|
18 | 18 | import json
|
19 | 19 | import os
|
20 | 20 | import tempfile
|
| 21 | +import time |
21 | 22 |
|
| 23 | +import adal |
22 | 24 | import google.auth
|
23 | 25 | import google.auth.transport.requests
|
24 | 26 | import oauthlib.oauth2
|
@@ -202,10 +204,29 @@ def _load_azure_token(self, provider):
|
202 | 204 | return
|
203 | 205 | if 'access-token' not in provider['config']:
|
204 | 206 | return
|
205 |
| - # TODO: Refresh token here... |
| 207 | + if 'expires-on' in provider['config']: |
| 208 | + if int(provider['config']['expires-on']) < time.gmtime(): |
| 209 | + self._refresh_azure_token(provider['config']) |
206 | 210 | self.token = 'Bearer %s' % provider['config']['access-token']
|
207 | 211 | return self.token
|
208 | 212 |
|
| 213 | + def _refresh_azure_token(self, config): |
| 214 | + tenant = config['tenant-id'] |
| 215 | + authority = 'https://login.microsoftonline.com/{}'.format(tenant) |
| 216 | + context = adal.AuthenticationContext( |
| 217 | + authority, validate_authority=True, |
| 218 | + ) |
| 219 | + refresh_token = config['refresh-token'] |
| 220 | + client_id = config['client-id'] |
| 221 | + token_response = context.acquire_token_with_refresh_token( |
| 222 | + refresh_token, client_id, '00000002-0000-0000-c000-000000000000') |
| 223 | + |
| 224 | + provider = self._user['auth-provider']['config'] |
| 225 | + provider.value['access-token'] = token_response['accessToken'] |
| 226 | + provider.value['expires-on'] = token_response['expiresOn'] |
| 227 | + if self._config_persister: |
| 228 | + self._config_persister(self._config.value) |
| 229 | + |
209 | 230 | def _load_gcp_token(self, provider):
|
210 | 231 | if (('config' not in provider) or
|
211 | 232 | ('access-token' not in provider['config']) or
|
|
0 commit comments