1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751
|
# Azure Core Library - Client library developer reference
## Table of contents
- [Pipeline](#pipeline)
- [Pipeline client configurations](#pipeline-client-configurations)
- [Transport](#transport)
- [Proxy Settings](#proxy-settings)
- [HttpRequest and HttpResponse](#httprequest-and-httpresponse)
- [PipelineRequest and PipelineResponse](#pipelinerequest-and-pipelineresponse)
- [Policies](#policies)
- [SansIOHTTPPolicy](#sansiohttppolicy)
- [HTTPPolicy and AsyncHTTPPolicy](#httppolicy-and-asynchttppolicy)
- [Available Policies](#available-policies)
- [The Pipeline](#the-pipeline)
- [Credentials](#credentials)
- [Token Credential Protocols](#token-credential-protocols)
- [SupportsTokenInfo and AsyncSupportsTokenInfo protocols (preferred)](#supportstokeninfo-and-asyncsupportstokeninfo-protocols-preferred)
- [TokenCredential protocol (legacy)](#tokencredential-protocol-legacy)
- [Implementation Guidance](#implementation-guidance)
- [Known uses of token request parameters](#known-uses-of-token-request-parameters)
- [BearerTokenCredentialPolicy and AsyncBearerTokenCredentialPolicy](#bearertokencredentialpolicy-and-asyncbearertokencredentialpolicy)
- [Long-running operation (LRO) customization](#long-running-operation-lro-customization)
## Pipeline
The Azure Core pipeline is a re-structuring of the msrest pipeline introduced in msrest 0.6.0.
Further discussions on the msrest implementation can be found in the [msrest wiki](https://github.com/Azure/msrest-for-python/wiki/msrest-0.6.0---Pipeline).
The Azure Core Pipeline is an implementation of chained policies as described in the [Azure SDK guidelines](https://github.com/Azure/azure-sdk/blob/main/docs/general/design.md).
The Python implementation of the pipeline has some mechanisms specific to Python. This is due to the fact that both synchronous and asynchronous implementations of the pipeline must be supported independently.
When constructing an SDK, a developer may consume the pipeline like so:
```python
from azure.core.pipeline import Pipeline
from azure.core.rest import HttpRequest
from azure.core.transport import RequestsTransport
from azure.core.pipeline.policies import (
UserAgentPolicy,
HeadersPolicy,
RetryPolicy,
RedirectPolicy,
BearerTokenCredentialPolicy,
ContentDecodePolicy,
NetworkTraceLoggingPolicy,
ProxyPolicy
)
class FooServiceClient:
def __init__(self, **kwargs):
transport = kwargs.get('transport', RequestsTransport(**kwargs))
policies = [
kwargs.get('user_agent_policy', UserAgentPolicy("ServiceUserAgentValue", **kwargs)),
kwargs.get('headers_policy', HeadersPolicy({"CustomHeader": "Value"}, **kwargs)),
kwargs.get('authentication_policy', BearerTokenCredentialPolicy(credential, scopes, **kwargs)),
ContentDecodePolicy(),
kwargs.get('proxy_policy', ProxyPolicy(**kwargs)),
kwargs.get('redirect_policy', RedirectPolicy(**kwargs)),
kwargs.get('retry_policy', RetryPolicy(**kwargs)),
kwargs.get('logging_policy', NetworkTraceLoggingPolicy(**kwargs)),
]
self._pipeline = Pipeline(transport, policies=policies)
def get_foo_properties(self, **kwargs)
# Create a generic HTTP Request. This is not specific to any particular transport
# or pipeline configuration.
new_request = HttpRequest("GET", "/")
response = self._pipeline.run(new_request, **kwargs)
return deserialize_data(response.http_response)
```
An end user consuming this SDK may write code like so:
```python
from azure.core.credentials import FooCredentials
from azure.foo import FooServiceClient
creds = FooCredentials("api-key")
endpoint = "http://service.azure.net
# Scenario using entirely default configuration
# We use the SDK-developer defined configuration.
client = FooServiceClient(endpoint, creds)
response = client.get_foo_properties()
# Scenario where user wishes to tweak a couple of settings
# In this case the configurable options can be passed directly into the client constructor.
client = FooServiceClient(endpoint, creds, logging_enable=True, retries_total=5)
response = client.get_foo_properties()
