', refresh_tokens=False)[source]¶Bases: globus_sdk.auth.oauth2_flow_manager.GlobusOAuthFlowManager
This is the OAuth flow designated for use by Clients wishing to authenticate users in a web application backed by a server-side component (e.g. an API). The key constraint is that there is a server-side system that can keep a Client Secret without exposing it to the web client. For example, a Django application can rely on the webserver to own the secret, so long as it doesn’t embed it in any of the pages it generates.
The application sends the user to get a temporary credential (an
auth_code
) associated with its Client ID. It then exchanges that
temporary credential for a token, protecting the exchange with its Client
Secret (to prove that it really is the application that the user just
authorized).
Parameters
auth_client
(ConfidentialAppAuthClient)- The
AuthClient
used to extract default values for the flow, and also to make calls to the Auth service. It MUST be aConfidentialAppAuthClient
redirect_uri
(string)- The page that users should be directed to after authenticating at the authorize URL. Required.
requested_scopes
(iterable or string)- The scopes on the token(s) being requested, as a space-separated string or an iterable of strings. Defaults to
openid profile email urn:globus:auth:scope:transfer.api.globus.org:all
state
(string)- This is a way of your application passing information back to itself in the course of the OAuth flow. Because the user will navigate away from your application to complete the flow, this parameter lets you pass an arbitrary string from the starting page to the
redirect_uri
refresh_tokens
(bool)- When True, request refresh tokens in addition to access tokens
exchange_code_for_tokens
(auth_code)[source]¶The second step of the Authorization Code flow, exchange an authorization code for access tokens (and refresh tokens if specified)
Return type: | OAuthTokenResponse |
---|
Start a Authorization Code flow by getting the authorization URL to which users should be sent.
Parameters
additional_params
(dict)- A
dict
orNone
, which specifies additional query parameters to include in the authorize URL. Primarily for internal use
Return type: | string |
---|
The returned URL string is encoded to be suitable to display to users
in a link or to copy into their browser. Users will be redirected
either to your provided redirect_uri
or to the default location,
with the auth_code
embedded in a query parameter.
What are Resource Servers, and how do they interact with scopes?
If you look at a OAuthTokenResponse
, you will notice
that it organizes information under Resource Servers, including one access
token (and optionally one refresh token) per Resource Server.
This can appear confusing, especially as the Resource Servers in this response
do not map one-to-one onto the scopes that your application requested.
This is a brief description Resource Servers to make sense of this response.
Resource Servers are just the OAuth2 name for services which use scopes on tokens to control access to their resources.
When you request tokens, you do so with a set of scopes.
Our default set consists of
openid profile email urn:globus:auth:scope:transfer.api.globus.org:all
.
That means you can get OpenID Connect data in general, profile data, email
address, and access to Globus Transfer resources (in that order).
However, for those four scopes, there aren’t four distinct services – there
are only two.
openid
, profile
, and email
all correspond to the service at
auth.globus.org
(Globus Auth) while
urn:globus:auth:scope:transfer.api.globus.org:all
corresponds to
transfer.api.globus.org
(Globus Transfer).
As a result, we don’t get four tokens for our four scopes – we get two tokens,
one for the first three scopes, and one for the last scope.
Those tokens can be organized better by their relevant Resource Server than by
their scope names, which is why we use the token_response.by_resource_server
description.
The reason for separate tokens at all (as opposed to one token with all four scopes) is to limit the exposure of tokens for different services.
As a motivating example, consider a new service registered as Resource Server
in Globus belonging to another organization – serv.example.com
.
serv.example.com
should not see tokens scoped for Globus Transfer, and
Globus Transfer shouldn’t see tokens scoped for serv.example.com
.
Using a single token for all Resource Servers would make isolating services in this way impossible.
Authorizing calls against Globus can be a complex process. In particular, if you are using Refresh Tokens and short-lived Access Tokens, you may need to take particular care managing your Authorization state.
Within the SDK, we solve this problem by using GlobusAuthorizers
, which are attached to clients.
These are a very simple class of generic objects which define a way of getting
an up-to-date Authorization
header, and trying to handle a 401 (if that
header is expired).
Whenever using the Service Clients, you should be passing in an authorizer when you create a new client unless otherwise specified.
