|
3 | 3 | * Licensed under the MIT License. See License.txt in the project root for license information.
|
4 | 4 | *--------------------------------------------------------------------------------------------*/
|
5 | 5 | import { AccountInfo, AuthenticationResult, ClientAuthError, ClientAuthErrorCodes, ServerError } from '@azure/msal-node';
|
6 |
| -import { AuthenticationGetSessionOptions, AuthenticationProvider, AuthenticationProviderAuthenticationSessionsChangeEvent, AuthenticationProviderSessionOptions, AuthenticationSession, AuthenticationSessionAccountInformation, CancellationError, env, EventEmitter, ExtensionContext, l10n, LogOutputChannel, Uri, window } from 'vscode'; |
| 6 | +import { AuthenticationGetSessionOptions, AuthenticationProvider, AuthenticationProviderAuthenticationSessionsChangeEvent, AuthenticationProviderSessionOptions, AuthenticationSession, AuthenticationSessionAccountInformation, CancellationError, EventEmitter, ExtensionContext, ExtensionKind, l10n, LogOutputChannel, window } from 'vscode'; |
7 | 7 | import { Environment } from '@azure/ms-rest-azure-env';
|
8 | 8 | import { CachedPublicClientApplicationManager } from './publicClientCache';
|
9 |
| -import { UriHandlerLoopbackClient } from '../common/loopbackClientAndOpener'; |
10 | 9 | import { UriEventHandler } from '../UriEventHandler';
|
11 | 10 | import { ICachedPublicClientApplication } from '../common/publicClientCache';
|
12 | 11 | import { MicrosoftAccountType, MicrosoftAuthenticationTelemetryReporter } from '../common/telemetryReporter';
|
13 |
| -import { loopbackTemplate } from './loopbackTemplate'; |
14 | 12 | import { ScopeData } from '../common/scopeData';
|
15 | 13 | import { EventBufferer } from '../common/event';
|
16 | 14 | import { BetterTokenStorage } from '../betterSecretStorage';
|
17 | 15 | import { IStoredSession } from '../AADHelper';
|
| 16 | +import { ExtensionHost, getMsalFlows } from './flows'; |
18 | 17 |
|
19 | 18 | const redirectUri = 'https://vscode.dev/redirect';
|
20 | 19 | const MSA_TID = '9188040d-6c67-4c5b-b112-36a304b66dad';
|
@@ -187,86 +186,70 @@ export class MsalAuthProvider implements AuthenticationProvider {
|
187 | 186 |
|
188 | 187 | this._logger.info('[createSession]', `[${scopeData.scopeStr}]`, 'starting');
|
189 | 188 | const cachedPca = await this.getOrCreatePublicClientApplication(scopeData.clientId, scopeData.tenant);
|
190 |
| - let result: AuthenticationResult | undefined; |
191 |
| - |
192 |
| - try { |
193 |
| - const windowHandle = window.nativeHandle ? Buffer.from(window.nativeHandle) : undefined; |
194 |
| - result = await cachedPca.acquireTokenInteractive({ |
195 |
| - openBrowser: async (url: string) => { await env.openExternal(Uri.parse(url)); }, |
196 |
| - scopes: scopeData.scopesToSend, |
197 |
| - // The logic for rendering one or the other of these templates is in the |
198 |
| - // template itself, so we pass the same one for both. |
199 |
| - successTemplate: loopbackTemplate, |
200 |
| - errorTemplate: loopbackTemplate, |
201 |
| - // Pass the label of the account to the login hint so that we prefer signing in to that account |
202 |
| - loginHint: options.account?.label, |
203 |
| - // If we aren't logging in to a specific account, then we can use the prompt to make sure they get |
204 |
| - // the option to choose a different account. |
205 |
| - prompt: options.account?.label ? undefined : 'select_account', |
206 |
| - windowHandle |
207 |
| - }); |
208 |
| - } catch (e) { |
209 |
| - if (e instanceof CancellationError) { |
210 |
| - const yes = l10n.t('Yes'); |
211 |
| - const result = await window.showErrorMessage( |
212 |
| - l10n.t('Having trouble logging in?'), |
213 |
| - { |
214 |
| - modal: true, |
215 |
| - detail: l10n.t('Would you like to try a different way to sign in to your Microsoft account? ({0})', 'protocol handler') |
216 |
| - }, |
217 |
| - yes |
218 |
| - ); |
219 |
| - if (!result) { |
220 |
| - this._telemetryReporter.sendLoginFailedEvent(); |
221 |
| - throw e; |
222 |
| - } |
| 189 | + |
| 190 | + // Used for showing a friendlier message to the user when the explicitly cancel a flow. |
| 191 | + let userCancelled: boolean | undefined; |
| 192 | + const yes = l10n.t('Yes'); |
| 193 | + const no = l10n.t('No'); |
| 194 | + const promptToContinue = async (mode: string) => { |
| 195 | + if (userCancelled === undefined) { |
| 196 | + // We haven't had a failure yet so wait to prompt |
| 197 | + return; |
223 | 198 | }
|
224 |
| - // This error comes from the backend and is likely not due to the user's machine |
225 |
| - // failing to open a port or something local that would require us to try the |
