Skip to content

Commit ba06855

Browse files
committed
fmt
1 parent 6dcd690 commit ba06855

File tree

2 files changed

+28
-31
lines changed

2 files changed

+28
-31
lines changed

src/webserver/oidc.rs

Lines changed: 26 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@ use std::collections::HashSet;
22
use std::future::ready;
33
use std::rc::Rc;
44
use std::time::Duration;
5-
use tokio::time::Instant;
65
use std::{future::Future, pin::Pin, str::FromStr, sync::Arc};
6+
use tokio::time::Instant;
77

88
use crate::webserver::http_client::get_http_client_from_appdata;
99
use crate::{app_config::AppConfig, AppState};
@@ -251,13 +251,10 @@ impl OidcState {
251251
}
252252
Err(e) => log::error!("Failed to refresh OIDC client: {e:#}"),
253253
}
254-
state
255-
.refresh_in_progress
256-
.store(false, Ordering::Release);
254+
state.refresh_in_progress.store(false, Ordering::Release);
257255
});
258256
}
259257

260-
261258
pub fn end_session_endpoint(&self) -> Option<EndSessionUrl> {
262259
self.snapshot().end_session_endpoint.clone()
263260
}
@@ -458,8 +455,7 @@ fn handle_unauthenticated_request(
458455

459456
let initial_url = request.uri().to_string();
460457
let redirect_count = get_redirect_count(&request);
461-
let response =
462-
build_auth_provider_redirect_response(oidc_state, &initial_url, redirect_count);
458+
let response = build_auth_provider_redirect_response(oidc_state, &initial_url, redirect_count);
463459
MiddlewareResponse::Respond(request.into_response(response))
464460
}
465461

@@ -553,33 +549,31 @@ fn process_oidc_logout(
553549
.ok()
554550
.flatten();
555551

556-
let mut response =
557-
if let Some(end_session_endpoint) = oidc_state.end_session_endpoint() {
558-
let absolute_redirect_uri = oidc_state
559-
.build_absolute_redirect_uri(&params.redirect_uri)?;
552+
let mut response = if let Some(end_session_endpoint) = oidc_state.end_session_endpoint() {
553+
let absolute_redirect_uri = oidc_state.build_absolute_redirect_uri(&params.redirect_uri)?;
560554

561-
let post_logout_redirect_uri =
562-
PostLogoutRedirectUrl::new(absolute_redirect_uri.clone()).with_context(|| {
563-
format!("Invalid post_logout_redirect_uri: {absolute_redirect_uri}")
564-
})?;
555+
let post_logout_redirect_uri = PostLogoutRedirectUrl::new(absolute_redirect_uri.clone())
556+
.with_context(|| {
557+
format!("Invalid post_logout_redirect_uri: {absolute_redirect_uri}")
558+
})?;
565559

566-
let mut logout_request = LogoutRequest::from(end_session_endpoint)
567-
.set_post_logout_redirect_uri(post_logout_redirect_uri);
560+
let mut logout_request = LogoutRequest::from(end_session_endpoint)
561+
.set_post_logout_redirect_uri(post_logout_redirect_uri);
568562

569-
if let Some(ref token) = id_token {
570-
logout_request = logout_request.set_id_token_hint(token);
571-
}
563+
if let Some(ref token) = id_token {
564+
logout_request = logout_request.set_id_token_hint(token);
565+
}
572566

573-
let logout_url = logout_request.http_get_url();
574-
log::info!("Redirecting to OIDC logout URL: {logout_url}");
575-
build_redirect_response(logout_url.to_string())
576-
} else {
577-
log::info!(
578-
"No end_session_endpoint, redirecting to {}",
579-
params.redirect_uri
580-
);
581-
build_redirect_response(params.redirect_uri)
582-
};
567+
let logout_url = logout_request.http_get_url();
568+
log::info!("Redirecting to OIDC logout URL: {logout_url}");
569+
build_redirect_response(logout_url.to_string())
570+
} else {
571+
log::info!(
572+
"No end_session_endpoint, redirecting to {}",
573+
params.redirect_uri
574+
);
575+
build_redirect_response(params.redirect_uri)
576+
};
583577

584578
response.add_removal_cookie(
585579
&Cookie::build(SQLPAGE_AUTH_COOKIE_NAME, "")
@@ -978,7 +972,8 @@ fn build_auth_url(oidc_state: &OidcState) -> AuthUrl {
978972
let hashed_nonce = Nonce::new(hash_nonce(&nonce_source));
979973
let scopes = &oidc_state.config.scopes;
980974
let snapshot = oidc_state.snapshot();
981-
let (url, csrf_token, _nonce) = snapshot.client
975+
let (url, csrf_token, _nonce) = snapshot
976+
.client
982977
.authorize_url(
983978
CoreAuthenticationFlow::AuthorizationCode,
984979
CsrfToken::new_random,

tests/oidc/mod.rs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -594,6 +594,8 @@ async fn test_slow_discovery_does_not_block_authenticated_requests() {
594594
let count_before = provider.discovery_count();
595595
tokio::time::pause();
596596
tokio::time::advance(Duration::from_secs(3601)).await;
597+
// Resume real time so the DB pool and background refresh work normally.
598+
tokio::time::resume();
597599

598600
// An authenticated request must succeed immediately, even though
599601
// it triggers a background refresh.

0 commit comments

Comments
 (0)