Skip to content

Commit ba53314

Browse files
authored
move auth hostname into custom header (#67)
* catch PropelAuthRateLimit error on all requests * bump minor version to 0.22.0 * move auth hostname into custom header * bump patch version to 0.22.1
1 parent 8c53f8c commit ba53314

File tree

8 files changed

+252
-43
lines changed

8 files changed

+252
-43
lines changed

Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "propelauth"
3-
version = "0.22.0"
3+
version = "0.22.1"
44
authors = ["support@propelauth.com"]
55
description = "A Rust crate for managing authentication and authorization with support for multi-tenant / B2B products, powered by PropelAuth"
66
keywords = ["authentication", "auth", "authorization", "b2b", "tenant"]

src/apis/access_token_service_api.rs

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
use reqwest;
22

33
use super::{configuration, Error};
4-
use crate::apis::ResponseContent;
4+
use crate::{apis::ResponseContent, propelauth::auth::AUTH_HOSTNAME_HEADER};
55

66
/// struct for passing parameters to the method [`create_access_token`]
77
#[derive(Clone, Debug, Default)]
@@ -49,6 +49,11 @@ pub async fn create_access_token(
4949
if let Some(ref local_var_token) = local_var_configuration.bearer_access_token {
5050
local_var_req_builder = local_var_req_builder.bearer_auth(local_var_token.to_owned());
5151
};
52+
local_var_req_builder = local_var_req_builder.header(
53+
AUTH_HOSTNAME_HEADER,
54+
local_var_configuration.auth_hostname.to_owned(),
55+
);
56+
5257
local_var_req_builder = local_var_req_builder.json(&create_access_token_request);
5358

5459
let local_var_req = local_var_req_builder.build()?;
@@ -96,6 +101,11 @@ pub async fn create_access_token_v2(
96101
if let Some(ref local_var_token) = local_var_configuration.bearer_access_token {
97102
local_var_req_builder = local_var_req_builder.bearer_auth(local_var_token.to_owned());
98103
};
104+
local_var_req_builder = local_var_req_builder.header(
105+
AUTH_HOSTNAME_HEADER,
106+
local_var_configuration.auth_hostname.to_owned(),
107+
);
108+
99109
local_var_req_builder = local_var_req_builder.json(&create_access_token_request);
100110

101111
let local_var_req = local_var_req_builder.build()?;

src/apis/api_key_service_api.rs

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
use hex;
88
use reqwest;
99

10-
use crate::apis::ResponseContent;
10+
use crate::{apis::ResponseContent, propelauth::auth::AUTH_HOSTNAME_HEADER};
1111

1212
use super::{configuration, Error};
1313

@@ -113,6 +113,7 @@ pub async fn fetch_current_api_keys(
113113
if let Some(ref bearer_token) = configuration.bearer_access_token {
114114
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
115115
}
116+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
116117

117118
let req = req_builder.build()?;
118119
let resp = client.execute(req).await?;
@@ -168,6 +169,7 @@ pub async fn fetch_archived_api_keys(
168169
if let Some(ref bearer_token) = configuration.bearer_access_token {
169170
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
170171
}
172+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
171173

172174
let req = req_builder.build()?;
173175
let resp = client.execute(req).await?;
@@ -210,6 +212,7 @@ pub async fn fetch_api_key(
210212
if let Some(ref bearer_token) = configuration.bearer_access_token {
211213
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
212214
}
215+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
213216

214217
let req = req_builder.build()?;
215218
let resp = client.execute(req).await?;
@@ -248,6 +251,7 @@ pub async fn create_api_key(
248251
if let Some(ref bearer_token) = configuration.bearer_access_token {
249252
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
250253
}
254+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
251255

252256
req_builder = req_builder.json(&params);
253257

@@ -293,6 +297,7 @@ pub async fn update_api_key(
293297
if let Some(ref bearer_token) = configuration.bearer_access_token {
294298
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
295299
}
300+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
296301

