Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions charts/session-manager/values-dev.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -338,5 +338,6 @@ config:

housekeeper:
tokenRefreshInterval: 30m
tokenRefreshTriggerInterval: 5m
idleSessionCleanupInterval: 30m
idleSessionTimeout: 90m
1 change: 1 addition & 0 deletions charts/session-manager/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -339,5 +339,6 @@ config:

housekeeper:
tokenRefreshInterval: 30m
tokenRefreshTriggerInterval: 5m
idleSessionCleanupInterval: 30m
idleSessionTimeout: 90m
1 change: 1 addition & 0 deletions config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -247,5 +247,6 @@ migrate:

housekeeper:
tokenRefreshInterval: 30m
tokenRefreshTriggerInterval: 5m
idleSessionCleanupInterval: 30m
idleSessionTimeout: 90m
3 changes: 2 additions & 1 deletion internal/business/housekeeper.go
Original file line number Diff line number Diff line change
Expand Up @@ -55,9 +55,10 @@ func HousekeeperMain(ctx context.Context, cfg *config.Config) error {

func startExpiringTokenRefresh(ctx context.Context, sessionManager *session.Manager, cfg *config.Housekeeper) error {
c := time.Tick(cfg.TokenRefreshInterval)
triggerInterval := cfg.TokenRefreshTriggerInterval
for {
slogctx.Info(ctx, "Triggering refresh of expiring tokens")
if err := sessionManager.RefreshExpiringTokens(ctx); err != nil {
if err := sessionManager.RefreshExpiringTokens(ctx, triggerInterval); err != nil {
slogctx.Error(ctx, "failed to refresh expiring tokens", "error", err)
}

Expand Down
3 changes: 2 additions & 1 deletion internal/config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,8 @@ type Config struct {
}

type Housekeeper struct {
TokenRefreshInterval time.Duration `yaml:"tokenRefreshInterval" default:"30m"`
TokenRefreshInterval time.Duration `yaml:"tokenRefreshInterval" default:"30m"`
TokenRefreshTriggerInterval time.Duration `yaml:"tokenRefreshTriggerInterval" default:"5m"`

IdleSessionCleanupInterval time.Duration `yaml:"idleSessionCleanupInterval" default:"30m"`
IdleSessionTimeout time.Duration `yaml:"idleSessionTimeout" default:"90m"`
Expand Down
10 changes: 5 additions & 5 deletions internal/session/housekeeper.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ import (
)

// RefreshExpiringTokens refreshes access tokens that are nearing expiration.
func (m *Manager) RefreshExpiringTokens(ctx context.Context) error {
func (m *Manager) RefreshExpiringTokens(ctx context.Context, refreshTriggerInterval time.Duration) error {
sessions, err := m.sessions.ListSessions(ctx)
if err != nil {
return err
Expand All @@ -26,7 +26,7 @@ func (m *Manager) RefreshExpiringTokens(ctx context.Context) error {
return fmt.Errorf("getting OIDC provider: %w", err)
}

if shouldRefresh(s) {
if shouldRefresh(s, refreshTriggerInterval) {
if err := m.refreshExpiringToken(ctx, &s, provider); err != nil {
slogctx.Warn(ctx, "Could not refresh token", "tenant_id", s.TenantID, "error", err)
continue
Expand All @@ -41,9 +41,9 @@ func (m *Manager) RefreshExpiringTokens(ctx context.Context) error {
return nil
}

func shouldRefresh(s Session) bool {
// refresh if token expires in less than 5 minutes
return time.Until(s.AccessTokenExpiry) < 5*time.Minute
func shouldRefresh(s Session, refreshTriggerInterval time.Duration) bool {
// refresh if token expires in less than refreshTriggerInterval set in the config
return time.Until(s.AccessTokenExpiry) < refreshTriggerInterval
}

// refreshExpiringToken refreshes the access token for the given session if needed.
Expand Down