# Scenario where user wishes to tweak settings for only a specific request
# All the options available on construction are available as per-request overrides.
# These can also be specified by the SDK developer - and it will be up to them to resolve
# conflicts with user-defined parameters.
client = FooServiceClient(endpoint, creds)
response = client.get_foo_properties(redirects_max=0)
# Scenario where user wishes to fully customize the policies.
# All configuration options are passed through kwargs
client = FooServiceClient(
endpoint,
creds,
retry_policy=CustomRetryPolicy()
redirect_max=5,
logging_enable=True
)
response = client.get_foo_properties()
```
### Pipeline client configurations
| Parameters | Description |
| --- | --- |
| `pipeline` | While `PipelineClient` will create a default pipeline, users can opt to use their own pipeline by passing in a `Pipeline` object. If passed in, the other configurations will be ignored. |
| `policies` | While `PipelineClient` will create a default list of `policies`, users can opt to use their own policies by passing in a `policies` object. If passed in, `config` will be ignored |
| `config` | While `PipelineClient` will create a default `Configuration`, users can opt to use their own configuration by passing in a `Configuration` object. If passed in, it will be used to create a `Pipeline` object. |
| `per_call_policies` | If a default `pipeline` is needed and no `policies` is passed in, `per_call_policies` will be added before the `Retry` policy |
| `per_retry_policies` | If a default `pipeline` is needed and no `policies` is passed in, `per_retry_policies` will be added after the `Retry` policy. If there is no `RetryPolicy` in the pipeline, a `ValueError` will be raised |
| `transport` | While `PipelineClient` will create a default `RequestsTransport`, users can opt to use their own transport by passing in a `RequestsTransport` object. If it is omitted, `PipelineClient` will honor the other described [transport customizations](#transport). |
### Transport
Various combinations of sync/async HTTP libraries as well as alternative event loop implementations are available. Therefore to support the widest range of customer scenarios, we must allow a customer to easily swap out the HTTP transport layer to one of those supported.
The transport is the last node in the pipeline, and adheres to the same basic API as any policy within the pipeline.
The only currently available transport for synchronous pipelines uses the `Requests` library:
```python
from azure.core.pipeline.transport import RequestsTransport
synchronous_transport = RequestsTransport()
```
For example if you would like to alter connection pool you can initialise `RequestsTransport` with an instance of `requests.Session`.
```python
import requests
from azure.core.pipeline.transport import RequestsTransport
session = requests.Session()
adapter = requests.adapters.HTTPAdapter(pool_connections=42, pool_maxsize=42)
session.mount('https://', adapter)
client = FooServiceClient(endpoint, creds, transport=RequestsTransport(session=session, session_owner=False))
# Here we want to manage the session by ourselves. When we are done with the session, we need to close the session.
session.close()
# Note: `session_owner` gives the information of ownership of the requests sessions to the transport instance, to authorize it to close on customer's behalf. If you're ok that the client closes your session on your behalf as necessary, you don't need to pass a value.
```
For asynchronous pipelines a couple of transport options are available. Each of these transports are interchangable depending on whether the user has installed various 3rd party dependencies (i.e. aiohttp or trio), and the user
should easily be able to specify their chosen transport. SDK developers should use the `aiohttp` transport as the default for asynchronous pipelines where the user has not specified an alternative.
