forked from adobe/ims-go
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrefresh_token.go
111 lines (93 loc) · 3.36 KB
/
refresh_token.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
// Copyright 2019 Adobe. All rights reserved.
// This file is licensed to you under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License. You may obtain a copy
// of the License at http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software distributed under
// the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS
// OF ANY KIND, either express or implied. See the License for the specific language
// governing permissions and limitations under the License.
package ims
import (
"context"
"encoding/json"
"fmt"
"net/http"
"net/url"
"strings"
"time"
)
// RefreshTokenRequest is the request for refreshing an access token.
type RefreshTokenRequest struct {
// RefreshToken is the refresh token obtained during the first request for
// an access token. This field is required.
RefreshToken string
// ClientID is the client ID. This field is required.
ClientID string
// ClientSecret is the client secret. This field is required.
ClientSecret string
// Scope is the scope list in the refresh token. This field is optional. If
// provided, it must be a subset of the scopes in the request token.
Scope []string
}
// RefreshTokenResponse is the response of an access token refresh.
type RefreshTokenResponse struct {
Response
// AccessToken is the new access token.
AccessToken string
// RefreshToken is a new refresh token.
RefreshToken string
// ExpiresIn is the expiration time for the access token.
ExpiresIn time.Duration
}
// RefreshTokenWithContext refreshes an access token.
func (c *Client) RefreshTokenWithContext(ctx context.Context, r *RefreshTokenRequest) (*RefreshTokenResponse, error) {
if r.RefreshToken == "" {
return nil, fmt.Errorf("missing refresh token")
}
if r.ClientID == "" {
return nil, fmt.Errorf("missing client ID")
}
if r.ClientSecret == "" {
return nil, fmt.Errorf("missing client secret")
}
data := url.Values{}
data.Set("grant_type", "refresh_token")
data.Set("refresh_token", r.RefreshToken)
data.Set("client_id", r.ClientID)
data.Set("client_secret", r.ClientSecret)
if len(r.Scope) > 0 {
data.Set("scope", strings.Join(r.Scope, ","))
}
req, err := http.NewRequestWithContext(ctx, http.MethodPost, fmt.Sprintf("%s/ims/token/v2", c.url), strings.NewReader(data.Encode()))
if err != nil {
return nil, fmt.Errorf("create request: %v", err)
}
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
res, err := c.do(req)
if err != nil {
return nil, fmt.Errorf("perform request: %v", err)
}
if res.StatusCode != http.StatusOK {
return nil, errorResponse(res)
}
var payload struct {
AccessToken string `json:"access_token"`
RefreshToken string `json:"refresh_token"`
ExpiresIn int `json:"expires_in"`
}
if err := json.Unmarshal(res.Body, &payload); err != nil {
return nil, fmt.Errorf("decode response: %v", err)
}
return &RefreshTokenResponse{
Response: *res,
AccessToken: payload.AccessToken,
RefreshToken: payload.RefreshToken,
ExpiresIn: time.Second * time.Duration(payload.ExpiresIn),
}, nil
}
// RefreshToken is equivalent to RefreshTokenWithContext with a background
// context.
func (c *Client) RefreshToken(r *RefreshTokenRequest) (*RefreshTokenResponse, error) {
return c.RefreshTokenWithContext(context.Background(), r)
}