|
| 1 | +//! Defines a `TokenFetcher` struct that will automatically refresh tokens |
| 2 | +//! at some configured time prior to the token's expiration. |
| 3 | +
|
| 4 | +use crate::auth::{JwtClaims, Token}; |
| 5 | +use crate::credentials::Credentials; |
| 6 | +use crate::{get_token_with_client, Result}; |
| 7 | + |
| 8 | +use arc_swap::ArcSwapOption; |
| 9 | +use reqwest::Client; |
| 10 | +use smpl_jwt::Jwt; |
| 11 | +use std::sync::Arc; |
| 12 | +use time::{Duration, OffsetDateTime}; |
| 13 | + |
| 14 | +/// A `TokenFetcher` stores a `Token` on first fetch and will continue returning |
| 15 | +/// that token until it needs to be refreshed, as determined by the token's |
| 16 | +/// `expires_in` field and the configured `refresh_buffer`. |
| 17 | +/// |
| 18 | +/// Specifically on each token fetch request, it will check the current time |
| 19 | +/// against the expected time the currently stored token will expire. If it |
| 20 | +/// is within the `refresh_buffer` window, it will fetch a new token, store |
| 21 | +/// that (along with the new expired time), and return the new token. |
| 22 | +pub struct TokenFetcher { |
| 23 | + client: Client, |
| 24 | + jwt: Jwt<JwtClaims>, |
| 25 | + credentials: Credentials, |
| 26 | + token_state: ArcSwapOption<TokenState>, |
| 27 | + refresh_buffer: Duration, |
| 28 | +} |
| 29 | + |
| 30 | +struct TokenState { |
| 31 | + /// The currently stored token |
| 32 | + token: Token, |
| 33 | + /// The lower bound of the time at which the token needs to be refreshed |
| 34 | + refresh_at: OffsetDateTime, |
| 35 | +} |
| 36 | + |
| 37 | +impl TokenFetcher { |
| 38 | + pub fn new( |
| 39 | + jwt: Jwt<JwtClaims>, |
| 40 | + credentials: Credentials, |
| 41 | + refresh_buffer: Duration |
| 42 | + ) -> TokenFetcher { |
| 43 | + TokenFetcher::with_client(Client::new(), jwt, credentials, refresh_buffer) |
| 44 | + } |
| 45 | + |
| 46 | + pub fn with_client( |
| 47 | + client: Client, |
| 48 | + jwt: Jwt<JwtClaims>, |
| 49 | + credentials: Credentials, |
| 50 | + refresh_buffer: Duration |
| 51 | + ) -> TokenFetcher { |
| 52 | + let token_state = ArcSwapOption::from(None); |
| 53 | + |
| 54 | + TokenFetcher { |
| 55 | + client, |
| 56 | + jwt, |
| 57 | + credentials, |
| 58 | + token_state, |
| 59 | + refresh_buffer, |
| 60 | + } |
| 61 | + } |
| 62 | + |
| 63 | + /// Returns a token if the token is still considered "valid" per the |
| 64 | + /// currently stored token's `expires_in` field and the configured |
| 65 | + /// `refresh_buffer`. If it is, return the stored token. If not, |
| 66 | + /// fetch a new token, store it, and return the new token. |
| 67 | + pub async fn fetch_token(&self) -> Result<Token> { |
| 68 | + let token_state = self.token_state.load(); |
| 69 | + |
| 70 | + match &*token_state { |
| 71 | + // First time calling `fetch_token` since initialization, so fetch |
| 72 | + // a token. |
| 73 | + None => self.get_token().await, |
| 74 | + Some(token_state) => { |
| 75 | + let now = OffsetDateTime::now_utc(); |
| 76 | + |
| 77 | + if now >= token_state.refresh_at { |