```python
from azure.foo.aio import FooServiceClient
from azure.core.pipeline.transport import (
# Identical implementation as the synchronous RequestsTransport wrapped in an asynchronous using the
# built-in asyncio event loop.
AsyncioRequestsTransport,
# Identical implementation as the synchronous RequestsTransport wrapped in an asynchronous using the
# third party trio event loop.
TrioRequestsTransport,
# Fully asynchronous implementation using the aiohttp library, using the built-in asyncio event loop.
AioHttpTransport,
)
client = FooServiceClient(endpoint, creds, transport=AioHttpTransport())
response = await client.get_foo_properties()
```
Some common properties can be configured on all transports. They must be passed
as kwargs arguments while building the transport instance. These include the following properties:
```python
transport = AioHttpTransport(
# The connect and read timeout value. Defaults to 100 seconds.
connection_timeout=100,
# SSL certificate verification. Enabled by default. Set to False to disable,
# alternatively can be set to the path to a CA_BUNDLE file or directory with
# certificates of trusted CAs.
connection_verify=True,
# Client-side certificates. You can specify a local cert to use as client side
# certificate, as a single file (containing the private key and the certificate)
# or as a # tuple of both files' paths.
connection_cert=None,
# The block size of data sent over the connection. Defaults to 4096 bytes.
connection_data_block_size=4096
)
```
### Proxy Settings
There are two ways to configure proxy settings.
- Use environment proxy settings
When creating the transport, "use_env_settings" parameter can be used to enable or disable the environment proxy settings. e.g.:
```python
synchronous_transport = RequestsTransport(use_env_settings=True)
```
If "use_env_settings" is set to True(by default), the transport will look for environment variables
- HTTP_PROXY
- HTTPS_PROXY
and use their values to configure the proxy settings.
- Use ProxyPolicy
You can use ProxyPolicy to configure the proxy settings as well. e.g.
```python
from azure.core.pipeline.policies import ProxyPolicy
proxy_policy = ProxyPolicy()
proxy_policy.proxies = {'http': 'http://10.10.1.10:3148'}
# Use basic auth
proxy_policy.proxies = {'https': 'http://user:password@10.10.1.10:1180/'}
```
### HttpRequest and HttpResponse
The `HttpRequest` and `HttpResponse` objects represent a generic concept of HTTP request and response constructs and are in no way tied to a particular transport or HTTP library.
The `HttpRequest` has the following API. It does not vary between transports:
```python
class HttpRequest:
def __init__(
self,
method: str,
url: str,
*,
params: Optional[ParamsType] = None,
headers: Optional[MutableMapping[str, str]] = None,
json: Any = None,
content: Optional[ContentType] = None,
data: Optional[dict] = None,
files: Optional[FilesType] = None,
**kwargs
):
self.url = url
self.method = method
self.headers = CaseInsensitiveDict(default_headers)
@property
def content(self) -> Any:
"""Get's the request's content"""
```
`HttpResponse` on the other hand is an abstract base class that will have to be implemented
for a transport-specific derivative to accommodate how data is extracted from the object
returned by the HTTP library.
The API for each of these response types is identical, so the consumer of the `HttpResponse` need not know about these
particular types.
The `HttpResponse` has the following API. It does not vary between transports, and has the following surface area:
```python
class HttpResponse:
@property
def request(self) -> HttpRequest:
"""The request that resulted in this response."""
@property
def status_code(self) -> int:
"""The status code of this response."""
@property
def headers(self) -> MutableMapping[str, str]:
"""The response headers. Must be case-insensitive."""
@property
def reason(self) -> str:
"""The reason phrase for this response."""
@property
def content_type(self) -> Optional[str]:
"""The content type of the response."""
@property
def is_closed(self) -> bool:
"""Whether the network connection has been closed yet."""
@property
def is_stream_consumed(self) -> bool:
"""Whether the stream has been consumed."""
@property
def encoding(self) -> Optional[str]:
"""Returns the response encoding."""
@encoding.setter
def encoding(self, value: Optional[str]) -> None:
"""Sets the response encoding."""
@property
def url(self) -> str:
"""The URL that resulted in this response."""
@property
def content(self) -> bytes:
"""Return the response's content in bytes."""
def text(self, encoding: Optional[str] = None) -> str:
"""Returns the response body as a string."""
def json(self) -> Any:
"""Returns the whole body as a json object."""
def raise_for_status(self) -> None:
"""Raises an HttpResponseError if the response has an error status code."""
def read(self) -> bytes:
"""Read the response's bytes."""
def iter_raw(self, **kwargs: Any) -> Iterator[bytes]:
"""Iterates over the response's bytes. Will not decompress in the process."""
def iter_bytes(self, **kwargs: Any) -> Iterator[bytes]:
"""Iterates over the response's bytes. Will decompress in the process."""
