Skip to content
This repository has been archived by the owner on Jan 22, 2025. It is now read-only.

Commit

Permalink
v1.17: bigtable: fix AccessToken issues (backport of #34213) (#34238)
Browse files Browse the repository at this point in the history
bigtable: fix AccessToken issues (#34213)

* bigtable: fix AccessToken issue

* remove inner

* less changes

* fmt + drop lock

(cherry picked from commit 873bef9)

Co-authored-by: Kirill Fomichev <[email protected]>
  • Loading branch information
mergify[bot] and fanatid authored Nov 28, 2023
1 parent 4d79fd7 commit 67bfb48
Show file tree
Hide file tree
Showing 2 changed files with 47 additions and 39 deletions.
68 changes: 38 additions & 30 deletions storage-bigtable/src/access_token.rs
Original file line number Diff line number Diff line change
Expand Up @@ -91,41 +91,49 @@ impl AccessToken {
}

/// Call this function regularly to ensure the access token does not expire
pub async fn refresh(&self) {
pub fn refresh(&self) {
// Check if it's time to try a token refresh
{
let token_r = self.token.read().unwrap();
if token_r.1.elapsed().as_secs() < token_r.0.expires_in() as u64 / 2 {
return;
}
let token_r = self.token.read().unwrap();
if token_r.1.elapsed().as_secs() < token_r.0.expires_in() as u64 / 2 {
debug!("Token is not expired yet");
return;
}
drop(token_r);

#[allow(deprecated)]
if self
.refresh_active
.compare_and_swap(false, true, Ordering::Relaxed)
{
// Refresh already pending
return;
}
// Refresh already is progress
let refresh_progress =
self.refresh_active
.compare_exchange(false, true, Ordering::Relaxed, Ordering::Relaxed);
if refresh_progress.is_err() {
debug!("Token update is already in progress");
return;
}

info!("Refreshing token");
match time::timeout(
time::Duration::from_secs(5),
Self::get_token(&self.credentials, &self.scope),
)
.await
{
Ok(new_token) => match (new_token, self.token.write()) {
(Ok(new_token), Ok(mut token_w)) => *token_w = new_token,
(Ok(_new_token), Err(err)) => warn!("{}", err),
(Err(err), _) => warn!("{}", err),
},
Err(_) => {
warn!("Token refresh timeout")
let credentials = self.credentials.clone();
let scope = self.scope.clone();
let refresh_active = Arc::clone(&self.refresh_active);
let token = Arc::clone(&self.token);
tokio::spawn(async move {
match time::timeout(
time::Duration::from_secs(5),
Self::get_token(&credentials, &scope),
)
.await
{
Ok(new_token) => match new_token {
Ok(new_token) => {
let mut token_w = token.write().unwrap();
*token_w = new_token;
}
Err(err) => error!("Failed to fetch new token: {}", err),
},
Err(_timeout) => {
warn!("Token refresh timeout")
}
}
}
self.refresh_active.store(false, Ordering::Relaxed);
refresh_active.store(false, Ordering::Relaxed);
info!("Token refreshed");
});
}

/// Return an access token suitable for use in an HTTP authorization header
Expand Down
18 changes: 9 additions & 9 deletions storage-bigtable/src/bigtable.rs
Original file line number Diff line number Diff line change
Expand Up @@ -399,9 +399,9 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
Ok(rows)
}

async fn refresh_access_token(&self) {
fn refresh_access_token(&self) {
if let Some(ref access_token) = self.access_token {
access_token.refresh().await;
access_token.refresh();
}
}

Expand All @@ -423,7 +423,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
if rows_limit == 0 {
return Ok(vec![]);
}
self.refresh_access_token().await;
self.refresh_access_token();
let response = self
.client
.read_rows(ReadRowsRequest {
Expand Down Expand Up @@ -468,7 +468,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {

/// Check whether a row key exists in a `table`
pub async fn row_key_exists(&mut self, table_name: &str, row_key: RowKey) -> Result<bool> {
self.refresh_access_token().await;
self.refresh_access_token();

let response = self
.client
Expand Down Expand Up @@ -513,7 +513,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
if rows_limit == 0 {
return Ok(vec![]);
}
self.refresh_access_token().await;
self.refresh_access_token();
let response = self
.client
.read_rows(ReadRowsRequest {
Expand Down Expand Up @@ -547,7 +547,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
table_name: &str,
row_keys: &[RowKey],
) -> Result<Vec<(RowKey, RowData)>> {
self.refresh_access_token().await;
self.refresh_access_token();

let response = self
.client
Expand Down Expand Up @@ -583,7 +583,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
table_name: &str,
row_key: RowKey,
) -> Result<RowData> {
self.refresh_access_token().await;
self.refresh_access_token();

let response = self
.client
Expand Down Expand Up @@ -612,7 +612,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {

/// Delete one or more `table` rows
async fn delete_rows(&mut self, table_name: &str, row_keys: &[RowKey]) -> Result<()> {
self.refresh_access_token().await;
self.refresh_access_token();

let mut entries = vec![];
for row_key in row_keys {
Expand Down Expand Up @@ -658,7 +658,7 @@ impl<F: FnMut(Request<()>) -> InterceptedRequestResult> BigTable<F> {
family_name: &str,
row_data: &[(&RowKey, RowData)],
) -> Result<()> {
self.refresh_access_token().await;
self.refresh_access_token();

let mut entries = vec![];
for (row_key, row_data) in row_data {
Expand Down

0 comments on commit 67bfb48

Please sign in to comment.