#oauth #oauth2 #gcp #jwt #google-api

gcp-sa

Google Cloud Platform Service Account OAuth authentication abstraction

1 unstable release

0.1.2 Mar 28, 2021
0.1.1 Mar 28, 2021
0.1.0 Mar 28, 2021

#593 in Authentication

Download history 731/week @ 2024-07-23 489/week @ 2024-07-30 647/week @ 2024-08-06 570/week @ 2024-08-13 612/week @ 2024-08-20 404/week @ 2024-08-27 812/week @ 2024-09-03 1057/week @ 2024-09-10 557/week @ 2024-09-17 379/week @ 2024-09-24 699/week @ 2024-10-01 563/week @ 2024-10-08 780/week @ 2024-10-15 769/week @ 2024-10-22 625/week @ 2024-10-29 600/week @ 2024-11-05

2,784 downloads per month

MIT license

15KB
260 lines

Google Cloud Platform Service Account OAuth authentication abstraction for Rust

A service account is a special kind of account used by an application or a virtual machine (VM) instance, not a person. Applications use service accounts to make authorized API calls, authorized as either the service account itself, or as Google Workspace or Cloud Identity users through domain-wide delegation.

API calls can target a Google API or your own Cloud Function or Cloud Run instance endpoint that you have protected with Cloud IAM.

Example

Simple example for acquiring an ID token (JWT):

let authenticator = GoogleServiceAccountAuthenticator::new_from_service_account_key_file(std::path::Path("key.json".to_string())).unwrap();
let token = authenticator.request_id_token("https://my-google-app.endpoint.tld/something").await.unwrap();

Simple example for acquiring an Access Token:

let authenticator = GoogleServiceAccountAuthenticator::new_from_service_account_key_file(std::path::Path("key.json".to_string())).unwrap();
let token = authenticator.request_access_token().await.unwrap();

After acquiring a token you need you can use it as a bearer token in HTTP request headers e.g:

let header = format!("Authorization: Bearer {}", token);

Dependencies

~8–25MB
~343K SLoC