```
Async calls to networks will return an `AsyncHttpResponse` instead. It shares most of its properties with an `HttpResponse` with the following exceptions:
```python
class AsyncHttpResponse:
...
async def read(self) -> bytes:
"""Read the response's bytes into memory."""
async def iter_raw(self, **kwargs: Any) -> AsyncIterator[bytes]:
"""Asynchronously iterates over the response's bytes. Will not decompress in the process."""
async def iter_bytes(self, **kwargs: Any) -> AsyncIterator[bytes]:
"""Asynchronously iterates over the response's bytes. Will decompress in the process."""
```
### PipelineRequest and PipelineResponse
These objects provide containers for moving the HttpRequest and HttpResponse through the pipeline.
While the SDK developer will not construct the PipelineRequest explicitly, they will handle the PipelineResponse
object that is returned from `pipeline.run()`
These objects are universal for all transports, both synchronous and asynchronous.
The pipeline request and response containers are also responsible for carrying a `context` object. This is
transport specific and can contain data persisted between pipeline requests (for example reusing an open connection
pool or "session"), as well as used by the SDK developer to carry arbitrary data through the pipeline.
The API for PipelineRequest and PipelineResponse is as follows:
```python
class PipelineRequest(object):
def __init__(self, http_request, context):
self.http_request = http_request # The HttpRequest
self.context = context # A transport specific data container object
class PipelineResponse(object):
def __init__(self, http_request, http_response, context):
self.http_request = http_request # The HttpRequest
self.http_response = http_response # The HttpResponse
self.history = [] # A list of redirect attempts.
self.context = context # A transport specific data container object
```
### Policies
The Python pipeline implementation provides two flavors of policy. These are referred to as an HttpPolicy and a SansIOHTTPPolicy.
#### SansIOHTTPPolicy
If a policy just modifies or annotates the request based on the HTTP specification, it's then a subclass of SansIOHTTPPolicy and will work in either Pipeline or AsyncPipeline context.
This is a simple abstract class, that can act before the request is done, or after. For instance:
- Setting headers in the request
- Logging the request and/or response
A SansIOHTTPPolicy should implement one or more of the following methods:
```python
def on_request(self, request):
"""Is executed before sending the request to next policy."""
def on_response(self, request, response):
"""Is executed after the request comes back from the policy."""
def on_exception(self, request):
"""Is executed if an exception is raised while executing this policy."""
```
SansIOHTTPPolicy methods can be declared as coroutines, but then they can only be used with a AsyncPipeline.
Current provided sans IO policies include:
```python
from azure.core.pipeline.policies import (
HeadersPolicy, # Add custom headers to all requests
UserAgentPolicy, # Add a custom user agent header
NetworkTraceLoggingPolicy, # Log request and response contents
ContentDecodePolicy, # Mandatory policy for decoding unstreamed response content
HttpLoggingPolicy, # Handles logging of HTTP requests and responses
ProxyPolicy, # Enable proxy settings
CustomHookPolicy, # Enable the given callback with the response
DistributedTracingPolicy # Create spans for Azure calls
)
```
#### HTTPPolicy and AsyncHTTPPolicy
Some policies are more complex, like retry strategy, and need to have control of the HTTP workflow.
In the current version, they are subclasses of HTTPPolicy or AsyncHTTPPolicy, and can be used only their corresponding synchronous or asynchronous pipeline type.