| 78 | + // We have an existing token but it is time to refresh it |
| 79 | + self.get_token().await |
| 80 | + } else { |
| 81 | + // We have an existing, valid token, so return immediately |
| 82 | + Ok(token_state.token.clone()) |
| 83 | + } |
| 84 | + }, |
| 85 | + } |
| 86 | + } |
| 87 | + |
| 88 | + /// Refresh the token |
| 89 | + async fn get_token(&self) -> Result<Token> { |
| 90 | + let now = OffsetDateTime::now_utc(); |
| 91 | + |
| 92 | + let token = get_token_with_client(&self.client, &self.jwt, &self.credentials).await?; |
| 93 | + let expires_in = Duration::new(token.expires_in().into(), 0); |
| 94 | + |
| 95 | + assert!(expires_in >= self.refresh_buffer, "Received a token whose expires_in is less than the configured refresh buffer!"); |
| 96 | + |
| 97 | + let refresh_at = now + (expires_in - self.refresh_buffer); |
| 98 | + let token_state = TokenState { |
| 99 | + token: token.clone(), |
| 100 | + refresh_at, |
| 101 | + }; |
| 102 | + |
| 103 | + self.token_state.swap(Some(Arc::new(token_state))); |
| 104 | + Ok(token) |
| 105 | + } |
| 106 | +} |
| 107 | + |
| 108 | +#[cfg(test)] |
| 109 | +mod tests { |
| 110 | + use crate::auth::{JwtClaims, Token}; |
| 111 | + use crate::credentials::Credentials; |
| 112 | + use crate::fetcher::TokenFetcher; |
| 113 | + use crate::scopes::Scope; |
| 114 | + use mockito::{self, mock}; |
| 115 | + use smpl_jwt::Jwt; |
| 116 | + use std::thread; |
| 117 | + use std::time::{Duration as StdDuration}; |
| 118 | + use time::Duration; |
| 119 | + |
| 120 | + fn get_mocks() -> (Jwt<JwtClaims>, Credentials) { |
| 121 | + let token_url = mockito::server_url(); |
| 122 | + let iss = "some_iss"; |
| 123 | + |
| 124 | + let mut credentials = Credentials::from_file("dummy_credentials_file_for_tests.json").unwrap(); |
| 125 | + credentials.token_uri = token_url.clone(); |
| 126 | + |
| 127 | + let claims = JwtClaims::new( |
| 128 | + String::from(iss), |
| 129 | + &Scope::DevStorageReadWrite, |
| 130 | + String::from(token_url.clone()), |
| 131 | + None, |
| 132 | + None, |
| 133 | + ); |
| 134 | + |
| 135 | + let jwt = Jwt::new(claims, credentials.rsa_key().unwrap(), None); |
| 136 | + |
| 137 | + (jwt, credentials) |
| 138 | + } |
| 139 | + |
| 140 | + fn token_json(access_token: &str, token_type: &str, expires_in: u32) -> (Token, String) { |
| 141 | + let json = serde_json::json!({ |
| 142 | + "access_token": access_token.to_string(), |
| 143 | + "token_type": token_type.to_string(), |
| 144 | + "expires_in": expires_in |
| 145 | + }); |
| 146 | + |
| 147 | + let token = serde_json::from_value(json.clone()).unwrap(); |
| 148 | + |
| 149 | + (token, json.to_string()) |
| 150 | + } |
| 151 | + |
| 152 | + #[tokio::test] |
| 153 | + async fn basic_token_fetch() { |
| 154 | + let (jwt, credentials) = get_mocks(); |
| 155 | + |
| 156 | + let refresh_buffer = Duration::new(0, 0); |
| 157 | + let fetcher = TokenFetcher::new(jwt, credentials, refresh_buffer); |
| 158 | + |
| 159 | + let (expected_token, json) = token_json("token", "Bearer", 1); |
| 160 | + |
| 161 | + let _mock = mock("POST", "/") |
| 162 | + .with_status(200) |
