627 Commits

Author SHA1 Message Date
OMGeeky
142ef5635e Merge branch 'dermesser:master' into master 2023-06-04 13:00:46 +02:00
OMGeeky
458bf6f7b2 Add an option to force the User to choose an Account 2023-06-04 12:59:14 +02:00
Lewin Bormann
3cc35783e8 Release v8.3.0
With #202
2023-04-22 20:20:05 +02:00
Lewin Bormann
06f7156e4d Merge pull request #202 from sanath-2024/master
fix: re-export hyper and hyper-rustls dependencies (urgent!)
2023-04-22 20:19:16 +02:00
Sanath Govindarajan
53e00e5990 gate hyper-rustls re-export on feature hyper-rustls 2023-04-22 12:27:03 -05:00
Sanath Govindarajan
e69841a170 re-export hyper dependency 2023-04-18 14:16:27 -05:00
Sanath Govindarajan
098fb246a4 re-export hyper-rustls dependency 2023-04-18 14:13:00 -05:00
Lewin Bormann
25ff381077 Release v8.2 with new hyper-rustls 2023-04-13 08:00:08 +02:00
Lewin Bormann
2f9c1d1f80 Merge remote-tracking branch 'origin/master' 2023-04-13 07:59:01 +02:00
Lewin Bormann
7230142dad Merge pull request #200 from audunska/bump-hyper-rustls
[chore] Bump hyper-rustls
2023-04-13 07:57:59 +02:00
Audun Skaugen
5615bd71d7 Bump hyper-rustls 2023-04-12 14:11:22 +02:00
Lewin Bormann
e7ca443cca Minor release v8.1.1 with some doc updates 2023-04-01 08:00:26 +02:00
Lewin Bormann
3cd4d30faf Remove codecov badge (project deactivated there) 2023-04-01 07:58:31 +02:00
Lewin Bormann
54d8c3f2aa Update build status badge 2023-04-01 07:57:30 +02:00
Lewin Bormann
194f6a3b1d Remove misleading old examples 2023-04-01 07:54:37 +02:00
Lewin Bormann
1ebce0716d Merge pull request #196 from williamho/default-expiry-for-id-token
Set default expires_at if only ID token is returned
2023-02-27 10:17:07 +01:00
William Ho
24d1d8c429 Set default expires_at if only ID token is returned
Was running into an issue where ID tokens were being used by the
authenticator even after the 1-hour validity period, and weren't being
refreshed.

After enabling debug logs, I found out that this was happening because
ID-token-only responses don't contain the `expires_in` field, so the
authenticator assumes it doesn't expire.

Interestingly, this doesn't happen when using the service account
impersonation flow, because it's explicitly handled there by defaulting
the expiration to 1 hour.

The ID token is a JWT so it's possible to decode it to get the
expiration date, but to avoid introducing a JWT decoding dependency,
I've gone for the same approach of defaulting to 1 hour, as indicated in
the GCP docs.
2023-02-17 14:25:38 -05:00
Lewin Bormann
0a7e695971 Improve clarity on redirect URLs for #191 2023-02-10 20:59:01 +01:00
Lewin Bormann
1c6f9a7d56 Release v8.1.0
Includes #188, #190. Updates some dependencies - API is stable, thus no
major release.
2022-12-02 21:20:26 +01:00
Lewin Bormann
63d60e76a6 Merge pull request #188 from jneem/impersonation-id
Add support for generating impersonated ids.
2022-12-02 21:14:37 +01:00
Lewin Bormann
e2048ec57f Merge pull request #190 from djc/update-deps
Update dependencies
2022-11-25 17:14:30 +01:00
Dirkjan Ochtman
c51c7e636f Update dependencies 2022-11-25 07:56:08 -08:00
Joe Neeman
9e31f1912f Expand example. 2022-11-23 14:46:36 -06:00
Joe Neeman
923a149e99 Add support for generating impersonated ids.
The previous service account impersonation feature only allowed requesting
impersonated access tokens. This one adds id tokens.
2022-11-23 14:43:40 -06:00
Lewin Bormann
78b79cf92c Remove very outdated service_account example 2022-10-27 20:49:28 +02:00
Lewin Bormann
7c9c92163c Remove very outdated drive_example 2022-10-27 20:47:17 +02:00
Lewin Bormann
10daabf66c Release v8.0.0
Includes new features from #186 #185 #184 #183 - thus a new release