An HTTPPolicy or AsyncHTTPPolicy must implement the `send` method, and this implementation must in include a call to process the next policy in the pipeline:
```python
class CustomPolicy(HTTPPolicy):
def __init__(self):
self.next = None # Will be set when pipeline is instantiated and all the policies chained.
def send(self, request):
"""Mutate the request."""
return self.next.send(request)
class CustomAsyncPolicy(AsyncHTTPPolicy):
async def send(self, request):
"""Mutate the request."""
return await self.next.send(request)
```
Currently provided HTTP policies include:
```python
from azure.core.pipeline.policies import (
RetryPolicy,
AsyncRetryPolicy,
RedirectPolicy,
AsyncRedirectPolicy
)
```
#### Available Policies
| Name | Policy Flavor | Parameters | Accepted in Init? | Accepted in Request? | Description |
| --- | --- | --- | --- | --- | --- |
| HeadersPolicy | SansIOHTTPPolicy | | | | |
| | | base_headers | x | | Headers to send with the request. |
| | | headers | x | x | The HTTP Request headers. |
| RequestIdPolicy | SansIOHTTPPolicy | | | | |
| | | request_id | x | x | The request id to be added into header. |
| | | auto_request_id | x | | Auto generates a unique request ID per call if `True` which is by default. |
| UserAgentPolicy | SansIOHTTPPolicy | | | | |
| | | base_user_agent | x | | Sets the base user agent value. |
| | | user_agent_overwrite | x | | Overwrites User-Agent when True. Defaults to `False`. |
| | | user_agent_use_env | x | | Gets user-agent from environment. Defaults to `True`. |
| | | user_agent | x | x | If specified, this will be added in front of the user agent string. |
| | | sdk_moniker | x | | If specified, the user agent string will be `azsdk-python-[sdk_moniker] Python/[python_version] ([platform_version])` |
| NetworkTraceLoggingPolicy | SansIOHTTPPolicy | | | | |
| | | logging_enable | x | x | Use to enable per operation. Defaults to `False`. |
| HttpLoggingPolicy | SansIOHTTPPolicy | | | | |
| | | logger | x | x | If specified, it will be used to log information |
| ContentDecodePolicy | SansIOHTTPPolicy | | | | |
| | | response_encoding | x | x | The encoding to use if known for this service (will disable auto-detection). |
| ProxyPolicy | SansIOHTTPPolicy | | | | |
| | | proxies | x | x | Maps protocol or protocol and hostname to the URL of the proxy. |
| CustomHookPolicy | SansIOHTTPPolicy | | | | |
| | | raw_request_hook | x | x | Callback function. Will be invoked on request. |
| | | raw_response_hook | x | x | Callback function. Will be invoked on response. |
| DistributedTracingPolicy | SansIOHTTPPolicy | | | | |
| | | network_span_namer | x | x | A callable to customize the span name. |
| | | tracing_attributes | x | x | Attributes to set on all created spans. |
| --- | --- | --- | --- | --- | --- |
| RedirectPolicy | HTTPPolicy | | | | |
| | | permit_redirects | x | x | Whether the client allows redirects. Defaults to `True`. |
| | | redirect_max | x | x | The maximum allowed redirects. Defaults to `30`. |
| AsyncRedirectPolicy | AsyncHTTPPolicy | | | | |
| | | permit_redirects | x | x | Whether the client allows redirects. Defaults to `True`. |
| | | redirect_max | x | x | The maximum allowed redirects. Defaults to `30`. |
| RetryPolicy | HTTPPolicy | | | | |
| | | retry_total | x | x | Total number of retries to allow. Takes precedence over other counts. Default value is `10`. |
| | | retry_connect | x | x | How many connection-related errors to retry on. These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request. Default value is `3`. |
| | | retry_read | x | x | How many times to retry on read errors. These errors are raised after the request was sent to the server, so the request may have side-effects. Default value is `3`. |
| | | retry_status | x | x | How many times to retry on bad status codes. Default value is `3`. |
| | | retry_backoff_factor | x | x | A backoff factor to apply between attempts after the second try (most errors are resolved immediately by a second try without a delay). Retry policy will sleep for: `{backoff factor} * (2 ** ({number of total retries} - 1))` seconds. If the backoff_factor is 0.1, then the retry will sleep for [0.0s, 0.2s, 0.4s, ...] between retries. The default value is `0.8`. |