| 163 | + .with_body(json) |
| 164 | + .create(); |
| 165 | + |
| 166 | + let token = fetcher.fetch_token().await.unwrap(); |
| 167 | + assert_eq!(expected_token, token); |
| 168 | + } |
| 169 | + |
| 170 | + #[tokio::test] |
| 171 | + async fn basic_token_refresh() { |
| 172 | + let (jwt, credentials) = get_mocks(); |
| 173 | + |
| 174 | + let refresh_buffer = Duration::new(0, 0); |
| 175 | + let fetcher = TokenFetcher::new(jwt, credentials, refresh_buffer); |
| 176 | + |
| 177 | + let expires_in = 1; |
| 178 | + let (_expected_token, json) = token_json("token", "Bearer", expires_in); |
| 179 | + |
| 180 | + let mock = mock("POST", "/") |
| 181 | + .with_status(200) |
| 182 | + .with_body(json) |
| 183 | + .expect(2) // we expect to be hit twice due to refresh |
| 184 | + .create(); |
| 185 | + |
| 186 | + // this should work |
| 187 | + fetcher.fetch_token().await.unwrap(); |
| 188 | + |
| 189 | + // sleep for `expires_in` |
| 190 | + thread::sleep(StdDuration::from_secs(expires_in.into())); |
| 191 | + |
| 192 | + // this should refresh |
| 193 | + fetcher.fetch_token().await.unwrap(); |
| 194 | + |
| 195 | + mock.assert(); |
| 196 | + } |
| 197 | + |
| 198 | + #[tokio::test] |
| 199 | + async fn token_refresh_with_buffer() { |
| 200 | + let (jwt, credentials) = get_mocks(); |
| 201 | + |
| 202 | + let refresh_buffer = 4; |
| 203 | + let fetcher = TokenFetcher::new(jwt, credentials, Duration::new(refresh_buffer, 0)); |
| 204 | + |
| 205 | + let expires_in = 5; |
| 206 | + let (_expected_token, json) = token_json("token", "Bearer", expires_in); |
| 207 | + |
| 208 | + let mock = mock("POST", "/") |
| 209 | + .with_status(200) |
| 210 | + .with_body(json) |
| 211 | + .expect(2) // we expect to be hit twice due to refresh |
| 212 | + .create(); |
| 213 | + |
| 214 | + // this should work |
| 215 | + fetcher.fetch_token().await.unwrap(); |
| 216 | + |
| 217 | + // sleep for `expires_in` |
| 218 | + let sleep_for = expires_in - (refresh_buffer as u32); |
| 219 | + thread::sleep(StdDuration::from_secs(sleep_for.into())); |
| 220 | + |
| 221 | + // this should refresh |
| 222 | + fetcher.fetch_token().await.unwrap(); |
| 223 | + |
| 224 | + mock.assert(); |
| 225 | + } |
| 226 | + |
| 227 | + #[tokio::test] |
| 228 | + async fn doesnt_token_refresh_unnecessarily() { |
| 229 | + let (jwt, credentials) = get_mocks(); |
| 230 | + |
| 231 | + let refresh_buffer = Duration::new(0, 0); |
| 232 | + let fetcher = TokenFetcher::new(jwt, credentials, refresh_buffer); |
| 233 | + |
| 234 | + let expires_in = 1; |
| 235 | + let (_expected_token, json) = token_json("token", "Bearer", expires_in); |
| 236 | + |
| 237 | + let mock = mock("POST", "/") |
| 238 | + .with_status(200) |
| 239 | + .with_body(json) |
| 240 | + .expect(1) // we expect to be hit only once |
| 241 | + .create(); |
| 242 | + |
| 243 | + // this should work |
| 244 | + fetcher.fetch_token().await.unwrap(); |
| 245 | + |
| 246 | + // fetch again, should not refresh |
| 247 | + fetcher.fetch_token().await.unwrap(); |
| 248 | + |
| 249 | + mock.assert(); |
| 250 | + } |
| 251 | +} |
0 commit comments