#[non_exhaustive]pub struct AuthProvider {
pub id: String,
pub issuer: String,
pub jwks_uri: String,
pub audiences: String,
pub authorization_url: String,
pub jwt_locations: Vec<JwtLocation>,
/* private fields */
}
Expand description
Configuration for an authentication provider, including support for JSON Web Token (JWT).
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.id: String
The unique identifier of the auth provider. It will be referred to by
AuthRequirement.provider_id
.
Example: “bookstore_auth”.
issuer: String
Identifies the principal that issued the JWT. See https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1 Usually a URL or an email address.
Example: https://securetoken.google.com Example: 1234567-compute@developer.gserviceaccount.com
jwks_uri: String
URL of the provider’s public key set to validate signature of the JWT. See OpenID Discovery. Optional if the key set document:
- can be retrieved from OpenID Discovery of the issuer.
- can be inferred from the email domain of the issuer (e.g. a Google service account).
audiences: String
The list of JWT audiences. that are allowed to access. A JWT containing any of these audiences will be accepted. When this setting is absent, JWTs with audiences:
- “https://[service.name]/[google.protobuf.Api.name]”
- “https://[service.name]/” will be accepted. For example, if no audiences are in the setting, LibraryService API will accept JWTs with the following audiences:
https://library-example.googleapis.com/google.example.library.v1.LibraryService
Example:
audiences: bookstore_android.apps.googleusercontent.com,
bookstore_web.apps.googleusercontent.com
Redirect URL if JWT token is required but not present or is expired. Implement authorizationUrl of securityDefinitions in OpenAPI spec.
jwt_locations: Vec<JwtLocation>
Defines the locations to extract the JWT. For now it is only used by the Cloud Endpoints to store the OpenAPI extension [x-google-jwt-locations] (https://cloud.google.com/endpoints/docs/openapi/openapi-extensions#x-google-jwt-locations)
JWT locations can be one of HTTP headers, URL query parameters or cookies. The rule is that the first match wins.
If not specified, default to use following 3 locations:
- Authorization: Bearer
- x-goog-iap-jwt-assertion
- access_token query parameter
Default locations can be specified as followings: jwt_locations:
- header: Authorization value_prefix: “Bearer “
- header: x-goog-iap-jwt-assertion
- query: access_token
Implementations§
Source§impl AuthProvider
impl AuthProvider
pub fn new() -> Self
Sourcepub fn set_issuer<T: Into<String>>(self, v: T) -> Self
pub fn set_issuer<T: Into<String>>(self, v: T) -> Self
Sets the value of issuer.
Sourcepub fn set_jwks_uri<T: Into<String>>(self, v: T) -> Self
pub fn set_jwks_uri<T: Into<String>>(self, v: T) -> Self
Sets the value of jwks_uri.
Sourcepub fn set_audiences<T: Into<String>>(self, v: T) -> Self
pub fn set_audiences<T: Into<String>>(self, v: T) -> Self
Sets the value of audiences.
Sets the value of authorization_url.
Sourcepub fn set_jwt_locations<T, V>(self, v: T) -> Self
pub fn set_jwt_locations<T, V>(self, v: T) -> Self
Sets the value of jwt_locations.
Trait Implementations§
Source§impl Clone for AuthProvider
impl Clone for AuthProvider
Source§fn clone(&self) -> AuthProvider
fn clone(&self) -> AuthProvider
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more