| | | retry_backoff_max | x | x | The maximum back off time. Default value is `120` seconds (2 minutes). |
| | | retry_mode | x | x | Fixed or exponential delay between attempts, default is `exponential`. |
| | | timeout | x | x | Timeout setting for the operation in seconds, default is `604800s` (7 days). |
| AsyncRetryPolicy | AsyncHTTPPolicy | | | | |
| | | retry_total | x | x | Total number of retries to allow. Takes precedence over other counts. Default value is `10`. |
| | | retry_connect | x | x | How many connection-related errors to retry on. These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request. Default value is `3`. |
| | | retry_read | x | x | How many times to retry on read errors. These errors are raised after the request was sent to the server, so the request may have side-effects. Default value is `3`. |
| | | retry_status | x | x | How many times to retry on bad status codes. Default value is `3`. |
| | | retry_backoff_factor | x | x | A backoff factor to apply between attempts after the second try (most errors are resolved immediately by a second try without a delay). Retry policy will sleep for: `{backoff factor} * (2 ** ({number of total retries} - 1))` seconds. If the backoff_factor is 0.1, then the retry will sleep for [0.0s, 0.2s, 0.4s, ...] between retries. The default value is `0.8`. |
| | | retry_backoff_max | x | x | The maximum back off time. Default value is `120` seconds (2 minutes). |
| | | retry_mode | x | x | Fixed or exponential delay between attempts, default is exponential. |
| | | timeout | x | x | Timeout setting for the operation in seconds, default is `604800s` (7 days). |
| SensitiveHeaderCleanupPolicy | SansIOHTTPPolicy | | | | |
| | | blocked_redirect_headers | x | | The headers to clean up when redirecting to another domain. |
| | | disable_redirect_cleanup | x | | Opt out cleaning up sensitive headers when redirecting to another domain. |
### The Pipeline
The pipeline itself represents a chain of policies where the final node in the chain is the HTTP transport.
A pipeline can either be synchronous or asynchronous.
The pipeline does not expose the policy chain, so individual policies cannot/should not be further
configured once the pipeline has been instantiated.
The pipeline has a single exposed operation: `run(request)` which will send a new `HttpRequest` object down
the pipeline. This operation returns a `PipelineResponse` object.
```python
class Pipeline:
"""A pipeline implementation.
This is implemented as a context manager, that will activate the context
of the HTTP sender.
"""
def __init__(self, transport, policies=None):
# type: (HttpTransport, List[Union[HTTPPolicy, SansIOHTTPPolicy]]) -> None
self._impl_policies = [] # type: List[HTTPPolicy]
self._transport = transport # type: HTTPPolicy
for policy in (policies or []):
if isinstance(policy, SansIOHTTPPolicy):
self._impl_policies.append(_SansIOHTTPPolicyRunner(policy))
elif policy:
self._impl_policies.append(policy)
for index in range(len(self._impl_policies)-1):
self._impl_policies[index].next = self._impl_policies[index+1]
if self._impl_policies:
self._impl_policies[-1].next = _TransportRunner(self._transport)
def run(self, request, **kwargs):
# type: (HTTPRequestType, Any) -> PipelineResponse
context = PipelineContext(self._transport, **kwargs)
pipeline_request = PipelineRequest(request, context) # type: PipelineRequest[HTTPRequestType]
first_node = self._impl_policies[0] if self._impl_policies else _TransportRunner(self._transport)
return first_node.send(pipeline_request) # type: ignore
```
## Credentials
### Token Credential Protocols
Clients from the Azure SDK often require a credential instance in their constructors. Azure Core offers several protocols for credential types that provide OAuth tokens. The main protocols are `SupportsTokenInfo` (preferred) and `TokenCredential` (legacy).
#### SupportsTokenInfo and AsyncSupportsTokenInfo protocols (preferred)
These protocols are the preferred way to implement new credential types in the Azure SDK. They are capable of providing enhanced token information and also provide a more structured approach to token requests compared to the legacy `TokenCredential` protocol. New credential implementations should aim to implement these protocols.
