-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refresh expired access tokens #56
base: master
Are you sure you want to change the base?
Changes from 9 commits
1a76e62
9f0c3f4
0a0b106
cbfa368
ba38ad2
65e81fc
5327380
448624e
1c0b548
94ad054
9339b82
e8d25b9
67c8543
b0c3f83
a4f5e2c
069e4b5
26f2b34
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -114,26 +114,29 @@ | |
|
||
(defn- access-token-http-options | ||
[{:keys [access-token-uri client-id client-secret basic-auth?] | ||
:or {basic-auth? false} :as profile} | ||
request] | ||
:or {basic-auth? false}} | ||
form-params] | ||
(let [opts {:method :post | ||
:url access-token-uri | ||
:accept :json | ||
:as :json | ||
:form-params (request-params profile request)}] | ||
:form-params form-params}] | ||
(if basic-auth? | ||
(add-header-credentials opts client-id client-secret) | ||
(add-form-credentials opts client-id client-secret)))) | ||
|
||
(defn- get-access-token | ||
([profile request] | ||
(-> (http/request (access-token-http-options profile request)) | ||
(-> (access-token-http-options profile (request-params profile request)) | ||
http/request | ||
(format-access-token))) | ||
([profile request respond raise] | ||
(http/request (-> (access-token-http-options profile request) | ||
(assoc :async? true)) | ||
(comp respond format-access-token) | ||
raise))) | ||
(http/request | ||
(-> (access-token-http-options profile | ||
(request-params profile request)) | ||
(assoc :async? true)) | ||
(comp respond format-access-token) | ||
raise))) | ||
|
||
(defn state-mismatch-handler | ||
([_] | ||
|
@@ -188,33 +191,124 @@ | |
(respond (redirect-response profile session token))) | ||
raise))))) | ||
|
||
(defn- assoc-access-tokens [request] | ||
(if-let [tokens (-> request :session ::access-tokens)] | ||
(defn- expired-access-tokens | ||
[access-tokens] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We can omit the newline before the argument list if it all fits on one line, e.g. (defn- expired-access-tokens [access-tokens] Is just as clear and uses less vertical whitespace. |
||
(let [now (Date.) | ||
expired-access-token? (fn [[_ {:keys [expires refresh-token]}]] | ||
(and refresh-token expires | ||
(.before expires now)))] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I don't think we need to bother factoring the There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
you are right that this has 0 practical impact, I will make the change tomorrow 😄 |
||
(->> access-tokens (filter expired-access-token?) (into {})))) | ||
|
||
(defn- update-tokens | ||
[access-tokens [profile-key maybe-grant]] | ||
(if maybe-grant | ||
;; `update ... merge` to properly handle case where authorization server | ||
;; does not update the refresh token after use and we should re-use the | ||
;; existing refresh token | ||
(update access-tokens profile-key merge maybe-grant) | ||
(dissoc access-tokens profile-key))) | ||
|
||
(def refresh-socket-timeout 60000) | ||
|
||
(defn- refresh-one-token | ||
([profile refresh-token] | ||
(-> (access-token-http-options | ||
profile | ||
{:grant_type "refresh_token" :refresh_token refresh-token}) | ||
(assoc :socket-timeout refresh-socket-timeout) | ||
http/request | ||
format-access-token)) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think this would be clearer: (-> (http/request (refresh-token-http-options profile refresh-token))
(format-access-token)) |
||
([profile refresh-token respond raise] | ||
(-> (access-token-http-options | ||
profile | ||
{:grant_type "refresh_token" | ||
:refresh_token refresh-token}) | ||
(assoc :async? true | ||
:socket-timeout refresh-socket-timeout) | ||
(http/request (comp respond format-access-token) raise)))) | ||
|
||
(defn- refresh-all-tokens | ||
([profiles access-tokens] | ||
(let [refresh-results | ||
(for [[profile-key {:keys [refresh-token]}] (expired-access-tokens | ||
access-tokens) | ||
:let [profile (profile-key profiles)] | ||
:when (and profile refresh-token)] | ||
[profile-key | ||
(try (refresh-one-token profile refresh-token) | ||
(catch clojure.lang.ExceptionInfo _ | ||
nil))])] | ||
(reduce update-tokens access-tokens refresh-results))) | ||
([profiles access-tokens respond] | ||
;; strategy: launch all requests concurrently, keeping track of completed | ||
;; requests in `results`. When all requests have finished, respond. | ||
(let [expired (expired-access-tokens access-tokens) | ||
total (count expired) | ||
results (atom {}) ;; map from profile-key to result | ||
respond-when-done! #(when (= (count @results) total) | ||
(respond (reduce update-tokens | ||
access-tokens @results)))] | ||
(if (zero? total) | ||
(respond access-tokens) | ||
(doseq [[profile-key {:keys [refresh-token]}] expired | ||
:let [profile (profile-key profiles)] | ||
:when (and profile refresh-token)] | ||
(refresh-one-token profile refresh-token | ||
(fn [refresh-result] | ||
(swap! results assoc profile-key refresh-result) | ||
(respond-when-done!)) | ||
