mirror of
https://github.com/OMGeeky/yup-oauth2.git
synced 2026-01-01 17:10:10 +01:00
43 lines
1.4 KiB
Rust
43 lines
1.4 KiB
Rust
//! pseudo authenticator for use with plain access tokens.
|
|
//! If you use a specialized service to manage your
|
|
//! OAuth2-tokens you may get just the fresh generated
|
|
//! access token from your service.
|
|
//! The intention behind this is that if two services using the
|
|
//! same refresh token then each service will invalitate the
|
|
//! access token of the other service by generating a new token.
|
|
use crate::error::Error;
|
|
use crate::types::TokenInfo;
|
|
use hyper::client::connect::Connection;
|
|
use http::Uri;
|
|
use std::error::Error as StdError;
|
|
use tokio::io::{AsyncRead, AsyncWrite};
|
|
use tower_service::Service;
|
|
|
|
/// the flow for the access token authenticator
|
|
pub struct AccessTokenFlow {
|
|
pub(crate) access_token: String,
|
|
}
|
|
|
|
impl AccessTokenFlow {
|
|
/// just return the access token
|
|
pub(crate) async fn token<S, T>(
|
|
&self,
|
|
_hyper_client: &hyper::Client<S>,
|
|
_scopes: &[T],
|
|
) -> Result<TokenInfo, Error>
|
|
where
|
|
T: AsRef<str>,
|
|
S: Service<Uri> + Clone + Send + Sync + 'static,
|
|
S::Response: Connection + AsyncRead + AsyncWrite + Send + Unpin + 'static,
|
|
S::Future: Send + Unpin + 'static,
|
|
S::Error: Into<Box<dyn StdError + Send + Sync>>,
|
|
{
|
|
Ok(TokenInfo {
|
|
access_token: Some(self.access_token.clone()),
|
|
refresh_token: None,
|
|
expires_at: None,
|
|
id_token: None,
|
|
})
|
|
}
|
|
}
|