The `SupportsTokenInfo` protocol specifies a class that implements `get_token_info` which returns an `AccessTokenInfo` object which contains the token string, its expiration time, and additional properties such as `refresh_on` and `token_type`.
```python
class AccessTokenInfo:
"""Information about an OAuth access token.
This class is an alternative to `AccessToken` which provides additional
information about the token.
"""
token: str
"""The token string."""
expires_on: int
"""The token's expiration time in Unix time."""
token_type: str
"""The type of access token."""
refresh_on: Optional[int]
"""Specifies the time, in Unix time, when the cached token should be proactively
refreshed. Optional."""
class SupportsTokenInfo(Protocol, ContextManager["SupportsTokenInfo"]):
"""Protocol for classes able to provide OAuth access tokens with additional properties."""
def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptions] = None) -> AccessTokenInfo:
"""Request an access token for `scopes`.
:param str scopes: The type of access needed.
:keyword options: A dictionary of options for the token request. Unknown options will be ignored.
:paramtype options: TokenRequestOptions
:rtype: AccessTokenInfo
:return: An AccessTokenInfo instance containing information about the token.
"""
def close(self) -> None:
...
```
The async version `AsyncSupportsTokenInfo` provides the same functionality but with async/await support and requires implementation of the async context manager protocol (`__aenter__`, `__aexit__`, and `close` methods should be implemented).
The `get_token_info` methods use `TokenRequestOptions` to handle token request parameters in a more structured way:
```python
class TokenRequestOptions(TypedDict, total=False):
claims: str # Additional claims required in the token
tenant_id: str # The tenant ID for the token request
enable_cae: bool # Whether to enable Continuous Access Evaluation
```
#### TokenCredential protocol (legacy)
While still supported, the `TokenCredential` protocol is considered legacy as it has extensibility limitations. It is recommended to use `SupportsTokenInfo` for new credential implementations. Generally, to ensure compatibility with existing clients, new credential implementations should implement both `SupportsTokenInfo` and `TokenCredential`.
The `TokenCredential` protocol specifies a class that has a single method -- `get_token` -- which returns an
`AccessToken`: a `NamedTuple` containing a `token` string and an `expires_on` integer (in Unix time).
```python
AccessToken = NamedTuple("AccessToken", [("token", str), ("expires_on", int)])
class TokenCredential(Protocol):
"""Protocol for classes able to provide OAuth tokens."""
def get_token(
self,
*scopes: str,
claims: Optional[str] = None,
tenant_id: Optional[str] = None,
enable_cae: bool = False,
**kwargs: Any,
) -> AccessToken:
"""Request an access token for `scopes`.
:param str scopes: The type(s) of access needed.
:keyword str claims: Additional claims required in the token, such as those returned in a resource
provider's claims challenge following an authorization failure.
:keyword str tenant_id: Optional tenant to include in the token request.
:keyword bool enable_cae: Indicates whether to enable Continuous Access Evaluation (CAE) for the requested
token. Defaults to False.
:rtype: AccessToken
:return: An AccessToken instance containing the token string and its expiration time in Unix time.
"""
```
The async version `AsyncTokenCredential` provides the same functionality but with async/await support and also requires implementation of the async context manager protocol (`__aenter__`, `__aexit__`, and `close` methods should be implemented).
If a `TokenCredential` implementation doesn't have a use for a keyword argument in a given scenario, the documentation for the implementation should mention that this keyword argument will not be used when making token requests, as well as any potential consequences of this. For example, if a `TokenCredential` implementation doesn't use `tenant_id`, it should document that fetched tokens may not authorize requests made to the specified tenant.
When implementing the `get_token` method, ensure all keyword arguments are explicitly defined rather than using `**kwargs`. This approach prevents unintended keyword arguments from being passed to the HTTP transport layer, which could lead to unexpected behavior. The `get_token_info` method in `SupportsTokenInfo` does not have this issue, as it uses a `TokenRequestOptions` object to handle token request parameters.
