Class ImpersonatedCredentials (1.19.0)

public class ImpersonatedCredentials extends GoogleCredentials implements ServiceAccountSigner, IdTokenProvider

ImpersonatedCredentials allowing credentials issued to a user or service account to impersonate another. The source project using ImpersonatedCredentials must enable the "IAMCredentials" API. Also, the target service account must grant the originating principal the "Service Account Token Creator" IAM role.

Usage:

String credPath = "/path/to/svc_account.json"; ServiceAccountCredentials sourceCredentials = ServiceAccountCredentials .fromStream(new FileInputStream(credPath)); sourceCredentials = (ServiceAccountCredentials) sourceCredentials .createScoped(Arrays.asList("https://www.googleapis.com/auth/iam"));

ImpersonatedCredentials targetCredentials = ImpersonatedCredentials.create(sourceCredentials, "impersonated-account@project.iam.gserviceaccount.com", null, Arrays.asList("https://www.googleapis.com/auth/devstorage.read_only"), 300);

Storage storage_service = StorageOptions.newBuilder().setProjectId("project-id") .setCredentials(targetCredentials).build().getService();

for (Bucket b : storage_service.list().iterateAll()) System.out.println(b);

Inheritance

Object > Credentials > OAuth2Credentials > GoogleCredentials > ImpersonatedCredentials

Static Methods

create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime)

public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime)
Parameters
NameDescription
sourceCredentialsGoogleCredentials

the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.

targetPrincipalString

the service account to impersonate

delegatesList<String>

the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If left unset, sourceCredential must have that role on targetPrincipal.

scopesList<String>

scopes to request during the authorization grant

lifetimeint

number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials#sa-credentials-oauth If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.

Returns
TypeDescription
ImpersonatedCredentials

new credentials

create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory)

public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory)
Parameters
NameDescription
sourceCredentialsGoogleCredentials

the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.

targetPrincipalString

the service account to impersonate

delegatesList<String>

the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.

scopesList<String>

scopes to request during the authorization grant

lifetimeint

number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.

transportFactoryHttpTransportFactory

HTTP transport factory that creates the transport used to get access tokens

Returns
TypeDescription
ImpersonatedCredentials

new credentials

create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId)

public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId)
Parameters
NameDescription
sourceCredentialsGoogleCredentials

the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.

targetPrincipalString

the service account to impersonate

delegatesList<String>

the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.

scopesList<String>

scopes to request during the authorization grant

lifetimeint

number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.

transportFactoryHttpTransportFactory

HTTP transport factory that creates the transport used to get access tokens.

quotaProjectIdString

the project used for quota and billing purposes. Should be null unless the caller wants to use a project different from the one that owns the impersonated credential for billing/quota purposes.

Returns
TypeDescription
ImpersonatedCredentials

new credentials

create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId, String iamEndpointOverride)

public static ImpersonatedCredentials create(GoogleCredentials sourceCredentials, String targetPrincipal, List<String> delegates, List<String> scopes, int lifetime, HttpTransportFactory transportFactory, String quotaProjectId, String iamEndpointOverride)
Parameters
NameDescription
sourceCredentialsGoogleCredentials

the source credential used to acquire the impersonated credentials. It should be either a user account credential or a service account credential.

targetPrincipalString

the service account to impersonate

delegatesList<String>

the chained list of delegates required to grant the final access_token. If set, the sequence of identities must have "Service Account Token Creator" capability granted to the preceding identity. For example, if set to [serviceAccountB, serviceAccountC], the sourceCredential must have the Token Creator role on serviceAccountB. serviceAccountB must have the Token Creator on serviceAccountC. Finally, C must have Token Creator on target_principal. If unset, sourceCredential must have that role on targetPrincipal.

scopesList<String>

scopes to request during the authorization grant

lifetimeint

number of seconds the delegated credential should be valid. By default this value should be at most 3600. However, you can follow these instructions to set up the service account and extend the maximum lifetime to 43200 (12 hours). If the given lifetime is 0, default value 3600 will be used instead when creating the credentials.

transportFactoryHttpTransportFactory

HTTP transport factory that creates the transport used to get access tokens.

quotaProjectIdString

the project used for quota and billing purposes. Should be null unless the caller wants to use a project different from the one that owns the impersonated credential for billing/quota purposes.

iamEndpointOverrideString

The full IAM endpoint override with the target_principal embedded. This is useful when supporting impersonation with regional endpoints.

