Tame Oauth Versions Save

🔐 Small OAuth crate that follows the sans-io approach 🦀

0.10.0

3 months ago

Changed

  • PR#72 update http -> 1.1.0.

0.9.6

7 months ago

Changed

  • PR#67 upgraded ring from 0.16 -> 0.17.

0.9.4

9 months ago

Changed

  • PR#66 replaced base64 with data-encoding.

0.9.3

1 year ago

Fixed

  • PR#65 Use url safe base64 when decoding jwt claims from id tokens.

0.9.2

1 year ago

Fixed

  • PR#63 Use correct base64 padding when decoding jwt claims from id tokens.

0.9.1

1 year ago

Added

  • Support for id tokens, a new trait for this was added (IdTokenProvider) and implemented for all current token providers so both access tokens and id tokens can be fetched.
  • Added is_*_provider methods to TokenProviderWrapper for asserting the inner type.
  • PR#61 added debug implementations for all the providers (excludes sensitive data in the output).

Changed

  • RequestReason::ScopesChanged was renamed to RequestReason::ParametersChanged
  • PR#59 update outdated base64 dependency
  • Moved the placement of the CachedTokenProvider on TokenProviderWrapper so that it wraps the outer type instead of the inner, that way the uncached provider can be accessed via .inner().

Fixed

  • PR#57 Documentation improvements

0.8.1

1 year ago

Fixed

  • PR#54 re-adds get_account_info to the outer ServiceAccountProvider implementation. It was accidentally removed in #51.

0.8.0

1 year ago

Changed

  • PR#51 moved the token cache out of ServiceAccountProvider into a public type, and added a cached token provider that can wrap any other token provider. This wrapper now wrapps all the current gcp token providers, making them cached by default.
  • PR#53 changed the cache lock from a Mutex into a RwLock.

0.7.0

2 years ago

Changed

  • PR#47 removed the dependency upon chrono as it was overkill and brought in multiple security advisories and is only lightly maintained.

0.6.0

2 years ago

Added

  • PR#40 added support for Metadata Server Auth so that you can obtain oauth tokens when running inside GCP. Thanks @boulos!
  • PR#42 resolved #39 by adding support for the same default credentials flow as the the Go oauth2 implementation for Google oauth. This included adding support for EndUserCredentials. Thanks @boulos!