-
Notifications
You must be signed in to change notification settings - Fork 205
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
A semi-auto script to test Azure CLI with broker
- Loading branch information
Showing
1 changed file
with
66 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
"""This script is used to impersonate Azure CLI | ||
and run 3 pairs of end-to-end tests with broker. | ||
Although not fully automated, it requires only several clicks to finish. | ||
Each time a new PyMsalRuntime is going to be released, | ||
we can use this script to test it with a given version of MSAL Python. | ||
""" | ||
import msal | ||
|
||
_AZURE_CLI = "04b07795-8ddb-461a-bbee-02f9e1bf7b46" | ||
SCOPE_ARM = "https://management.azure.com/.default" | ||
placeholder_auth_scheme = msal.PopAuthScheme( | ||
http_method=msal.PopAuthScheme.HTTP_GET, | ||
url="https://example.com/endpoint", | ||
nonce="placeholder", | ||
) | ||
_JWK1 = """{"kty":"RSA", "n":"2tNr73xwcj6lH7bqRZrFzgSLj7OeLfbn8216uOMDHuaZ6TEUBDN8Uz0ve8jAlKsP9CQFCSVoSNovdE-fs7c15MxEGHjDcNKLWonznximj8pDGZQjVdfK-7mG6P6z-lgVcLuYu5JcWU_PeEqIKg5llOaz-qeQ4LEDS4T1D2qWRGpAra4rJX1-kmrWmX_XIamq30C9EIO0gGuT4rc2hJBWQ-4-FnE1NXmy125wfT3NdotAJGq5lMIfhjfglDbJCwhc8Oe17ORjO3FsB5CLuBRpYmP7Nzn66lRY3Fe11Xz8AEBl3anKFSJcTvlMnFtu3EpD-eiaHfTgRBU7CztGQqVbiQ", "e":"AQAB"}""" | ||
_SSH_CERT_DATA = {"token_type": "ssh-cert", "key_id": "key1", "req_cnf": _JWK1} | ||
_SSH_CERT_SCOPE = "https://pas.windows.net/CheckMyAccess/Linux/.default" | ||
|
||
pca = msal.PublicClientApplication( | ||
_AZURE_CLI, | ||
authority="https://login.microsoftonline.com/organizations", | ||
enable_broker_on_windows=True) | ||
|
||
def interactive_and_silent(scopes, auth_scheme, data, expected_token_type): | ||
print("An account picker shall be pop up, possibly behind this console. Continue from there.") | ||
result = pca.acquire_token_interactive( | ||
scopes, | ||
prompt="select_account", # "az login" does this | ||
parent_window_handle=pca.CONSOLE_WINDOW_HANDLE, # This script is a console app | ||
enable_msa_passthrough=True, # Azure CLI is an MSA-passthrough app | ||
auth_scheme=auth_scheme, | ||
data=data or {}, | ||
) | ||
_assert(result, expected_token_type) | ||
|
||
accounts = pca.get_accounts() | ||
assert accounts, "The logged in account should have been established by interactive flow" | ||
result = pca.acquire_token_silent( | ||
scopes, | ||
account=accounts[0], | ||
force_refresh=True, # Bypass MSAL Python's token cache to test PyMsalRuntime | ||
auth_scheme=auth_scheme, | ||
data=data or {}, | ||
) | ||
_assert(result, expected_token_type) | ||
|
||
def _assert(result, expected_token_type): | ||
assert result.get("access_token"), f"We should obtain a token. Got {result} instead." | ||
assert result.get("token_source") == "broker", "Token should be obtained via broker" | ||
assert result.get("token_type").lower() == expected_token_type.lower(), f"{expected_token_type} not found" | ||
|
||
for i in range(2): # Mimic Azure CLI's issue report | ||
interactive_and_silent( | ||
scopes=[SCOPE_ARM], auth_scheme=None, data=None, expected_token_type="bearer") | ||
|
||
interactive_and_silent( | ||
scopes=[SCOPE_ARM], auth_scheme=placeholder_auth_scheme, data=None, expected_token_type="pop") | ||
interactive_and_silent( | ||
scopes=[_SSH_CERT_SCOPE], | ||
data=_SSH_CERT_DATA, | ||
auth_scheme=None, | ||
expected_token_type="ssh-cert", | ||
) | ||
|