The type of authorizer you will use depends very much on your application, but if you want examples you should look at the examples section. It may help to start with the examples and come back to the full documentation afterwards.
We define the interface for GlobusAuthorizer
objects in terms of an
Abstract Base Class:
A GlobusAuthorizer
is a very simple object which generates valid
Authorization headers.
It may also have handling for responses that indicate that it has provided
an invalid Authorization header.
Takes a dict of headers, and adds to it a mapping of
{"Authorization": "..."}
per this object’s type of Authorization.
Importantly, if an Authorization
header is already set, this method
is expected to overwrite it.
This operation should be called if a request is made with an
Authorization header generated by this object which returns a 401
(HTTP Unauthorized).
If the GlobusAuthorizer
thinks that it can take some action to
remedy this, it should update its state and return True
.
If the Authorizer cannot do anything in the event of a 401, this may
update state, but importantly returns False
.
By default, this always returns False
and takes no other action.
GlobusAuthorizer
objects that fetch new access tokens when their existing
ones expire or a 401 is received implement the RenewingAuthorizer class
Bases: globus_sdk.authorizers.base.GlobusAuthorizer
A RenewingAuthorizer
is an abstract superclass to any authorizer
that needs to get new Access Tokens in order to form Authorization headers.
It may be passed an initial Access Token, but if so must also be passed an expires_at value for that token.
It provides methods that handle the logic for checking and adjusting expiration time, callbacks on renewal, and 401 handling.
To make an authorizer that implements this class implement the _get_token_response and _extract_token_data methods for that authorization type,
Checks to see if a new access token is needed.
Once that’s done, sets the Authorization
header to
“Bearer <access_token>”
The renewing authorizer can respond to a service 401 by immediately
invalidating its current Access Token. When this happens, the next call
to set_authorization_header()
will result in a new Access Token
being fetched.
All of these types of authorizers can be imported from
globus_sdk.authorizers
.
globus_sdk.
NullAuthorizer
[source]¶Bases: globus_sdk.authorizers.base.GlobusAuthorizer
This Authorizer implements No Authentication – as in, it ensures that there is no Authorization header.
Removes the Authorization header from the given header dict if one was present.
globus_sdk.
BasicAuthorizer
(username, password)[source]¶Bases: globus_sdk.authorizers.base.GlobusAuthorizer
This Authorizer implements Basic Authentication. Given a “username” and “password”, they are sent base64 encoded in the header.
Parameters
username
(string)- Username component for Basic Auth
password
(string)- Password component for Basic Auth
Sets the Authorization
header to
“Basic <base64 encoded username:password>”
globus_sdk.
AccessTokenAuthorizer
(access_token)[source]¶Bases: globus_sdk.authorizers.base.GlobusAuthorizer
Implements Authorization using a single Access Token with no Refresh Tokens. This is sent as a Bearer token in the header – basically unadorned.
Parameters
access_token
(string)- An access token for Globus Auth
Sets the Authorization
header to
“Bearer <access_token>”
globus_sdk.
RefreshTokenAuthorizer
(refresh_token, auth_client, access_token=None, expires_at=None, on_refresh=None)[source]¶Bases: globus_sdk.authorizers.renewing.RenewingAuthorizer
Implements Authorization using a Refresh Token to periodically fetch
renewed Access Tokens. It may be initialized with an Access Token, or it
will fetch one the first time that set_authorization_header()
is
called.
Example usage looks something like this:
>>> import globus_sdk
>>> auth_client = globus_sdk.AuthClient(client_id=..., client_secret=...)
>>> # do some flow to get a refresh token from auth_client
>>> rt_authorizer = globus_sdk.RefreshTokenAuthorizer(
>>> refresh_token, auth_client)
>>> # create a new client
>>> transfer_client = globus_sdk.TransferClient(authorizer=rt_authorizer)
anything that inherits from BaseClient
, so
at least TransferClient
and AuthClient
will automatically handle
usage of the RefreshTokenAuthorizer
.
