forked from AzureAD/microsoft-authentication-library-for-go
-
Notifications
You must be signed in to change notification settings - Fork 0
/
username_password_sample.go
53 lines (48 loc) · 1.5 KB
/
username_password_sample.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT license.
package main
import (
"context"
"fmt"
"log"
"github.com/doruk-gercel/microsoft-authentication-library-for-go/apps/public"
)
func acquireByUsernamePasswordPublic() {
config := CreateConfig("config.json")
app, err := public.New(config.ClientID, public.WithCache(cacheAccessor), public.WithAuthority(config.Authority))
if err != nil {
panic(err)
}
// look in the cache to see if the account to use has been cached
var userAccount public.Account
accounts := app.Accounts()
for _, account := range accounts {
if account.PreferredUsername == config.Username {
userAccount = account
}
}
// found a cached account, now see if an applicable token has been cached
// NOTE: this API conflates error states, i.e. err is non-nil if an applicable token isn't
// cached or if something goes wrong (making the HTTP request, unmarshalling, etc).
result, err := app.AcquireTokenSilent(
context.Background(),
config.Scopes,
public.WithSilentAccount(userAccount),
)
if err != nil {
// either there's no applicable token in the cache or something failed
log.Println(err)
// either there was no cached account/token or the call to AcquireTokenSilent() failed
// make a new request to AAD
result, err = app.AcquireTokenByUsernamePassword(
context.Background(),
config.Scopes,
config.Username,
config.Password,
)
if err != nil {
log.Fatal(err)
}
}
fmt.Println("Access token is " + result.AccessToken)
}