@@ -35,7 +35,7 @@ def _get_token(self, sdk_resource=None):
3535 """
3636 external_tenant_tokens = None
3737 try :
38- scheme , token , full_token = self ._token_retriever (sdk_resource )
38+ scheme , token , token_entry = self ._token_retriever (sdk_resource )
3939 if self ._external_tenant_token_retriever :
4040 external_tenant_tokens = self ._external_tenant_token_retriever (sdk_resource )
4141 except CLIError as err :
@@ -52,17 +52,20 @@ def _get_token(self, sdk_resource=None):
5252 except requests .exceptions .ConnectionError as err :
5353 raise CLIError ('Please ensure you have network connection. Error detail: ' + str (err ))
5454
55- return scheme , token , full_token , external_tenant_tokens
55+ # scheme: str. The token scheme. Should always be 'Bearer'.
56+ # token: str. The raw access token.
57+ # token_entry: dict. The full token entry.
58+ # external_tenant_tokens: [(scheme: str, token: str, token_entry: dict), ...]
59+ return scheme , token , token_entry , external_tenant_tokens
5660
5761 def get_all_tokens (self , * scopes ):
58- scheme , token , full_token , external_tenant_tokens = self ._get_token (_try_scopes_to_resource (scopes ))
59- return scheme , token , full_token , external_tenant_tokens
62+ return self ._get_token (_try_scopes_to_resource (scopes ))
6063
6164 # This method is exposed for Azure Core.
6265 def get_token (self , * scopes , ** kwargs ): # pylint:disable=unused-argument
6366 logger .debug ("AdalAuthentication.get_token invoked by Track 2 SDK with scopes=%s" , scopes )
6467
65- _ , token , full_token , _ = self ._get_token (_try_scopes_to_resource (scopes ))
68+ _ , token , token_entry , _ = self ._get_token (_try_scopes_to_resource (scopes ))
6669
6770 # NEVER use expiresIn (expires_in) as the token is cached and expiresIn will be already out-of date
6871 # when being retrieved.
@@ -92,10 +95,10 @@ def get_token(self, *scopes, **kwargs): # pylint:disable=unused-argument
9295 # "_clientId": "22800c35-46c2-4210-b8a7-d8c3ec3b526f",
9396 # "_authority": "https://login.microsoftonline.com/54826b22-38d6-4fb2-bad9-b7b93a3e9c5a"
9497 # }
95- if 'expiresOn' in full_token :
98+ if 'expiresOn' in token_entry :
9699 import datetime
97100 expires_on_timestamp = int (_timestamp (
98- datetime .datetime .strptime (full_token ['expiresOn' ], '%Y-%m-%d %H:%M:%S.%f' )))
101+ datetime .datetime .strptime (token_entry ['expiresOn' ], '%Y-%m-%d %H:%M:%S.%f' )))
99102 return AccessToken (token , expires_on_timestamp )
100103
101104 # Cloud Shell (Managed Identity) token entry sample:
@@ -108,8 +111,8 @@ def get_token(self, *scopes, **kwargs): # pylint:disable=unused-argument
108111 # "resource": "https://management.core.windows.net/",
109112 # "token_type": "Bearer"
110113 # }
111- if 'expires_on' in full_token :
112- return AccessToken (token , int (full_token ['expires_on' ]))
114+ if 'expires_on' in token_entry :
115+ return AccessToken (token , int (token_entry ['expires_on' ]))
113116
114117 from azure .cli .core .azclierror import CLIInternalError
115118 raise CLIInternalError ("No expiresOn or expires_on is available in the token entry." )
0 commit comments