Parameters
refresh_token
(string)- Refresh Token for Globus Auth
auth_client
(AuthClient
)AuthClient
capable of using therefresh_token
access_token
(string)- Initial Access Token to use, only used if
expires_at
is also setexpires_at
(int)- Expiration time for the starting
access_token
expressed as a POSIX timestamp (i.e. seconds since the epoch)
on_refresh
(callable) Will be called as fn(token_data) any time this authorizer fetches a new access_token
globus_sdk.
ClientCredentialsAuthorizer
(confidential_client, scopes, access_token=None, expires_at=None, on_refresh=None)[source]¶Bases: globus_sdk.authorizers.renewing.RenewingAuthorizer
Implementation of a RenewingAuthorizer that renews confidential app client Access Tokens using a ConfidentialAppAuthClient and a set of scopes to fetch a new Access Token when the old one expires.
Example usage looks something like this:
>>> import globus_sdk
>>> confidential_client = globus_sdk.ConfidentiallAppAuthClient(
client_id=..., client_secret=..., scopes=...)
>>> cc_authorizer = globus_sdk.ClientCredentialsAuthorizer(
>>> confidential_client)
>>> # create a new client
>>> transfer_client = globus_sdk.TransferClient(authorizer=cc_authorizer)
any client that inherits from BaseClient
should be able to use a ClientCredentialsAuthorizer to act as
the client itself.
Parameters
confidential_client
(ConfidentialAppAuthClient
)ConfidentialAppAuthClient
with a valid id and client secretscopes
(string)- A string of space-separated scope names being requested for the access tokens that will be used for the Authorization header. These scopes must all be for the same resource server, or else the token response will have multiple access tokens.
access_token
(string)- Initial Access Token to use, only used if
expires_at
is also set. Must be requested with the same set of scopes passed to this authorizer.expires_at
(int)- Expiration time for the starting
access_token
expressed as a POSIX timestamp (i.e. seconds since the epoch)on_refresh
(callable)- Will be called as fn(token_data) any time this authorizer fetches a new access_token
There are three standard, canonical locations from which the Globus SDK will attempt to load configuration.
There are two config file locations:
/etc/globus.cfg # system config, shared by all users
~/.globus.cfg # personal config, specific to your user
additionally, the shell environment variables loaded into Python’s os.environ will be searched for configuration.
The precedence rules are very simply
~/.globus.cfg
/etc/globus.cfg
Config files are INI formatted, so they take the general form
[SectionName]
key1 = value1
key2 = value2
At present, there are no configuration parameters which you should set in config files.
The Globus CLI uses the [cli]
section to store configuration information.
GLOBUS_SDK_ENVIRONMENT
is a shell variable that can be used to point the
SDK to an alternate set of Globus Servers.
We currently have plans to create a beta environment that you can use with
GLOBUS_SDK_ENVIRONMENT=beta
to get a developer preview of upcoming
features, but this is not available yet. For now, this variable should be left
unset.
The Globus SDK uses python DeprecationWarning
and
PendingDeprecationWarning
classes to indicate deprecated and soon-to-be
deprecated behaviors. In order to see these warnings, run python with the
flags:
python -Wonce::DeprecationWarning \
-Wonce::PendingDeprecationWarning
Note: The -W
flag must precede any module you are passing to python
,
or it will be fed into sys.argv
inside of the module.
In order to maintain portability while supporting a robust feature set, certain
features of the Globus SDK rely upon optional dependencies.
These dependencies are python packages which are not required by the SDK, but
are required by specific features.
If you attempt to use such a feature without installing the relevant
dependency, you will get a GlobusOptionalDependencyError
.
Optional dependencies are also made available via these extras, specified as
part of your dependency on the globus_sdk
package:
globus_sdk[jwt]
If you need to specify a version of globus_sdk
while installing the jwt
extra, simply specify it like so: globus_sdk[jwt]==1.0.0
The OAuthTokenResponse
may include an ID token
conforming to the Open ID Connect specification.
If you wish to decode this token via decode_id_token
, you must
install globus_sdk[jwt]
. This extra target includes dependencies which we
use to implement ID Token verification.
Each of these pages contains an example of a piece of SDK functionality.
Using a GlobusAuthorizer
is hard to grasp without a few examples to reference.
The basic usage should be to create these at client instantiation time.
Perhaps you’re in a part of your application that only sees Access Tokens. Access Tokens are used to directly authenticate calls against Globus APIs, and are limited-lifetime credentials. You have distinct Access Tokens for each Globus service which you want to access.
