2017-05-11 11:24:06 +02:00
|
|
|
@comment $NetBSD: PLIST,v 1.5 2017/05/11 09:24:06 adam Exp $
|
2014-11-24 15:43:12 +01:00
|
|
|
${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
|
|
|
|
${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
|
|
|
|
${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt
|
|
|
|
${PYSITELIB}/${EGG_INFODIR}/requires.txt
|
|
|
|
${PYSITELIB}/${EGG_INFODIR}/top_level.txt
|
|
|
|
${PYSITELIB}/oauth2client/__init__.py
|
|
|
|
${PYSITELIB}/oauth2client/__init__.pyc
|
|
|
|
${PYSITELIB}/oauth2client/__init__.pyo
|
Update py-oauth2client to 1.5.2.
Needed by py-google-api-python-client-1.4.2.
## v1.5.2
* Add access token refresh error class that includes HTTP status (#310)
* Python3 compatibility fixes for Django (#316, #318)
* Fix incremental auth in flask_util (#322)
* Fall back to credential refresh on EDEADLK in multistore_file (#336)
## v1.5.1
* Fix bad indent in `tools.run_flow()` (#301, bug was
introduced when switching from 2 space indents to 4)
## v1.5.0
* Fix (more like clarify) `bytes` / `str` handling in crypto
methods. (#203, #250, #272)
* Replacing `webapp` with `webapp2` in `oauth2client.appengine` (#217)
* Added optional `state` parameter to
`step1_get_authorize_url`. (#219 and #222)
* Added `flask_util` module that provides a Flask extension to aid
with using OAuth2 web server flow. This provides the same functionality
as the `appengine.webapp2` OAuth2Decorator, but will work with any Flask
application regardless of hosting environment. (#226, #273)
* Track scopes used on credentials objects (#230)
* Moving docs to [readthedocs.org][1] (#237, #238, #244)
* Removing `old_run` module. Was deprecated July 2, 2013. (#285)
* Avoid proxies when querying for GCE metadata (to check if
running on GCE) (#114, #293)
[1]: https://readthedocs.org/
## v1.4.12
* Fix OS X flaky test failure (#189).
* Fix broken OpenSSL import (#191).
* Remove `@util.positional` from wrapped request in `Credentials.authorize()`
(#196, #197).
* Changing pinned dependencies to `>=` (#200, #204).
* Support client authentication using `Authorization` header (#206).
* Clarify environment check in case where GAE imports succeed but GAE services
aren't available (#208).
## v1.4.11
* Better environment detection with Managed VMs.
* Better OpenSSL detection in exotic environments.
## v1.4.10
* Update the `OpenSSL` check to be less strict about finding `crypto.py` in
the `OpenSSL` directory.
* `tox` updates for new environment handling in `tox`.
## v1.4.9
* Ensure that the ADC fails if we try to *write* the well-known file to a
directory that doesn't exist, but not if we try to *read* from one.
## v1.4.8
* Better handling of `body` during token refresh when `body` is a stream.
* Better handling of expired tokens in storage.
* Cleanup around `openSSL` import.
* Allow custom directory for the `well_known_file`.
* Integration tests for python2 and python3. (!!!)
* Stricter file permissions when saving the `well_known_file`.
* Test cleanup around config file locations.
## v1.4.7
* Add support for Google Developer Shell credentials.
* Better handling of filesystem errors in credential refresh.
* python3 fixes
* Add `NO_GCE_CHECK` for skipping GCE detection.
* Better error messages on `InvalidClientSecretsError`.
* Comment cleanup on `run_flow`.
## v1.4.6
* Add utility function to convert PKCS12 key to PEM. (#115)
* Change GCE detection logic. (#93)
* Add a tox env for doc generation.
## v1.4.5
* Set a shorter timeout for an Application Default Credentials issue on some
networks. (#93, #101)
* Test cleanup, switch from mox to mock. (#103)
* Switch docs to sphinx from epydoc.
## v1.4.4
* Fix a bug in bytes/string encoding of headers.
## v1.4.3
* Big thanks to @dhermes for spotting and fixing a mess in our test setup.
