1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
use crate::util::{auth_request, HttpSend, HttpSender};
use crate::{Authenticator, Error, TokenRequestOptions, TokenResponse};
use async_trait::async_trait;
use std::sync::Arc;

/// A `UserPasswordAuthenticator` enables authentication using a username and password. This
/// also requires the client ID for an application.
pub struct UserPasswordAuthenticator {
    client_id: String,
    username: String,
    password: String,
    client: reqwest::Client,
    sender: Arc<Box<dyn HttpSend + Send + Sync>>,
}

impl UserPasswordAuthenticator {
    pub fn new(client_id: String, username: String, password: String) -> UserPasswordAuthenticator {
        UserPasswordAuthenticator {
            client_id,
            username,
            password,
            client: reqwest::Client::new(),
            sender: Arc::new(Box::new(HttpSender {})),
        }
    }

    #[cfg(test)]
    pub(crate) fn new_mock<T: 'static + HttpSend + Send + Sync>(
        client_id: String,
        username: String,
        password: String,
        sender: T,
    ) -> UserPasswordAuthenticator {
        UserPasswordAuthenticator {
            client_id,
            username,
            password,
            client: reqwest::Client::new(),
            sender: Arc::new(Box::new(sender)),
        }
    }
}

#[async_trait]
impl Authenticator for UserPasswordAuthenticator {
    async fn authenticate(&self, options: TokenRequestOptions) -> Result<TokenResponse, Error> {
        let resource = options.resource_uri()?;
        let authorization_uri = options.authorization_uri();

        let request = self
            .client
            .post(&format!("{}/oauth2/token", &authorization_uri))
            .form(&[
                ("resource", resource),
                ("client_id", self.client_id.clone()),
                ("username", self.username.clone()),
                ("password", self.password.clone()),
                ("grant_type", "password".to_string()),
            ]);

        let sender = self.sender.clone();
        auth_request(sender, request).await
    }
}

#[cfg(test)]
mod tests {
    use crate::util::test::*;
    use crate::{Authenticator, UserPasswordAuthenticator};

    const MOCK_CLIENT_ID: &'static str = "f4ae306e-eaac-4bba-9f00-c815ea207881";
    const MOCK_USERNAME: &'static str = "user@contoso.onmicrosoft.com";
    const MOCK_PASSWORD: &'static str = "secret";

    #[tokio::test]
    async fn user_password_authenticator() {
        let authenticator = UserPasswordAuthenticator::new_mock(
            MOCK_CLIENT_ID.to_string(),
            MOCK_USERNAME.to_string(),
            MOCK_PASSWORD.to_string(),
            successful_token_sender(token_response()),
        );

        let authentication_response = authenticator
            .authenticate(get_token_request_options())
            .await
            .expect("Expected successful response");
        assert_eq!(
            authentication_response.access_token,
            token_response().access_token
        );
        assert_eq!(
            authentication_response.token_type,
            token_response().token_type
        );
        assert_eq!(
            authentication_response.expires_on,
            token_response().expires_on
        );
    }
}