With the tokens in hand, it’s just a simple matter of wrapping the tokens in
AccessTokenAuthorizer
objects.
from globus_sdk import AuthClient, TransferClient, AccessTokenAuthorizer
AUTH_ACCESS_TOKEN = '...'
TRANSFER_ACCESS_TOKEN = '...'
# note that we don't provide the client ID in this case
# if you're using an Access Token you can't do the OAuth2 flows
auth_client = AuthClient(
authorizer=AccessTokenAuthorizer(AUTH_ACCESS_TOKEN))
transfer_client = TransferClient(
authorizer=AccessTokenAuthorizer(TRANSFER_ACCESS_TOKEN))
Refresh Tokens are long-lived credentials used to get new Access Tokens whenever they expire. However, it would be very awkward to create a new client instance every time your credentials expire!
Instead, use a RefreshTokenAuthorizer
to automatically re-up your credentials
whenever they near expiration.
Re-upping credentials is an operation that requires having client credentials for Globus Auth, so creating the authorizer is more complex this time.
from globus_sdk import (AuthClient, TransferClient, ConfidentialAppAuthClient,
RefreshTokenAuthorizer)
# for doing the refresh
CLIENT_ID = '...'
CLIENT_SECRET = '...'
# the actual tokens
AUTH_REFRESH_TOKEN = '...'
TRANSFER_REFRESH_TOKEN = '...'
# making the authorizer requires that we have an AuthClient which can talk
# OAuth2 to Globus Auth
internal_auth_client = ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
# now let's bake a couple of authorizers
auth_authorizer = RefreshTokenAuthorizer(AUTH_REFRESH_TOKEN,
internal_auth_client)
transfer_authorizer = RefreshTokenAuthorizer(TRANSFER_REFRESH_TOKEN,
internal_auth_client)
# auth_client here is totally different from "internal_auth_client" above
# the former is being used to request new tokens periodically, while this
# one represents a user authenticated with those tokens
auth_client = AuthClient(authorizer=auth_authorizer)
# transfer_client doesn't have to contend with this duality -- it's always
# representing a user
transfer_client = TransferClient(authorizer=transfer_authorizer)
If you’re using an AuthClient
to do OAuth2
flows, you likely want to authenticate it using your client credentials – the
client ID and client secret.
The preferred method is to use the AuthClient
subclass which automatically
specifies its authorizer.
Internally, this will use a BasicAuthorizer
to do Basic Authentication.
By way of example:
from globus_sdk import ConfidentialAppAuthClient
CLIENT_ID = '...'
CLIENT_SECRET = '...'
client = ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
and you’re off to the races!
Under the hood, this is implicitly running
AuthClient(authorizer=BasicAuthorizer(CLIENT_ID, CLIENT_SECRET))
but don’t do this yourself – ConfidentialAppAuthClient
has different
methods from the base AuthClient
.
This is an example of the use of the Globus SDK to carry out an OAuth2 Native App Authentication flow.
The goal here is to have a user authenticate in Globus Auth, and for the SDK to procure tokens which may be used to authenticate SDK calls against various services for that user.
In order to complete an OAuth2 flow to get tokens, you must have a client definition registered with Globus Auth. To do so, follow the relevant documentation for the Globus Auth Service or go directly to developers.globus.org to do the registration.
Make sure, when registering your application, that you enter
https://auth.globus.org/v2/web/auth-code
into the “Redirect URIs” field.
This is necessary to leverage the default behavior of the SDK, and is typically
sufficient for this type of application.
If you want to copy-paste an example, you’ll need at least a client_id
for
your AuthClient
object.
You should also specifically use the NativeAppAuthClient
type of AuthClient
, as it has been
customized to handle this flow.