Returns
TypeDescription
ImpersonatedCredentials

new credentials

newBuilder()

public static ImpersonatedCredentials.Builder newBuilder()
Returns
TypeDescription
ImpersonatedCredentials.Builder

Methods

createScoped(Collection<String> scopes)

public GoogleCredentials createScoped(Collection<String> scopes)

If the credentials support scopes, creates a copy of the identity with the specified scopes; otherwise, returns the same instance.

Parameter
NameDescription
scopesCollection<String>
Returns
TypeDescription
GoogleCredentials
Overrides

createScopedRequired()

public boolean createScopedRequired()

Indicates whether the credentials require scopes to be specified via a call to GoogleCredentials#createScoped before use.

Returns
TypeDescription
boolean
Overrides

createWithCustomCalendar(Calendar calendar)

public ImpersonatedCredentials createWithCustomCalendar(Calendar calendar)

Clones the impersonated credentials with a new calendar.

Parameter
NameDescription
calendarCalendar

the calendar that will be used by the new ImpersonatedCredentials instance when parsing the received expiration time of the refreshed access token

Returns
TypeDescription
ImpersonatedCredentials

the cloned impersonated credentials with the given custom calendar

equals(Object obj)

public boolean equals(Object obj)
Parameter
NameDescription
objObject
Returns
TypeDescription
boolean
Overrides

getAccount()

public String getAccount()

Returns the email field of the serviceAccount that is being impersonated.

Returns
TypeDescription
String

email address of the impersonated service account

getSourceCredentials()

public GoogleCredentials getSourceCredentials()
Returns
TypeDescription
GoogleCredentials

hashCode()

public int hashCode()
Returns
TypeDescription
int
Overrides

idTokenWithAudience(String targetAudience, List<IdTokenProvider.Option> options)

public IdToken idTokenWithAudience(String targetAudience, List<IdTokenProvider.Option> options)

Returns an IdToken for the current Credential.

Parameters
NameDescription
targetAudienceString

the audience field for the issued ID token

optionsList<Option>

credential specific options for for the token. For example, an ID token for an ImpersonatedCredentials can return the email address within the token claims if "ImpersonatedCredentials.INCLUDE_EMAIL" is provided as a list option.
Only one option value is supported: "ImpersonatedCredentials.INCLUDE_EMAIL" If no options are set, the default excludes the "includeEmail" attribute in the API request.

Returns
TypeDescription
IdToken

IdToken object which includes the raw id_token, expiration, and audience

Exceptions
TypeDescription
IOException

if the attempt to get an ID token failed

refreshAccessToken()

public AccessToken refreshAccessToken()

Method to refresh the access token according to the specific type of credentials.

Throws IllegalStateException if not overridden since direct use of OAuth2Credentials is only for temporary or non-refreshing access tokens.

Returns
TypeDescription
AccessToken
Overrides
Exceptions
TypeDescription
IOException

setTransportFactory(HttpTransportFactory httpTransportFactory)

public void setTransportFactory(HttpTransportFactory httpTransportFactory)
Parameter
NameDescription
httpTransportFactoryHttpTransportFactory

sign(byte[] toSign)

public byte[] sign(byte[] toSign)

Signs the provided bytes using the private key associated with the impersonated service account See Also: Blob Signing

Parameter
NameDescription
toSignbyte[]

bytes to sign

Returns
TypeDescription
byte[]

signed bytes

toBuilder()

public ImpersonatedCredentials.Builder toBuilder()
Returns
TypeDescription
ImpersonatedCredentials.Builder
Overrides

toString()

public String toString()
Returns
TypeDescription
String
Overrides