google_cloud_auth/credentials/
api_key_credentials.rs1use crate::credentials::dynamic::CredentialsProvider;
24use crate::credentials::{CacheableResource, Credentials, Result};
25use crate::headers_util::build_cacheable_api_key_headers;
26use crate::token::{CachedTokenProvider, Token, TokenProvider};
27use crate::token_cache::TokenCache;
28use http::{Extensions, HeaderMap};
29use std::sync::Arc;
30
31struct ApiKeyTokenProvider {
32 api_key: String,
33}
34
35impl std::fmt::Debug for ApiKeyTokenProvider {
36 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
37 f.debug_struct("ApiKeyCredentials")
38 .field("api_key", &"[censored]")
39 .finish()
40 }
41}
42
43#[async_trait::async_trait]
44impl TokenProvider for ApiKeyTokenProvider {
45 async fn token(&self) -> Result<Token> {
46 Ok(Token {
47 token: self.api_key.clone(),
48 token_type: String::new(),
49 expires_at: None,
50 metadata: None,
51 })
52 }
53}
54
55#[derive(Debug)]
56struct ApiKeyCredentials<T>
57where
58 T: CachedTokenProvider,
59{
60 token_provider: T,
61}
62
63#[derive(Debug)]
75pub struct Builder {
76 api_key: String,
77}
78
79impl Builder {
80 pub fn new<T: Into<String>>(api_key: T) -> Self {
91 Self {
92 api_key: api_key.into(),
93 }
94 }
95
96 fn build_token_provider(self) -> ApiKeyTokenProvider {
97 ApiKeyTokenProvider {
98 api_key: self.api_key,
99 }
100 }
101
102 pub fn build(self) -> Credentials {
104 Credentials {
105 inner: Arc::new(ApiKeyCredentials {
106 token_provider: TokenCache::new(self.build_token_provider()),
107 }),
108 }
109 }
110}
111
112#[async_trait::async_trait]
113impl<T> CredentialsProvider for ApiKeyCredentials<T>
114where
115 T: CachedTokenProvider,
116{
117 async fn headers(&self, extensions: Extensions) -> Result<CacheableResource<HeaderMap>> {
118 let cached_token = self.token_provider.token(extensions).await?;
119 build_cacheable_api_key_headers(&cached_token)
120 }
121}
122
123#[cfg(test)]
124mod tests {
125 use super::*;
126 use crate::credentials::tests::get_headers_from_cache;
127 use http::HeaderValue;
128 use scoped_env::ScopedEnv;
129
130 const API_KEY_HEADER_KEY: &str = "x-goog-api-key";
131 type TestResult = std::result::Result<(), Box<dyn std::error::Error>>;
132
133 #[test]
134 fn debug_token_provider() {
135 let expected = Builder::new("test-api-key").build_token_provider();
136
137 let fmt = format!("{expected:?}");
138 assert!(!fmt.contains("super-secret-api-key"), "{fmt}");
139 }
140
141 #[tokio::test]
142 async fn api_key_credentials_token_provider() {
143 let tp = Builder::new("test-api-key").build_token_provider();
144 assert_eq!(
145 tp.token().await.unwrap(),
146 Token {
147 token: "test-api-key".to_string(),
148 token_type: String::new(),
149 expires_at: None,
150 metadata: None,
151 }
152 );
153 }
154
155 #[tokio::test]
156 #[serial_test::serial]
157 async fn create_api_key_credentials_basic() -> TestResult {
158 let _e = ScopedEnv::remove("GOOGLE_CLOUD_QUOTA_PROJECT");
159
160 let creds = Builder::new("test-api-key").build();
161 let headers = get_headers_from_cache(creds.headers(Extensions::new()).await.unwrap())?;
162 let value = headers.get(API_KEY_HEADER_KEY).unwrap();
163
164 assert_eq!(headers.len(), 1, "{headers:?}");
165 assert_eq!(value, HeaderValue::from_static("test-api-key"));
166 assert!(value.is_sensitive());
167 Ok(())
168 }
169
170 #[tokio::test]
171 #[serial_test::serial]
172 async fn create_api_key_credentials_basic_with_extensions() -> TestResult {
173 let _e = ScopedEnv::remove("GOOGLE_CLOUD_QUOTA_PROJECT");
174
175 let creds = Builder::new("test-api-key").build();
176 let mut extensions = Extensions::new();
177 let cached_headers = creds.headers(extensions.clone()).await?;
178 let (headers, entity_tag) = match cached_headers {
179 CacheableResource::New { entity_tag, data } => (data, entity_tag),
180 CacheableResource::NotModified => unreachable!("expecting new headers"),
181 };
182 let value = headers.get(API_KEY_HEADER_KEY).unwrap();
183
184 assert_eq!(headers.len(), 1, "{headers:?}");
185 assert_eq!(value, HeaderValue::from_static("test-api-key"));
186 assert!(value.is_sensitive());
187 extensions.insert(entity_tag);
188
189 let cached_headers = creds.headers(extensions).await?;
190
191 match cached_headers {
192 CacheableResource::New { .. } => unreachable!("expecting new headers"),
193 CacheableResource::NotModified => CacheableResource::<HeaderMap>::NotModified,
194 };
195
196 Ok(())
197 }
198}