The shortest version of the flow looks like this:
import globus_sdk
# you must have a client ID
CLIENT_ID = '...'
client = globus_sdk.NativeAppAuthClient(CLIENT_ID)
client.oauth2_start_flow()
authorize_url = client.oauth2_get_authorize_url()
print('Please go to this URL and login: {0}'.format(authorize_url))
# or just input() on python3
auth_code = raw_input(
'Please enter the code you get after login here: ').strip()
token_response = client.oauth2_exchange_code_for_tokens(auth_code)
# the useful values that you want at the end of this
globus_auth_data = token_response.by_resource_server['auth.globus.org']
globus_transfer_data = token_response.by_resource_server['transfer.api.globus.org']
globus_auth_token = globus_auth_data['access_token']
globus_transfer_token = globus_transfer_data['access_token']
The flow above will give you access tokens (short-lived credentials), good for one-off operations. However, if you want a persistent credential to access the logged-in user’s Globus resources, you need to request a long-lived credential called a Refresh Token.
refresh_tokens
is a boolean option to the oauth2_start_flow
method.
When False, the flow will terminate with a collection of Access Tokens, which
are simple limited lifetime credentials for accessing services. When True, the
flow will terminate not only with the Access Tokens, but additionally with a
set of Refresh Tokens which can be used indefinitely to request new Access
Tokens. The default is False.
Simply add this option to the example above:
client.oauth2_start_flow(refresh_tokens=True)
This is an example of the use of the Globus SDK to carry out an OAuth2 Client Credentials Authentication flow.
The goal here is to have an application authenticate in Globus Auth directly, as itself. Unlike many other OAuth2 flows, the application does not act on behalf of a user, but on its own behalf.
This flow is suitable for automated cases in which an application, even one as
simple as a cron
job, makes use of Globus outside of the context of a
specific end-user interaction.
In order to complete an OAuth2 flow to get tokens, you must have a client definition registered with Globus Auth. To do so, follow the relevant documentation for the Globus Auth Service or go directly to developers.globus.org to do the registration.
During registration, make sure that the “Native App” checkbox is unchecked.
You will typically want your scopes to be openid
, profile
, email
,
and urn:globus:auth:scope:transfer.api.globus.org:all
.
Once your client is created, expand it on the Projects page and click “Generate Secret”. Save the secret in a secure location accessible from your code.
You should specifically use the ConfidentialAppAuthClient
type of AuthClient
, as it has been
customized to handle this flow.
The shortest version of the flow looks like this:
import globus_sdk
# you must have a client ID
CLIENT_ID = '...'
# the secret, loaded from wherever you store it
CLIENT_SECRET = '...'
client = globus_sdk.ConfidentialAppAuthClient(CLIENT_ID, CLIENT_SECRET)
token_response = client.oauth2_client_credentials_tokens()
# the useful values that you want at the end of this
globus_auth_data = token_response.by_resource_server['auth.globus.org']
globus_transfer_data = token_response.by_resource_server['transfer.api.globus.org']
globus_auth_token = globus_auth_data['access_token']
globus_transfer_token = globus_transfer_data['access_token']
The Client Credentials Grant will only produce Access Tokens, not Refresh
Tokens, so you should pass its results directly to the AccessTokenAuthorizer
.
For example, after running the code above,
authorizer = globus_sdk.AccessTokenAuthorizer(globus_transfer_token)
tc = globus_sdk.TransferClient(authorizer=authorizer)
print("Endpoints Belonging to {}@clients.auth.globus.org:"
.format(CLIENT_ID))
for ep in tc.endpoint_search(filter_scope="my-endpoints"):
print("[{}] {}".format(ep["id"], ep["display_name"]))
Note that we’re doing a search for “my endpoints”, but we refer to the results
as belonging to <CLIENT_ID>@clients.auth.globus.org
. The “current user” is
not any human user, but the client itself.
When you get access tokens, you also get their expiration time in seconds.
You can inspect the globus_transfer_data
and globus_auth_data
structures in the example to see.
Tokens should have a long enough lifetime for any short-running operations (less than a day).
When your tokens are expired, you should just request new ones by making another Client Credentials request. Depending on your needs, you may need to track the expiration times along with your tokens. The SDK does not offer any special facilities for doing this.
This type of authorization is used for web login with a server-side application. For example, a Django app or other application server handles requests.
This example uses Flask, but should be easily portable to other application frameworks.
There are two components to this application: login and logout.
Login sends a user to Globus Auth to get credentials, and then may act on the user’s behalf. Logout invalidates server-side credentials, so that the application may no longer take actions for the user, and the client-side session, allowing for a fresh login if desired.