* Fix a serious issue with tests not being run. (#86, #87, #89)
* Start credentials cleanup for single 2LO/3LO call. (#83, #84)
* Clean up stack traces when re-raising in some places. (#79)
* Clean up doc building. (#81, #82)
* Fixed minimum version for `six` dependency. (#75)
2016-02-15 11:45:40 +01:00
|
|
|
${PYSITELIB}/oauth2client/_helpers.py
|
|
|
|
${PYSITELIB}/oauth2client/_helpers.pyc
|
|
|
|
${PYSITELIB}/oauth2client/_helpers.pyo
|
|
|
|
${PYSITELIB}/oauth2client/_openssl_crypt.py
|
|
|
|
${PYSITELIB}/oauth2client/_openssl_crypt.pyc
|
|
|
|
${PYSITELIB}/oauth2client/_openssl_crypt.pyo
|
2016-10-19 15:02:48 +02:00
|
|
|
${PYSITELIB}/oauth2client/_pkce.py
|
|
|
|
${PYSITELIB}/oauth2client/_pkce.pyc
|
|
|
|
${PYSITELIB}/oauth2client/_pkce.pyo
|
Update py-oauth2client to 2.0.0.
## v2.0.0
* Add django_util (#332)
* Avoid OAuth2Credentials `id_token` going out of sync after a token
refresh (#337)
* Move to a `contrib` sub-package code not considered a core part of
the library (#346, #353, #370, #375, #376, #382)
* Add `token_expiry` to `devshell` credentials (#372)
* Move `Storage` locking into a base class (#379)
* Added dictionary storage (#380)
* Added `to_json` and `from_json` methods to all `Credentials`
classes (#385)
* Fall back to read-only credentials on EACCES errors (#389)
* Coalesced the two `ServiceAccountCredentials`
classes (#395, #396, #397, #398, #400)
### Special Note About `ServiceAccountCredentials`:
-------------------------------------------------
For JSON keys, you can create a credential via
```py
from oauth2client.service_account import ServiceAccountCredentials
credentials = ServiceAccountCredentials.from_json_keyfile_name(
key_file_name, scopes=[...])
```
You can still rely on
```py
from oauth2client.client import GoogleCredentials
credentials = GoogleCredentials.get_application_default()
```
returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS`
environment variable.
For `.p12` keys, construct via
```py
credentials = ServiceAccountCredentials.from_p12_keyfil(
service_account_email, key_file_name, scopes=[...])
```
though we urge you to use JSON keys (rather than `.p12` keys) if you can.
This is equivalent to the previous method
```py
# PRE-oauth2client 2.0.0 EXAMPLE CODE!
from oauth2client.client import SignedJwtAssertionCredentials
with open(key_file_name, 'rb') as key_file:
private_key = key_file.read()
credentials = SignedJwtAssertionCredentials(
service_account_email, private_key, scope=[...])
```
2016-03-03 13:59:55 +01:00
|
|
|
${PYSITELIB}/oauth2client/_pure_python_crypt.py
|
|
|
|
${PYSITELIB}/oauth2client/_pure_python_crypt.pyc
|
|
|
|
${PYSITELIB}/oauth2client/_pure_python_crypt.pyo
|
Update py-oauth2client to 1.5.2.
Needed by py-google-api-python-client-1.4.2.
## v1.5.2
* Add access token refresh error class that includes HTTP status (#310)
* Python3 compatibility fixes for Django (#316, #318)
* Fix incremental auth in flask_util (#322)
* Fall back to credential refresh on EDEADLK in multistore_file (#336)
## v1.5.1
* Fix bad indent in `tools.run_flow()` (#301, bug was
introduced when switching from 2 space indents to 4)
## v1.5.0
* Fix (more like clarify) `bytes` / `str` handling in crypto
methods. (#203, #250, #272)
* Replacing `webapp` with `webapp2` in `oauth2client.appengine` (#217)
* Added optional `state` parameter to
`step1_get_authorize_url`. (#219 and #222)
* Added `flask_util` module that provides a Flask extension to aid
with using OAuth2 web server flow. This provides the same functionality
as the `appengine.webapp2` OAuth2Decorator, but will work with any Flask
application regardless of hosting environment. (#226, #273)
* Track scopes used on credentials objects (#230)
* Moving docs to [readthedocs.org][1] (#237, #238, #244)
* Removing `old_run` module. Was deprecated July 2, 2013. (#285)
* Avoid proxies when querying for GCE metadata (to check if
running on GCE) (#114, #293)
[1]: https://readthedocs.org/
## v1.4.12
* Fix OS X flaky test failure (#189).
