33from azure .identity import DefaultAzureCredential , ManagedIdentityCredential
44from datetime import datetime , timedelta , timezone
55from typing import Optional
6+ import durabletask .internal .shared as shared
67
78# By default, when there's 10minutes left before the token expires, refresh the token
89class AccessTokenManager :
@@ -12,6 +13,7 @@ def __init__(self, refresh_buffer: int = 600, metadata: Optional[list[tuple[str,
1213 self ._use_managed_identity = False
1314 self ._metadata = metadata
1415 self ._client_id = None
16+ self ._logger = shared .get_logger ("token_manager" )
1517
1618 if metadata : # Ensure metadata is not None
1719 for key , value in metadata :
@@ -23,14 +25,14 @@ def __init__(self, refresh_buffer: int = 600, metadata: Optional[list[tuple[str,
2325 # Choose the appropriate credential based on use_managed_identity
2426 if self ._use_managed_identity :
2527 if not self ._client_id :
26- print ("Using System Assigned Managed Identity for authentication." )
28+ self . _logger . debug ("Using System Assigned Managed Identity for authentication." )
2729 self .credential = ManagedIdentityCredential ()
2830 else :
29- print ("Using User Assigned Managed Identity for authentication." )
31+ self . _logger . debug ("Using User Assigned Managed Identity for authentication." )
3032 self .credential = ManagedIdentityCredential (client_id = self ._client_id )
3133 else :
3234 self .credential = DefaultAzureCredential ()
33- print ("Using Default Azure Credentials for authentication." )
35+ self . _logger . debug ("Using Default Azure Credentials for authentication." )
3436
3537 self .token = None
3638 self .expiry_time = None
@@ -54,4 +56,4 @@ def refresh_token(self):
5456
5557 # Convert UNIX timestamp to timezone-aware datetime
5658 self .expiry_time = datetime .fromtimestamp (new_token .expires_on , tz = timezone .utc )
57- print (f"Token refreshed. Expires at: { self .expiry_time } " )
59+ self . _logger . debug (f"Token refreshed. Expires at: { self .expiry_time } " )
0 commit comments