In order to complete an OAuth2 flow to get tokens, you must have a client definition registered with Globus Auth. To do so, follow the relevant documentation for the Globus Auth Service or go directly to developers.globus.org to do the registration.
Make sure that the “Native App” checkbox is unchecked, and list
http://localhost:5000/login
in the “Redirect URIs”.
Set the Scopes to openid
, profile
, email
,
urn:globus:auth:scope:transfer.api.globus.org:all
.
On the projects page, expand the client description and click “Generate
Secret”.
Save the resulting secret a file named example_app.conf
, along with the client ID:
SERVER_NAME = 'localhost:5000'
# this is the session secret, used to protect the Flask session. You should
# use a longer secret string known only to your application
# details are beyond the scope of this example
SECRET_KEY = 'abc123!'
APP_CLIENT_ID = '<CLIENT_ID>'
APP_CLIENT_SECRET = '<CLIENT_SECRET>'
Let’s add login functionality to the end of example_app.py
, along with a
basic index page:
@app.route('/')
def index():
"""
This could be any page you like, rendered by Flask.
For this simple example, it will either redirect you to login, or print
a simple message.
"""
if not session.get('is_authenticated'):
return redirect(url_for('login'))
return "You are successfully logged in!"
@app.route('/login')
def login():
"""
Login via Globus Auth.
May be invoked in one of two scenarios:
1. Login is starting, no state in Globus Auth yet
2. Returning to application during login, already have short-lived
code from Globus Auth to exchange for tokens, encoded in a query
param
"""
# the redirect URI, as a complete URI (not relative path)
redirect_uri = url_for('login', _external=True)
client = load_app_client()
client.oauth2_start_flow(redirect_uri)
# If there's no "code" query string parameter, we're in this route
# starting a Globus Auth login flow.
# Redirect out to Globus Auth
if 'code' not in request.args:
auth_uri = client.oauth2_get_authorize_url()
return redirect(auth_uri)
# If we do have a "code" param, we're coming back from Globus Auth
# and can start the process of exchanging an auth code for a token.
else:
code = request.args.get('code')
tokens = client.oauth2_exchange_code_for_tokens(code)
# store the resulting tokens in the session
session.update(
tokens=tokens.by_resource_server,
is_authenticated=True
)
return redirect(url_for('index'))
Logout is very simple – it’s just a matter of cleaning up the session. It does the added work of cleaning up any tokens you fetched by invalidating them in Globus Auth beforehand:
@app.route('/logout')
def logout():
"""
- Revoke the tokens with Globus Auth.
- Destroy the session state.
- Redirect the user to the Globus Auth logout page.
"""
client = load_app_client()
# Revoke the tokens with Globus Auth
for token in (token_info['access_token']
for token_info in session['tokens'].values()):
client.oauth2_revoke_token(token)
# Destroy the session state
session.clear()
# the return redirection location to give to Globus AUth
redirect_uri = url_for('index', _external=True)
# build the logout URI with query params
# there is no tool to help build this (yet!)
globus_logout_url = (
'https://auth.globus.org/v2/web/logout' +
'?client={}'.format(app.config['PORTAL_CLIENT_ID']) +
'&redirect_uri={}'.format(redirect_uri) +
'&redirect_name=Globus Example App')
# Redirect the user to the Globus Auth logout page
return redirect(globus_logout_url)
Using the tokens thus acquired is a simple matter of pulling them out of the
session and putting one into an AccessTokenAuthorizer
.
For example, one might do the following:
authorizer = globus_sdk.AccessTokenAuthorizer(
session['tokens']['transfer.api.globus.org']['access_token'])
transfer_client = globus_sdk.TransferClient(authorizer=authorizer)
print("Endpoints belonging to the current logged-in user:")
for ep in transfer_client.endpoint_search(filter_scope="my-endpoints"):
print("[{}] {}".format(ep["id"], ep["display_name"]))
This is a collection of examples of advanced usage patterns leveraging the
TransferClient
.
One of the lesser-known features of the Globus Transfer service is the ability
for users to set a deadline
by which a Transfer or Delete task must
complete. If the task is still in progress when the deadline
is reached,
it is aborted.