* Fix broken OpenSSL import (#191).
* Remove `@util.positional` from wrapped request in `Credentials.authorize()`
(#196, #197).
* Changing pinned dependencies to `>=` (#200, #204).
* Support client authentication using `Authorization` header (#206).
* Clarify environment check in case where GAE imports succeed but GAE services
aren't available (#208).
## v1.4.11
* Better environment detection with Managed VMs.
* Better OpenSSL detection in exotic environments.
## v1.4.10
* Update the `OpenSSL` check to be less strict about finding `crypto.py` in
the `OpenSSL` directory.
* `tox` updates for new environment handling in `tox`.
## v1.4.9
* Ensure that the ADC fails if we try to *write* the well-known file to a
directory that doesn't exist, but not if we try to *read* from one.
## v1.4.8
* Better handling of `body` during token refresh when `body` is a stream.
* Better handling of expired tokens in storage.
* Cleanup around `openSSL` import.
* Allow custom directory for the `well_known_file`.
* Integration tests for python2 and python3. (!!!)
* Stricter file permissions when saving the `well_known_file`.
* Test cleanup around config file locations.
## v1.4.7
* Add support for Google Developer Shell credentials.
* Better handling of filesystem errors in credential refresh.
* python3 fixes
* Add `NO_GCE_CHECK` for skipping GCE detection.
* Better error messages on `InvalidClientSecretsError`.
* Comment cleanup on `run_flow`.
## v1.4.6
* Add utility function to convert PKCS12 key to PEM. (#115)
* Change GCE detection logic. (#93)
* Add a tox env for doc generation.
## v1.4.5
* Set a shorter timeout for an Application Default Credentials issue on some
networks. (#93, #101)
* Test cleanup, switch from mox to mock. (#103)
* Switch docs to sphinx from epydoc.
## v1.4.4
* Fix a bug in bytes/string encoding of headers.
## v1.4.3
* Big thanks to @dhermes for spotting and fixing a mess in our test setup.
* Fix a serious issue with tests not being run. (#86, #87, #89)
* Start credentials cleanup for single 2LO/3LO call. (#83, #84)
* Clean up stack traces when re-raising in some places. (#79)
* Clean up doc building. (#81, #82)
* Fixed minimum version for `six` dependency. (#75)
2016-02-15 11:45:40 +01:00
|
|
|
${PYSITELIB}/oauth2client/_pycrypto_crypt.py
|
|
|
|
${PYSITELIB}/oauth2client/_pycrypto_crypt.pyc
|
|
|
|
${PYSITELIB}/oauth2client/_pycrypto_crypt.pyo
|
2014-11-24 15:43:12 +01:00
|
|
|
${PYSITELIB}/oauth2client/client.py
|
|
|
|
${PYSITELIB}/oauth2client/client.pyc
|
|
|
|
${PYSITELIB}/oauth2client/client.pyo
|
|
|
|
${PYSITELIB}/oauth2client/clientsecrets.py
|
|
|
|
${PYSITELIB}/oauth2client/clientsecrets.pyc
|
|
|
|
${PYSITELIB}/oauth2client/clientsecrets.pyo
|
Update py-oauth2client to 2.0.0.
## v2.0.0
* Add django_util (#332)
* Avoid OAuth2Credentials `id_token` going out of sync after a token
refresh (#337)
* Move to a `contrib` sub-package code not considered a core part of
the library (#346, #353, #370, #375, #376, #382)
* Add `token_expiry` to `devshell` credentials (#372)
* Move `Storage` locking into a base class (#379)
* Added dictionary storage (#380)
* Added `to_json` and `from_json` methods to all `Credentials`
classes (#385)
* Fall back to read-only credentials on EACCES errors (#389)
* Coalesced the two `ServiceAccountCredentials`
classes (#395, #396, #397, #398, #400)
### Special Note About `ServiceAccountCredentials`:
-------------------------------------------------
For JSON keys, you can create a credential via
```py
from oauth2client.service_account import ServiceAccountCredentials
credentials = ServiceAccountCredentials.from_json_keyfile_name(
key_file_name, scopes=[...])
```
You can still rely on
```py
from oauth2client.client import GoogleCredentials
credentials = GoogleCredentials.get_application_default()
```
returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS`
environment variable.
