Expand description
Basic authentication helpers for Rerun.
Currently, this crate provides a simple Jwt-based authentication scheme on
top of a rudimentary RedapProvider that uses a symmetric key to both
generate and sign tokens.
Warning! This approach should only be seen as a stop-gap until we have
integration of real identity-providers, most likely based on OpenID Connect.
Modules§
Structs§
- Host
Mismatch Error - Invalid
Permission - Jwt
- A JWT that is used to authenticate the client.
- Redap
Provider - A secret key that is used to generate and verify tokens.
- Secret
Key - Verification
Options
Enums§
- Claims
- Error
- Handles errors for the
re_authcrate. - JwtDecode
Error - Error from decoding a JWT payload.
- Permission
- Rerun Cloud permissions
- Token
Error
Constants§
- DEFAULT_
ALLOWED_ HOSTS - Default
allowed_hostspattern for tokens that have noallowed_hostsclaim. - ERROR_
MESSAGE_ MALFORMED_ CREDENTIALS - The error message in Tonic’s gRPC status when the token is malformed or invalid in some way.
- ERROR_
MESSAGE_ MISSING_ CREDENTIALS - The error message in Tonic’s gRPC status when no token was found.
- INSECURE_
SKIP_ HOST_ CHECK_ ENV - Environment variable to bypass the host check entirely.
Functions§
- host_
matches_ pattern - Check if a hostname matches a host pattern.
- token_
allowed_ for_ host - Check if a token’s
allowed_hostsclaim permits the given host.