You can use this, for example, to enforce that a Transfer Task which takes too long results in errors (even if it is making slow progress).
Because the deadline
is accepted as an ISO 8601 date, you can use python’s
built-in datetime
library to compute a timestamp to pass to the service.
Start out by computing the current time as a datetime
:
import datetime
now = datetime.datetime.utcnow()
Then, compute a relative timestamp using timedelta
:
future_1minute = now + datetime.timedelta(minutes=1)
This value can be passed to a TransferData
,
as in
import globus_sdk
# get various components needed for a Transfer Task
# beyond the scope of this example
transfer_client = globus_sdk.TransferClient(...)
source_endpoint_uuid = ...
dest_endpoint_uuid = ...
# note how `future_1minute` is used here
submission_data = globus_sdk.TransferData(
transfer_client, source_endpoint_uuid, dest_endpoint_uuid,
deadline=str(future_1minute))
Globus Transfer and Delete Tasks are often scheduled and submitted by automated systems and scripts. In these scenarios, it’s often desirable to retry submission in the event of network or service errors to ensure that the job is really submitted.
There are two key pieces to doing this correctly: Once and Only Once Submission, and logging captured errors.
For once-and-only-once task submission, you can explicitly invoke
TransferClient.get_submission_id()
, which is a unique ID used to
ensure exactly this. However, TransferData
and
DeleteData
both implicitly invoke this method if they
are initialized without an explicit submission_id
.
For proper logging, we’ll rely on the standard library logging
package.
In this example, we’ll retry task submission 5 times, and we’ll want to separate retry logic from the core task submission logic.
import logging
from globus_sdk import GlobusAPIError, NetworkError
# putting logger objects named by the module name into the module-level
# scope is a common best practice -- for more details, you should look
# into the python logging documentation
logger = logging.getLogger(__name__)
def retry_globus_function(func, retries=5, func_name='<func>'):
"""
Define what it means to retry a "Globus Function", some function or
method which produces Globus SDK errors on failure.
"""
def actually_retry():
"""
Helper: run the next retry
"""
return retry_globus_function(func, retries=(retries - 1),
func_name=func_name)
def check_for_reraise():
"""
Helper: check if we should reraise an error
logs an error message on reraise
must be run inside an exception handler
"""
if retries < 1:
logger.error('Retried {} too many times.'
.format(func_name))
raise
try:
return func()
except NetworkError:
# log with exc_info=True to capture a full stacktrace as a
# debug-level log
logger.debug(('Globus func {} experienced a network error'
.format(func_name)), exc_info=True)
check_for_reraise()
except GlobusAPIError:
# again, log with exc_info=True to capture a full stacktrace
logger.warn(('Globus func {} experienced a network error'
.format(func_name)), exc_info=True)
check_for_reraise()
# if we reach this point without returning or erroring, retry
return actually_retry()
The above is a fairly generic tool for retrying any function which throws
globus_sdk.NetworkError
and globus_sdk.GlobusAPIError
errors. It is not
even specific to task resubmission, so you could use it against other
retry-safe Globus APIs.
Now, moving on to creating a retry-safe function to put into it, things get a little bit tricky. The retry handler above requires a function which takes no arguments, so we’ll have to define a function dynamically which fits that constraint:
def submit_transfer_with_retries(transfer_client, transfer_data):
# create a function with no arguments, for our retry handler
def locally_bound_func():
return transfer_client.submit_transfer(transfer_data)
return retry_globus_function(locally_bound_func,
func_name='submit_transfer')
Now we’re finally all-set to create a TransferData
and submit it:
from globus_sdk import TransferClient, TransferData
# get various components needed for a Transfer Task
# beyond the scope of this example
transfer_client = TransferClient(...)
source_endpoint_uuid = ...
dest_endpoint_uuid = ...
submission_data = TransferData(
transfer_client, source_endpoint_uuid, dest_endpoint_uuid)
# add any number of items to the submission data
submission_data.add_item('/source/path', 'dest/path')
...
# do it!
submit_transfer_with_retries(transfer_client, submission_data)
The same exact approach can be applied to TransferClient.submit_delete
, and
a wide variety of other SDK methods.
Copyright 2016 University of Chicago
Licensed under the Apache License, Version 2.0 (the “License”); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.