For `.p12` keys, construct via
```py
credentials = ServiceAccountCredentials.from_p12_keyfil(
service_account_email, key_file_name, scopes=[...])
```
though we urge you to use JSON keys (rather than `.p12` keys) if you can.
This is equivalent to the previous method
```py
# PRE-oauth2client 2.0.0 EXAMPLE CODE!
from oauth2client.client import SignedJwtAssertionCredentials
with open(key_file_name, 'rb') as key_file:
private_key = key_file.read()
credentials = SignedJwtAssertionCredentials(
service_account_email, private_key, scope=[...])
```
2016-03-03 13:59:55 +01:00
|
|
|
${PYSITELIB}/oauth2client/contrib/__init__.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/__init__.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/__init__.pyo
|
2016-10-19 15:02:48 +02:00
|
|
|
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/_metadata.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/_metadata.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/_metadata.pyo
|
Update py-oauth2client to 2.0.0.
## v2.0.0
* Add django_util (#332)
* Avoid OAuth2Credentials `id_token` going out of sync after a token
refresh (#337)
* Move to a `contrib` sub-package code not considered a core part of
the library (#346, #353, #370, #375, #376, #382)
* Add `token_expiry` to `devshell` credentials (#372)
* Move `Storage` locking into a base class (#379)
* Added dictionary storage (#380)
* Added `to_json` and `from_json` methods to all `Credentials`
classes (#385)
* Fall back to read-only credentials on EACCES errors (#389)
* Coalesced the two `ServiceAccountCredentials`
classes (#395, #396, #397, #398, #400)
### Special Note About `ServiceAccountCredentials`:
-------------------------------------------------
For JSON keys, you can create a credential via
```py
from oauth2client.service_account import ServiceAccountCredentials
credentials = ServiceAccountCredentials.from_json_keyfile_name(
key_file_name, scopes=[...])
```
You can still rely on
```py
from oauth2client.client import GoogleCredentials
credentials = GoogleCredentials.get_application_default()
```
returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS`
environment variable.
For `.p12` keys, construct via
```py
credentials = ServiceAccountCredentials.from_p12_keyfil(
service_account_email, key_file_name, scopes=[...])
```
though we urge you to use JSON keys (rather than `.p12` keys) if you can.
This is equivalent to the previous method
```py
# PRE-oauth2client 2.0.0 EXAMPLE CODE!
from oauth2client.client import SignedJwtAssertionCredentials
with open(key_file_name, 'rb') as key_file:
private_key = key_file.read()
credentials = SignedJwtAssertionCredentials(
service_account_email, private_key, scope=[...])
```
2016-03-03 13:59:55 +01:00
|
|
|
${PYSITELIB}/oauth2client/contrib/appengine.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/appengine.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/appengine.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/devshell.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/devshell.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/devshell.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/dictionary_storage.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/dictionary_storage.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/dictionary_storage.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/__init__.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/__init__.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/__init__.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/apps.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/apps.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/apps.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/decorators.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/decorators.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/decorators.pyo
|
2016-10-19 15:02:48 +02:00
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/models.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/models.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/models.pyo
|
Update py-oauth2client to 2.0.0.
## v2.0.0
* Add django_util (#332)
* Avoid OAuth2Credentials `id_token` going out of sync after a token
refresh (#337)
* Move to a `contrib` sub-package code not considered a core part of
the library (#346, #353, #370, #375, #376, #382)
* Add `token_expiry` to `devshell` credentials (#372)
* Move `Storage` locking into a base class (#379)
* Added dictionary storage (#380)
* Added `to_json` and `from_json` methods to all `Credentials`
classes (#385)
* Fall back to read-only credentials on EACCES errors (#389)
* Coalesced the two `ServiceAccountCredentials`
classes (#395, #396, #397, #398, #400)
### Special Note About `ServiceAccountCredentials`:
-------------------------------------------------
For JSON keys, you can create a credential via
```py
from oauth2client.service_account import ServiceAccountCredentials
credentials = ServiceAccountCredentials.from_json_keyfile_name(
key_file_name, scopes=[...])
```
You can still rely on
```py
from oauth2client.client import GoogleCredentials
credentials = GoogleCredentials.get_application_default()
```
returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS`
environment variable.
For `.p12` keys, construct via
```py
credentials = ServiceAccountCredentials.from_p12_keyfil(
service_account_email, key_file_name, scopes=[...])