226 |
| - // URL handler loopback client. |
227 |
| - if (e instanceof ServerError) { |
228 |
| - this._telemetryReporter.sendLoginFailedEvent(); |
229 |
| - throw e; |
| 199 | + const message = userCancelled |
| 200 | + ? l10n.t('Having trouble logging in? Would you like to try a different way? ({0})', mode) |
| 201 | + : l10n.t('You have not yet finished authorizing this extension to use your Microsoft Account. Would you like to try a different way? ({0})', mode); |
| 202 | + const result = await window.showWarningMessage(message, yes, no); |
| 203 | + if (result !== yes) { |
| 204 | + throw new CancellationError(); |
230 | 205 | }
|
| 206 | + }; |
231 | 207 |
|
232 |
| - // The user closed the modal window |
233 |
| - if ((e as ClientAuthError).errorCode === ClientAuthErrorCodes.userCanceled) { |
234 |
| - this._telemetryReporter.sendLoginFailedEvent(); |
235 |
| - throw e; |
236 |
| - } |
| 208 | + const flows = getMsalFlows({ |
| 209 | + extensionHost: typeof navigator === 'undefined' |
| 210 | + ? this._context.extension.extensionKind === ExtensionKind.UI ? ExtensionHost.Local : ExtensionHost.Remote |
| 211 | + : ExtensionHost.WebWorker, |
| 212 | + }); |
237 | 213 |
|
238 |
| - // The user wants to try the loopback client or we got an error likely due to spinning up the server |
239 |
| - const loopbackClient = new UriHandlerLoopbackClient(this._uriHandler, redirectUri, this._logger); |
| 214 | + let lastError: Error | undefined; |
| 215 | + for (const flow of flows) { |
| 216 | + if (flow !== flows[0]) { |
| 217 | + try { |
| 218 | + await promptToContinue(flow.label); |
| 219 | + } finally { |
| 220 | + this._telemetryReporter.sendLoginFailedEvent(); |
| 221 | + } |
| 222 | + } |
240 | 223 | try {
|
241 |
| - const windowHandle = window.nativeHandle ? Buffer.from(window.nativeHandle) : undefined; |
242 |
| - result = await cachedPca.acquireTokenInteractive({ |
243 |
| - openBrowser: (url: string) => loopbackClient.openBrowser(url), |
| 224 | + const result = await flow.trigger({ |
| 225 | + cachedPca, |
244 | 226 | scopes: scopeData.scopesToSend,
|
245 |
| - loopbackClient, |
246 | 227 | loginHint: options.account?.label,
|
247 |
| - prompt: options.account?.label ? undefined : 'select_account', |
248 |
| - windowHandle |
| 228 | + windowHandle: window.nativeHandle ? Buffer.from(window.nativeHandle) : undefined, |
| 229 | + logger: this._logger, |
| 230 | + uriHandler: this._uriHandler |
249 | 231 | });
|
| 232 | + |
| 233 | + const session = this.sessionFromAuthenticationResult(result, scopeData.originalScopes); |
| 234 | + this._telemetryReporter.sendLoginEvent(session.scopes); |
| 235 | + this._logger.info('[createSession]', `[${scopeData.scopeStr}]`, 'returned session'); |
| 236 | + this._onDidChangeSessionsEmitter.fire({ added: [session], changed: [], removed: [] }); |
| 237 | + return session; |
250 | 238 | } catch (e) {
|
251 |
| - this._telemetryReporter.sendLoginFailedEvent(); |
252 |
| - throw e; |
| 239 | + lastError = e; |
| 240 | + if (e instanceof ServerError || (e as ClientAuthError)?.errorCode === ClientAuthErrorCodes.userCanceled) { |
| 241 | + this._telemetryReporter.sendLoginFailedEvent(); |
| 242 | + throw e; |
| 243 | + } |
| 244 | + // Continue to next flow |
| 245 | + if (e instanceof CancellationError) { |
| 246 | + userCancelled = true; |
| 247 | + } |
253 | 248 | }
|
254 | 249 | }
|
255 | 250 |
|
256 |
| - if (!result) { |
257 |
| - this._telemetryReporter.sendLoginFailedEvent(); |
258 |
| - throw new Error('No result returned from MSAL'); |
259 |
| - } |
260 |
| - |
261 |
| - const session = this.sessionFromAuthenticationResult(result, scopeData.originalScopes); |
262 |
| - this._telemetryReporter.sendLoginEvent(session.scopes); |
263 |
| - this._logger.info('[createSession]', `[${scopeData.scopeStr}]`, 'returned session'); |
264 |
| - // This is the only scenario in which we need to fire the _onDidChangeSessionsEmitter out of band... |
265 |
| - // the badge flow (when the client passes no options in to getSession) will only remove a badge if a session |
266 |
| - // was created that _matches the scopes_ that that badge requests. See `onDidChangeSessions` for more info. |
267 |
| - // TODO: This should really be fixed in Core. |
268 |
| - this._onDidChangeSessionsEmitter.fire({ added: [session], changed: [], removed: [] }); |
269 |
| - return session; |
| 251 | + this._telemetryReporter.sendLoginFailedEvent(); |
| 252 | + throw lastError ?? new Error('No auth flow succeeded'); |
270 | 253 | }
|
271 | 254 |
|
272 | 255 | async removeSession(sessionId: string): Promise<void> {
|
|
0 commit comments