|
| 1 | +# ------------------------------------------------------------------------- |
| 2 | +# Copyright (c) Microsoft Corporation. All rights reserved. |
| 3 | +# Licensed under the MIT License. See License.txt in the project root for |
| 4 | +# license information. |
| 5 | +# -------------------------------------------------------------------------- |
| 6 | + |
| 7 | +"""Provides authentication classes for use with the msrest library |
| 8 | +""" |
| 9 | + |
| 10 | +from msrest.authentication import Authentication, BasicTokenAuthentication |
| 11 | +from .connection_string import ConnectionString |
| 12 | +from .connection_string import HOST_NAME, SHARED_ACCESS_KEY_NAME, SHARED_ACCESS_KEY |
| 13 | +from .sastoken import SasToken |
| 14 | +from azure.core.pipeline.policies import BearerTokenCredentialPolicy |
| 15 | +from azure.core.pipeline import PipelineRequest, PipelineContext |
| 16 | +from azure.core.pipeline.transport import HttpRequest |
| 17 | + |
| 18 | +__all__ = ["ConnectionStringAuthentication", "AzureIdentityCredentialAdapter"] |
| 19 | + |
| 20 | + |
| 21 | +class ConnectionStringAuthentication(ConnectionString, Authentication): |
| 22 | + """ConnectionString class that can be used with msrest to provide SasToken authentication |
| 23 | +
|
| 24 | + :param connection_string: The connection string to generate SasToken with |
| 25 | + """ |
| 26 | + |
| 27 | + def __init__(self, connection_string): |
| 28 | + super(ConnectionStringAuthentication, self).__init__( |
| 29 | + connection_string |
| 30 | + ) # ConnectionString __init__ |
| 31 | + |
| 32 | + @classmethod |
| 33 | + def create_with_parsed_values(cls, host_name, shared_access_key_name, shared_access_key): |
| 34 | + connection_string = ( |
| 35 | + HOST_NAME |
| 36 | + + "=" |
| 37 | + + host_name |
| 38 | + + ";" |
| 39 | + + SHARED_ACCESS_KEY_NAME |
| 40 | + + "=" |
| 41 | + + shared_access_key_name |
| 42 | + + ";" |
| 43 | + + SHARED_ACCESS_KEY |
| 44 | + + "=" |
| 45 | + + shared_access_key |
| 46 | + ) |
| 47 | + return cls(connection_string) |
| 48 | + |
| 49 | + def signed_session(self, session=None): |
| 50 | + """Create requests session with any required auth headers applied. |
| 51 | +
|
| 52 | + If a session object is provided, configure it directly. Otherwise, |
| 53 | + create a new session and return it. |
| 54 | +
|
| 55 | + :param session: The session to configure for authentication |
| 56 | + :type session: requests.Session |
| 57 | + :rtype: requests.Session |
| 58 | + """ |
| 59 | + session = super(ConnectionStringAuthentication, self).signed_session(session) |
| 60 | + |
| 61 | + # Authorization header |
| 62 | + sastoken = SasToken(self[HOST_NAME], self[SHARED_ACCESS_KEY], self[SHARED_ACCESS_KEY_NAME]) |
| 63 | + session.headers[self.header] = str(sastoken) |
| 64 | + return session |
| 65 | + |
| 66 | + |
| 67 | +class AzureIdentityCredentialAdapter(BasicTokenAuthentication): |
| 68 | + def __init__(self, credential, resource_id="https://iothubs.azure.net/.default", **kwargs): |
| 69 | + """Adapt any azure-identity credential to work with SDK that needs azure.common.credentials or msrestazure. |
| 70 | + Default resource is ARM (syntax of endpoint v2) |
| 71 | + :param credential: Any azure-identity credential (DefaultAzureCredential by default) |
| 72 | + :param str resource_id: The scope to use to get the token (default ARM) |
| 73 | + """ |
| 74 | + super(AzureIdentityCredentialAdapter, self).__init__(None) |
| 75 | + self._policy = BearerTokenCredentialPolicy(credential, resource_id, **kwargs) |
| 76 | + |
| 77 | + def _make_request(self): |
| 78 | + return PipelineRequest( |
| 79 | + HttpRequest("AzureIdentityCredentialAdapter", "https://fakeurl"), PipelineContext(None) |
| 80 | + ) |
| 81 | + |
| 82 | + def set_token(self): |
| 83 | + """Ask the azure-core BearerTokenCredentialPolicy policy to get a token. |
| 84 | + Using the policy gives us for free the caching system of azure-core. |
| 85 | + We could make this code simpler by using private method, but by definition |
| 86 | + I can't assure they will be there forever, so mocking a fake call to the policy |
| 87 | + to extract the token, using 100% public API.""" |
| 88 | + request = self._make_request() |
| 89 | + self._policy.on_request(request) |
| 90 | + # Read Authorization, and get the second part after Bearer |
| 91 | + token = request.http_request.headers["Authorization"].split(" ", 1)[1] |
| 92 | + self.token = {"access_token": token} |
| 93 | + |
| 94 | + def signed_session(self, session=None): |
| 95 | + self.set_token() |
| 96 | + return super(AzureIdentityCredentialAdapter, self).signed_session(session) |
0 commit comments