```
though we urge you to use JSON keys (rather than `.p12` keys) if you can.
This is equivalent to the previous method
```py
# PRE-oauth2client 2.0.0 EXAMPLE CODE!
from oauth2client.client import SignedJwtAssertionCredentials
with open(key_file_name, 'rb') as key_file:
private_key = key_file.read()
credentials = SignedJwtAssertionCredentials(
service_account_email, private_key, scope=[...])
```
2016-03-03 13:59:55 +01:00
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/signals.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/signals.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/signals.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/site.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/site.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/site.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/storage.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/storage.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/storage.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/views.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/views.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/django_util/views.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/flask_util.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/flask_util.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/flask_util.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/gce.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/gce.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/gce.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/keyring_storage.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/keyring_storage.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/keyring_storage.pyo
|
2016-10-19 15:02:48 +02:00
|
|
|
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.pyo
|
|
|
|
${PYSITELIB}/oauth2client/contrib/sqlalchemy.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/sqlalchemy.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/sqlalchemy.pyo
|
Update py-oauth2client to 2.0.0.
## v2.0.0
* Add django_util (#332)
* Avoid OAuth2Credentials `id_token` going out of sync after a token
refresh (#337)
* Move to a `contrib` sub-package code not considered a core part of
the library (#346, #353, #370, #375, #376, #382)
* Add `token_expiry` to `devshell` credentials (#372)
* Move `Storage` locking into a base class (#379)
* Added dictionary storage (#380)
* Added `to_json` and `from_json` methods to all `Credentials`
classes (#385)
* Fall back to read-only credentials on EACCES errors (#389)
* Coalesced the two `ServiceAccountCredentials`
classes (#395, #396, #397, #398, #400)
### Special Note About `ServiceAccountCredentials`:
-------------------------------------------------
For JSON keys, you can create a credential via
```py
from oauth2client.service_account import ServiceAccountCredentials
credentials = ServiceAccountCredentials.from_json_keyfile_name(
key_file_name, scopes=[...])
```
You can still rely on
```py
from oauth2client.client import GoogleCredentials
credentials = GoogleCredentials.get_application_default()
```
returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS`
environment variable.
For `.p12` keys, construct via
```py
credentials = ServiceAccountCredentials.from_p12_keyfil(
service_account_email, key_file_name, scopes=[...])
```
though we urge you to use JSON keys (rather than `.p12` keys) if you can.
This is equivalent to the previous method
```py
# PRE-oauth2client 2.0.0 EXAMPLE CODE!
from oauth2client.client import SignedJwtAssertionCredentials
with open(key_file_name, 'rb') as key_file:
private_key = key_file.read()
credentials = SignedJwtAssertionCredentials(
service_account_email, private_key, scope=[...])
```
2016-03-03 13:59:55 +01:00
|
|
|
${PYSITELIB}/oauth2client/contrib/xsrfutil.py
|
|
|
|
${PYSITELIB}/oauth2client/contrib/xsrfutil.pyc
|
|
|
|
${PYSITELIB}/oauth2client/contrib/xsrfutil.pyo
|
2014-11-24 15:43:12 +01:00
|
|
|
${PYSITELIB}/oauth2client/crypt.py
|
|
|
|
${PYSITELIB}/oauth2client/crypt.pyc
|
|
|
|
${PYSITELIB}/oauth2client/crypt.pyo
|
|
|
|
${PYSITELIB}/oauth2client/file.py
|
|
|
|
${PYSITELIB}/oauth2client/file.pyc
|
|
|
|
${PYSITELIB}/oauth2client/file.pyo
|
|
|
|
${PYSITELIB}/oauth2client/service_account.py
|
|
|
|
${PYSITELIB}/oauth2client/service_account.pyc
|
|
|
|
${PYSITELIB}/oauth2client/service_account.pyo
|
|
|
|
${PYSITELIB}/oauth2client/tools.py
|
|
|
|
${PYSITELIB}/oauth2client/tools.pyc
|
|
|
|
${PYSITELIB}/oauth2client/tools.pyo
|
2016-10-19 15:02:48 +02:00
|
|
|
${PYSITELIB}/oauth2client/transport.py
|
|
|
|
${PYSITELIB}/oauth2client/transport.pyc
|
|
|
|
${PYSITELIB}/oauth2client/transport.pyo
|