Skip to content

Commit 13594a1

Browse files
bretambroseBret Ambrose
and
Bret Ambrose
authored
Async cognito support (#874)
Co-authored-by: Bret Ambrose <[email protected]>
1 parent 9b0be92 commit 13594a1

File tree

10 files changed

+615
-17
lines changed

10 files changed

+615
-17
lines changed

src/main/java/software/amazon/awssdk/crt/auth/credentials/CognitoCredentialsProvider.java

+38-4
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@
99
import java.nio.ByteBuffer;
1010
import java.nio.charset.Charset;
1111
import java.util.ArrayList;
12+
import java.util.List;
13+
import java.util.concurrent.CompletableFuture;
1214

1315
import software.amazon.awssdk.crt.http.HttpHeader;
1416
import software.amazon.awssdk.crt.http.HttpProxyOptions;
@@ -47,6 +49,7 @@ static public class CognitoCredentialsProviderBuilder {
4749
private String identity;
4850
private String customRoleArn;
4951
private ArrayList<CognitoLoginTokenPair> logins = new ArrayList<CognitoLoginTokenPair>();
52+
private CognitoLoginTokenSource loginTokenSource;
5053

5154
private TlsContext tlsContext;
5255
private ClientBootstrap clientBootstrap;
@@ -148,6 +151,23 @@ public CognitoCredentialsProviderBuilder withHttpProxyOptions(HttpProxyOptions h
148151

149152
HttpProxyOptions getHttpProxyOptions() { return httpProxyOptions; }
150153

154+
/**
155+
* Sets a login token source for the credentials provider. The login token source will be used to
156+
* gather additional login tokens to submit as part of the HTTP request sent to Cognito. A login token source
157+
* allows you to dynamically add login tokens on a per-request basis. Using a login token source requires
158+
* you to follow certain requirements in order to avoid undesirable behavior. See the documentation for
159+
* `CognitoLoginTokenSource` for further details.
160+
*
161+
* @param loginTokenSource object to source login tokens from before every HTTP request to Cognito
162+
* @return The current builder
163+
*/
164+
public CognitoCredentialsProviderBuilder withLoginTokenSource(CognitoLoginTokenSource loginTokenSource) {
165+
this.loginTokenSource = loginTokenSource;
166+
167+
return this;
168+
}
169+
170+
CognitoLoginTokenSource getLoginTokenSource() { return loginTokenSource; }
151171

152172
/**
153173
* Creates a new Cognito credentials provider, based on this builder's configuration
@@ -213,14 +233,15 @@ private CognitoCredentialsProvider(CognitoCredentialsProviderBuilder builder) {
213233
proxyTlsContextHandle,
214234
proxyAuthorizationType,
215235
proxyAuthorizationUsername != null ? proxyAuthorizationUsername.getBytes(UTF8) : null,
216-
proxyAuthorizationPassword != null ? proxyAuthorizationPassword.getBytes(UTF8) : null);
236+
proxyAuthorizationPassword != null ? proxyAuthorizationPassword.getBytes(UTF8) : null,
237+
builder.loginTokenSource);
217238

218239
acquireNativeHandle(nativeHandle);
219240
addReferenceTo(clientBootstrap);
220241
addReferenceTo(tlsContext);
221242
}
222243

223-
private void writeLengthPrefixedBytesSafe(ByteBuffer buffer, byte[] bytes) {
244+
private static void writeLengthPrefixedBytesSafe(ByteBuffer buffer, byte[] bytes) {
224245
if (bytes != null) {
225246
buffer.putInt(bytes.length);
226247
buffer.put(bytes);
@@ -229,7 +250,7 @@ private void writeLengthPrefixedBytesSafe(ByteBuffer buffer, byte[] bytes) {
229250
}
230251
}
231252

232-
private byte[] marshalLoginsForJni(ArrayList<CognitoLoginTokenPair> logins) {
253+
private static byte[] marshalLoginsForJni(List<CognitoLoginTokenPair> logins) {
233254
int size = 0;
234255

235256
for (CognitoLoginTokenPair login : logins) {
@@ -256,6 +277,16 @@ private byte[] marshalLoginsForJni(ArrayList<CognitoLoginTokenPair> logins) {
256277
return buffer.array();
257278
}
258279