### Implementation Guidance
When implementing a new credential type:
1. Implement `SupportsTokenInfo`/`AsyncSupportsTokenInfo` as your primary protocol
2. If backwards compatibility is needed:
- Implement `TokenCredential`/`AsyncTokenCredential` as a secondary protocol
- Convert `get_token_info` results to `AccessToken` in the `get_token` implementation
Example structure for a new credential implementation:
```python
from azure.core.credentials import AccessToken, AccessTokenInfo, TokenRequestOptions
class MyNewCredential(SupportsTokenInfo):
def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptions] = None) -> AccessTokenInfo:
# Primary implementation
...
def get_token(
self,
*scopes: str,
claims: Optional[str] = None,
tenant_id: Optional[str] = None,
enable_cae: bool = False,
**kwargs: Any,
) -> AccessToken:
# Secondary implementation for backwards compatibility
options: TokenRequestOptions = {}
if tenant_id:
options["tenant_id"] = tenant_id
if claims:
options["claims"] = claims
options["enable_cae"] = enable_cae
token_info = self.get_token_info(*scopes, options=options)
return AccessToken(token_info.token, token_info.expires_on)
```
The [`azure-identity`][identity_github] package has a number of credentials that implement both protocols, and serves as a good reference for implementing new credentials. For example, the [`InteractiveCredential`][interactive_cred] is used as a base class for multiple credentials and uses `claims` and `tenant_id` in token requests.
### Known uses of token request parameters
**`claims`**
| Service/Feature | Reason |
| --- | --- |
| [Continuous Access Evaluation (CAE)][cae_doc] | Respond to claim challenges when unexpired tokens have access revoked
**`tenant_id`**
| Service/Feature | Reason |
| --- | --- |
| Key Vault ([example][kv_tenant_id]) | Request access in a tenant that was discovered as part of an authentication challenge
**`enable_cae`**
| Service/Feature | Reason |
| --- | --- |
| [Continuous Access Evaluation (CAE)][cae_doc] | Indicates that handling CAE claim challenges is supported and that a CAE-enabled token should be requested
### BearerTokenCredentialPolicy and AsyncBearerTokenCredentialPolicy
`BearerTokenCredentialPolicy` and `AsyncBearerTokenCredentialPolicy` are HTTP policies that are used to authenticate requests to services that accept bearer tokens in their authorization headers. These credential policies take `SupportsTokenInfo`/`TokenCredential` instances and scopes as parameters in their constructors. The `SupportsTokenInfo`/`TokenCredential` instance is used to get an access token for the scopes, and the policy adds the token to the request's authorization header.
Both of these policies also accept an `enable_cae` keyword argument that is passed to the `SupportsTokenInfo`/`TokenCredential` instance's `get_token_info`/`get_token` method if set to `True`. This argument is used to indicate that the requested token should be [CAE-enabled][cae_doc]. If an SDK's service supports CAE, it should set this value to `True` when creating the policy.
```python
from azure.core.pipeline.policies import BearerTokenCredentialPolicy
authentication_policy = BearerTokenCredentialPolicy(credential, scopes, enable_cae=True)
```
## Long-running operation (LRO) customization
See [doc/dev/customize_long_running_operation.md](https://github.com/Azure/azure-sdk-for-python/blob/main/doc/dev/customize_long_running_operation.md) for more information.
[cae_doc]: https://learn.microsoft.com/azure/active-directory/conditional-access/concept-continuous-access-evaluation
[custom_creds_sample]: https://github.com/Azure/azure-sdk-for-python/blob/fc95f8d3d84d076ffea158116ca1bf6912689c70/sdk/identity/azure-identity/samples/custom_credentials.py
[identity_github]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/identity/azure-identity
[interactive_cred]: https://github.com/Azure/azure-sdk-for-python/blob/58c974883123b10b1ca9249ac49109220facb02f/sdk/identity/azure-identity/azure/identity/_internal/interactive.py
[kv_tenant_id]: https://github.com/Azure/azure-sdk-for-python/blob/0a0cc97f178a7476ec79f29c090b8c93ad5d4955/sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_shared/challenge_auth_policy.py#L102
|