Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Preload private_key in JwtTokenSource #519

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

LuckySting
Copy link
Contributor

Loading cryptography keys from pem-encoded bytes string takes a lot of time (~250ms). Due to private_key is not changed during the life of JwtTokenSource it could be done only once, which would significantly speed up token issuing.

Pull request type

Please check the type of change your PR introduces:

  • Bugfix
  • Feature
  • Code style update (formatting, renaming)
  • Refactoring (no functional changes, no api changes)
  • Build related changes
  • Documentation content changes
  • Other (please describe):

What is the current behavior?

Currently the private key is loaded on each call of token() method, which takes ~250ms.

Issue Number: N/A

What is the new behavior?

Now the private key is loaded only once in class constructor, which leads to speed up of token() method from 250ms to 4ms.

Other information

Sorry, something went wrong.

@LuckySting LuckySting force-pushed the speed-up-jwt-token-source branch from 25e1277 to ee036c9 Compare November 6, 2024 17:21
@LuckySting LuckySting force-pushed the speed-up-jwt-token-source branch from ee036c9 to c7f7244 Compare November 6, 2024 17:28
@vgvoleg vgvoleg requested a review from Copilot March 28, 2025 14:19
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR improves the performance of JWT token issuing by preloading and converting the PEM-encoded private key once during JwtTokenSource initialization instead of on every token generation.

  • Preload the private key in the constructor to reduce the token creation time.
  • Add a dependency check for the cryptography library.
  • Modify file reading mode to binary to correctly handle PEM keys.
Comments suppressed due to low confidence (1)

ydb/oauth2_token_exchange/token_source.py:80

  • [nitpick] Consider adding error handling around the PEM key conversion (i.e., load_pem_private_key) in case the provided key data is malformed to provide clearer error reporting.
if isinstance(self._private_key, str):

Comment on lines 56 to +57
assert jwt is not None, "Install pyjwt library to use jwt tokens"
assert load_pem_private_key is not None, "Install cryptography library to use jwt tokens"
Copy link
Preview

Copilot AI Mar 28, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using assert for dependency checks might be bypassed in optimized mode; consider raising an explicit exception to ensure the cryptography library is available in production.

Suggested change
assert jwt is not None, "Install pyjwt library to use jwt tokens"
assert load_pem_private_key is not None, "Install cryptography library to use jwt tokens"
if jwt is None:
raise ImportError("Install pyjwt library to use jwt tokens")
if load_pem_private_key is None:
raise ImportError("Install cryptography library to use jwt tokens")

Copilot is powered by AI, so mistakes are possible. Review output carefully before use.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants