Skip to content

Commit 898f5b0

Browse files
authored
not pass enable_cae (#31546)
* not pass enable_cae * update changelog
1 parent 4c40df0 commit 898f5b0

File tree

4 files changed

+18
-14
lines changed

4 files changed

+18
-14
lines changed

sdk/core/azure-core/CHANGELOG.md

+2-6
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,10 @@
11
# Release History
22

3-
## 1.29.1 (Unreleased)
4-
5-
### Features Added
6-
7-
### Breaking Changes
3+
## 1.29.1 (2023-08-09)
84

95
### Bugs Fixed
106

11-
### Other Changes
7+
- Not pass `enabled_cae` unless it is explicitly enabled.
128

139
## 1.29.0 (2023-08-03)
1410

sdk/core/azure-core/azure/core/pipeline/policies/_authentication.py

+6-2
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,10 @@ def on_request(self, request: PipelineRequest[HTTPRequestType]) -> None:
9393
self._enforce_https(request)
9494

9595
if self._token is None or self._need_new_token:
96-
self._token = self._credential.get_token(*self._scopes, enable_cae=self._enable_cae)
96+
if self._enable_cae:
97+
self._token = self._credential.get_token(*self._scopes, enable_cae=self._enable_cae)
98+
else:
99+
self._token = self._credential.get_token(*self._scopes)
97100
self._update_headers(request.http_request.headers, self._token.token)
98101

99102
def authorize_request(self, request: PipelineRequest[HTTPRequestType], *scopes: str, **kwargs) -> None:
@@ -105,7 +108,8 @@ def authorize_request(self, request: PipelineRequest[HTTPRequestType], *scopes:
105108
:param ~azure.core.pipeline.PipelineRequest request: the request
106109
:param str scopes: required scopes of authentication
107110
"""
108-
kwargs.setdefault("enable_cae", self._enable_cae)
111+
if self._enable_cae:
112+
kwargs.setdefault("enable_cae", self._enable_cae)
109113
self._token = self._credential.get_token(*scopes, **kwargs)
110114
self._update_headers(request.http_request.headers, self._token.token)
111115

sdk/core/azure-core/azure/core/pipeline/policies/_authentication_async.py

+8-4
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,12 @@ async def on_request(self, request: PipelineRequest[HTTPRequestType]) -> None:
5656
async with self._lock:
5757
# double check because another coroutine may have acquired a token while we waited to acquire the lock
5858
if self._token is None or self._need_new_token():
59-
self._token = await await_result(
60-
self._credential.get_token, *self._scopes, enable_cae=self._enable_cae
61-
)
59+
if self._enable_cae:
60+
self._token = await await_result(
61+
self._credential.get_token, *self._scopes, enable_cae=self._enable_cae
62+
)
63+
else:
64+
self._token = await await_result(self._credential.get_token, *self._scopes)
6265
request.http_request.headers["Authorization"] = "Bearer " + cast(AccessToken, self._token).token
6366

6467
async def authorize_request(self, request: PipelineRequest[HTTPRequestType], *scopes: str, **kwargs: Any) -> None:
@@ -70,7 +73,8 @@ async def authorize_request(self, request: PipelineRequest[HTTPRequestType], *sc
7073
:param ~azure.core.pipeline.PipelineRequest request: the request
7174
:param str scopes: required scopes of authentication
7275
"""
73-
kwargs.setdefault("enable_cae", self._enable_cae)
76+
if self._enable_cae:
77+
kwargs.setdefault("enable_cae", self._enable_cae)
7478
async with self._lock:
7579
self._token = await await_result(self._credential.get_token, *scopes, **kwargs)
7680
request.http_request.headers["Authorization"] = "Bearer " + cast(AccessToken, self._token).token

sdk/core/azure-core/tests/test_authentication.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ def test_bearer_policy_default_context(http_request):
152152

153153
pipeline.run(http_request("GET", "https://localhost"))
154154

155-
credential.get_token.assert_called_once_with(expected_scope, enable_cae=False)
155+
credential.get_token.assert_called_once_with(expected_scope)
156156

157157

158158
@pytest.mark.parametrize("http_request", HTTP_REQUESTS)
@@ -222,7 +222,7 @@ def test_bearer_policy_cannot_complete_challenge(http_request):
222222

223223
assert response.http_response is expected_response
224224
assert transport.send.call_count == 1
225-
credential.get_token.assert_called_once_with(expected_scope, enable_cae=False)
225+
credential.get_token.assert_called_once_with(expected_scope)
226226

227227

228228
@pytest.mark.parametrize("http_request", HTTP_REQUESTS)

0 commit comments

Comments
 (0)