280+
private static CompletableFuture<List<CognitoLoginTokenPair>> createChainedFuture(long invocationHandle, CompletableFuture<List<CognitoLoginTokenPair>> baseFuture) {
281+
return baseFuture.whenComplete((token_pairs, ex) -> {
282+
if (ex == null) {
283+
completeLoginTokenFetch(invocationHandle, marshalLoginsForJni(token_pairs), null);
284+
} else {
285+
completeLoginTokenFetch(invocationHandle, null, ex);
286+
}
287+
});
288+
}
289+
259290
/*******************************************************************************
260291
* Native methods
261292
******************************************************************************/
@@ -273,5 +304,8 @@ private static native long cognitoCredentialsProviderNew(CognitoCredentialsProvi
273304
long proxyTlsContext,
274305
int proxyAuthorizationType,
275306
byte[] proxyAuthorizationUsername,
276-
byte[] proxyAuthorizationPassword);
307+
byte[] proxyAuthorizationPassword,
308+
CognitoLoginTokenSource loginTokenSource);
309+
310+
private static native void completeLoginTokenFetch(long invocationHandle, byte[] marshalledLogins, Throwable ex);
277311
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
/**
2+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3+
* SPDX-License-Identifier: Apache-2.0.
4+
*/
5+
6+
package software.amazon.awssdk.crt.auth.credentials;
7+
8+
import java.util.List;
9+
import java.util.concurrent.CompletableFuture;
10+
11+
/**
12+
* Interface to allow for dynamic sourcing (i.e. per fetch-credentials request submitted to Cognito) of Cognito login
13+
* token pairs. It is *critical* to follow the guidance given in the documentation for `startLoginTokenFetch`
14+
*/
15+
public interface CognitoLoginTokenSource {
16+
17+
/**
18+
* Method that a Cognito credentials provider will invoke before sending a fetch credentials
19+
* request to Cognito. The CognitoLoginTokenPairs that the future gets completed with are joined
20+
* with the (static) CognitoLoginTokenPairs that were specified in the credential provider configuration
21+
* on construction. The merged set of CognitoLoginTokenPairs are added to the HTTP request sent
22+
* to Cognito that sources credentials.
23+
*
24+
* You must follow several guidelines to properly use this feature; not following these guidelines can result
25+
* in deadlocks, poor performance, or other undesirable behavior.
26+
*
27+
* 1. If you use this feature, you must complete the future or the underlying connection attempt will hang forever.
28+
* Credentials sourcing is halted until the future gets completed. If something goes wrong during
29+
* login token sourcing, complete the future exceptionally.
30+
*
31+
* 2. You must not block or wait for asynchronous operations in this function. This function is invoked from a CRT
32+
* event loop thread, and the event loop is halted until this function is returned from. If you need to perform
33+
* an asynchronous or non-trivial operation in order to source the necessary login token pairs, then you must
34+
* ensure that sourcing task executes on another thread. The easiest way to do this would be to pass the future
35+
* to a sourcing task that runs on an external executor.
36+
*
37+
* 3. No attempt is made to de-duplicate login keys. If the final, unioned set of login token pairs contains
38+
* multiple pairs with the same key, then which one of the duplicates gets used is not well-defined. For correct
39+
* behavior, you must ensure there can be no duplicates.
40+
*
41+
* @param tokenFuture future to complete with dynamically sourced login token pairs in order to continue the
42+
* credentials fetching process
43+
*/
44+
void startLoginTokenFetch(CompletableFuture<List<CognitoCredentialsProvider.CognitoLoginTokenPair>> tokenFuture);
45+
46+
}

src/main/java/software/amazon/awssdk/crt/auth/credentials/CredentialsProvider.java

+5-2
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66

77
import java.util.concurrent.CompletableFuture;
88
import software.amazon.awssdk.crt.CrtResource;
9+
import software.amazon.awssdk.crt.CrtRuntimeException;
910
import software.amazon.awssdk.crt.Log;
1011

1112
/**
@@ -41,11 +42,13 @@ public CompletableFuture<Credentials> getCredentials() {
4142
* @param future the future that the credentials should be applied to
4243
* @param credentials the fetched credentials, if successful
4344
*/
44-
private void onGetCredentialsComplete(CompletableFuture<Credentials> future, Credentials credentials) {
45+
private void onGetCredentialsComplete(CompletableFuture<Credentials> future, int errorCode, Credentials credentials) {
4546
if (credentials != null) {
4647
future.complete(credentials);
48+
} else if (errorCode != 0) {
49+
future.completeExceptionally(new CrtRuntimeException(errorCode));
4750
} else {
48-
future.completeExceptionally(new RuntimeException("Failed to get a valid set of credentials"));
51+
future.completeExceptionally(new CrtRuntimeException("Failed to get a valid set of credentials"));
4952
}
5053
}
5154

src/main/resources/META-INF/native-image/software.amazon.awssdk/crt/aws-crt/jni-config.json

+28
Original file line numberDiff line numberDiff line change
@@ -172,6 +172,10 @@
172172
{
173173
"name": "java.util.concurrent.CompletableFuture",
174174
"methods": [
175+
{
176+
"name": "<init>",
177+
"parameterTypes": []
178+
},
175179
{
176180
"name": "complete",
177181
"parameterTypes": [
@@ -295,6 +299,29 @@
295299
}
296300
]
297301
},
302+
{
303+
"name": "software.amazon.awssdk.crt.auth.credentials.CognitoCredentialsProvider",
304+
"methods": [
305+
{
306+
"name": "createChainedFuture",
307+
"parameterTypes": [
308+
"long",
309+
"java.util.concurrent.CompletableFuture"
310+
]
311+
}
312+
]
313+
},
314+
{
315+
"name": "software.amazon.awssdk.crt.auth.credentials.CognitoLoginTokenSource",
316+
"methods": [
317+
{
318+
"name": "startLoginTokenFetch",
319+
"parameterTypes": [
320+
"java.util.concurrent.CompletableFuture"
321+
]
322+
}
323+
]
324+
},
298325
{
299326
"name": "software.amazon.awssdk.crt.auth.credentials.Credentials",
300327
"fields": [
@@ -325,6 +352,7 @@
325352
"name": "onGetCredentialsComplete",
326353
"parameterTypes": [
327354
"java.util.concurrent.CompletableFuture",
355+
"int",
328356
"software.amazon.awssdk.crt.auth.credentials.Credentials"
329357
]
330358
},

0 commit comments

Comments
 (0)