(fn [_] | ||
(swap! results assoc profile-key nil) | ||
(respond-when-done!)))))))) | ||
|
||
(defn- assoc-access-tokens-in-request [request tokens] | ||
(if tokens | ||
(assoc request :oauth2/access-tokens tokens) | ||
request)) | ||
|
||
(defn- assoc-access-tokens-in-response | ||
[response tokens] | ||
(if tokens | ||
(assoc-in response [:session ::access-tokens] tokens) | ||
response)) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This assumes a |
||
|
||
(defn- parse-redirect-url [{:keys [redirect-uri]}] | ||
(.getPath (java.net.URI. redirect-uri))) | ||
|
||
(defn- valid-profile? [{:keys [client-id client-secret]}] | ||
(and (some? client-id) (some? client-secret))) | ||
|
||
(defn wrap-oauth2 [handler profiles] | ||
(defn wrap-oauth2 | ||
[handler profiles] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Newline can be omitted. |
||
{:pre [(every? valid-profile? (vals profiles))]} | ||
(let [profiles (for [[k v] profiles] (assoc v :id k)) | ||
launches (into {} (map (juxt :launch-uri identity)) profiles) | ||
redirects (into {} (map (juxt parse-redirect-url identity)) profiles)] | ||
(let [id-profiles (for [[k v] profiles] (assoc v :id k)) | ||
launches (into {} (map (juxt :launch-uri identity)) id-profiles) | ||
redirects (into {} (map (juxt parse-redirect-url identity)) id-profiles)] | ||
weavejester marked this conversation as resolved.
Show resolved
Hide resolved
|
||
(fn | ||
([{:keys [uri] :as request}] | ||
(if-let [profile (launches uri)] | ||
((make-launch-handler profile) request) | ||
(if-let [profile (redirects uri)] | ||
((:redirect-handler profile (make-redirect-handler profile)) request) | ||
(handler (assoc-access-tokens request))))) | ||
(let [access-tokens (->> (get-in request [:session ::access-tokens]) | ||
(refresh-all-tokens profiles))] | ||
(-> request | ||
(assoc-access-tokens-in-request access-tokens) | ||
handler | ||
(assoc-access-tokens-in-response access-tokens)))))) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This could probably be factored out into it's own function. So something like: (defn- wrap-refresh-access-tokens [handler profiles]
(fn
([request] ...)
([request respond raise] ...))) It should also only update the session if access tokens have expired or refreshed, otherwise the session should not be touched. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I am not sure updating the session in the response if changed is a good idea, as for users this might be rather surprising: If they previously relied on the But now that I think about this, we have to be careful as to not prevent users from implementing logout in There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The rules that govern the session middleware are:
While it's possible to always replace the session with an identical result, it's not necessary and adds a session write command that may not be necessary. This might be a database update, for example. For that reason we need to only write the session if we want to alter it. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks for the clarification; The performance overhead is a strong point and I have changed the behavior to only update the |
||
([{:keys [uri] :as request} respond raise] | ||
(if-let [profile (launches uri)] | ||
((make-launch-handler profile) request respond raise) | ||
(if-let [profile (redirects uri)] | ||
((:redirect-handler profile (make-redirect-handler profile)) | ||
request respond raise) | ||
(handler (assoc-access-tokens request) respond raise))))))) | ||
(let [access-tokens (get-in request [:session ::access-tokens]) | ||
respond (fn [access-tokens] | ||
(handler | ||
(assoc-access-tokens-in-request | ||
request access-tokens) | ||
(comp respond | ||
#(assoc-access-tokens-in-response | ||
% access-tokens)) | ||
raise))] | ||
(refresh-all-tokens profiles access-tokens respond)))))))) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why has
request-params
been moved out here? I don't understand how this change connects to the token refreshes. Can you explain?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah I should have left a comment for this change, it's a bit confusing: I am trying to re-use
access-token-http-options
for the refresh http request as they share the same URL and credentials logic, except for theform-params
, hence i extracted it as a parameter (in place of constructing those from therequest
).If you feel this is convoluted, a possible alternative would be to
assoc
the:form-params
in the caller, same as the:async
is currently set from outside.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In which case, let's name things correctly. We can divide this into three functions:
token-http-options
to contain the common codeaccess-token-http-options
to operate as beforerefresh-token-http-options
to contain the options for refreshing tokens.That way things are named correctly, and it makes the code a little more understandable later on.