Thanks to @blogle @chrisderock @luketpeterson @jneem
2022-10-27 20:22:44 +02:00
Lewin Bormann
a76d89c92f Merge pull request #186 from luketpeterson/master
Implementing InstalledFlowReturnMethod::HTTPPortRedirect()
2022-10-27 18:21:13 +00:00
luketpeterson
3ecb212d68 Merge branch 'dermesser:master' into master 2022-10-24 15:39:52 +09:00
Lewin Bormann
45631f157d Merge pull request #185 from jneem/master
Implement service account impersonation.
2022-10-21 16:37:45 +00:00
Luke Peterson
0899b51ca9 Implementing mechanism to specify server port in InstalledFlowReturnMethod. Issue #160 2022-10-18 21:57:54 +09:00
Joe Neeman
acf898f10c Account for the fact that access tokens are optional now. 2022-10-17 16:35:10 -05:00
Joe Neeman
e907226c3c Implement service account impersonation. 2022-10-17 16:23:19 -05:00
Lewin Bormann
00bee07e43 Merge pull request #184 from blogle/master
Fix ID token support
2022-10-16 10:46:29 +00:00
Brandon Ogle
db8dd7d68d Fix tests and examples to use token() method on AccessToken 2022-10-10 12:46:45 -07:00
Brandon Ogle
818d1c2eea Remove redundant id_token field from struct initialization 2022-10-10 12:45:51 -07:00
Brandon Ogle
95df191358 Revert Token back to AccessToken, as TokenInfo can be used to retrieve id_token 2022-09-21 19:00:37 -07:00
Brandon Ogle
2d805cf19e Merge branch 'nagisa/id_token' of github.com:nagisa/yup-oauth2 into nagisa-nagisa/id_token 2022-09-21 18:51:59 -07:00
Lewin Bormann
a311cfc3e0 Merge pull request #183 from chrisderock/master
added access token authenticator
2022-09-07 10:32:42 +02:00
toepp
f35eb186d6 removed commented imports and added a better description 2022-08-31 11:03:31 +02:00
toepp
7c557a5d03 forgot to add the file itself 2022-08-29 10:20:18 +02:00
chritoep
110c65ab07 added access token authenticator 2022-08-26 08:50:28 +02:00
Lewin Bormann
dcc35ac2e0 Release v7.0.1 2022-06-19 17:49:03 -07:00
Lewin Bormann
c69fffac28 for #180: allow HTTP requests in default hyper client.
If an attacker could manipulate URLs for token retrieval etc., they
could wreak considerably more havoc than a downgrade attack.
2022-06-09 20:14:44 -07:00
Lewin Bormann
24f91d697c Release v7.0.0
for #177 including #178: Update Authenticator to accept clients with custom connectors
2022-05-27 11:16:31 -07:00
Lewin Bormann
1ace664651 Merge pull request #178 from kylegentle/master
feat(Authenticator client): Support custom connectors
2022-05-27 20:10:24 +02:00
Kyle Gentle
c76ae18224 feat(Authenticator client): Accept custom connectors
Update Authenticator to accept clients with custom connectors, rather
than depending on the sealed hyper::client::connect::Connect trait, as recommended by hyper: https://docs.rs/hyper/0.13.8/src/hyper/client/connect/mod.rs.html#256-258

Closes #177.
2022-05-22 16:29:02 -04:00
Lewin Bormann
253528a1fe Bump version to 6.7
Includes #176 and #174
2022-05-21 12:27:53 -07:00
Lewin Bormann
1a32e1af6f Document ServiceAccountAuthenticator inline 2022-05-21 09:18:00 -07:00
Lewin Bormann
33bc9b98e5 Merge pull request #176 from rnarubin/service_account_panic
Remove file IO panic in ApplicationDefaultCreds flow
2022-05-21 09:08:56 -07:00