297302
req_builder = req_builder.json(&params);
298303

@@ -337,6 +342,7 @@ pub async fn delete_api_key(
337342
if let Some(ref bearer_token) = configuration.bearer_access_token {
338343
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
339344
}
345+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
340346

341347
let req = req_builder.build()?;
342348
let resp = client.execute(req).await?;
@@ -375,6 +381,7 @@ pub async fn validate_api_key(
375381
if let Some(ref bearer_token) = configuration.bearer_access_token {
376382
req_builder = req_builder.bearer_auth(bearer_token.to_owned());
377383
}
384+
req_builder = req_builder.header(AUTH_HOSTNAME_HEADER, configuration.auth_hostname.to_owned());
378385

379386
req_builder = req_builder.json(&params);
380387

src/apis/auth_service_api.rs

Lines changed: 25 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,14 @@
44
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
55
*
66
* The version of the OpenAPI document: 0.1.0
7-
*
7+
*
88
* Generated by: https://openapi-generator.tech
99
*/
1010

11-
1211
use reqwest;
1312

14-
use crate::apis::ResponseContent;
15-
use super::{Error, configuration};
16-
13+
use super::{configuration, Error};
14+
use crate::{apis::ResponseContent, propelauth::auth::AUTH_HOSTNAME_HEADER};
1715

1816
/// struct for typed errors of method [`token_verification_metadata`]
1917
#[derive(Debug, Clone, Serialize, Deserialize)]
@@ -23,24 +21,33 @@ pub enum TokenVerificationMetadataError {
2321
UnknownValue(serde_json::Value),
2422
}
2523

26-
27-
pub async fn token_verification_metadata(configuration: &configuration::Configuration) -> Result<crate::models::AuthTokenVerificationMetadata, Error<TokenVerificationMetadataError>> {
24+
pub async fn token_verification_metadata(
25+
configuration: &configuration::Configuration,
26+
) -> Result<crate::models::AuthTokenVerificationMetadata, Error<TokenVerificationMetadataError>> {
2827
let local_var_configuration = configuration;
2928

3029
// unbox the parameters
3130

32-
3331
let local_var_client = &local_var_configuration.client;
3432

35-
let local_var_uri_str = format!("{}/api/backend/v1/token_verification_metadata", local_var_configuration.base_path);
36-
let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
33+
let local_var_uri_str = format!(
34+
"{}/api/backend/v1/token_verification_metadata",
35+
local_var_configuration.base_path
36+
);
37+
let mut local_var_req_builder =
38+
local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
3739

3840
if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
39-
local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
41+
local_var_req_builder =
42+
local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
4043
}
4144
if let Some(ref local_var_token) = local_var_configuration.bearer_access_token {
4245
local_var_req_builder = local_var_req_builder.bearer_auth(local_var_token.to_owned());
4346
};
47+
local_var_req_builder = local_var_req_builder.header(
48+
AUTH_HOSTNAME_HEADER,
49+
local_var_configuration.auth_hostname.to_owned(),
50+
);
4451

4552
let local_var_req = local_var_req_builder.build()?;
4653
let local_var_resp = local_var_client.execute(local_var_req).await?;
@@ -51,9 +58,13 @@ pub async fn token_verification_metadata(configuration: &configuration::Configur
5158
if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
5259
serde_json::from_str(&local_var_content).map_err(Error::from)
5360
} else {
54-
let local_var_entity: Option<TokenVerificationMetadataError> = serde_json::from_str(&local_var_content).ok();
55-
let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
61+
let local_var_entity: Option<TokenVerificationMetadataError> =
62+
serde_json::from_str(&local_var_content).ok();
63+
let local_var_error = ResponseContent {
64+
status: local_var_status,
65+
content: local_var_content,
66+
entity: local_var_entity,
67+
};
5668
Err(Error::ResponseError(local_var_error))
5769
}
5870
}
59-

src/apis/configuration.rs

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,16 @@
44
* No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
55
*
66
* The version of the OpenAPI document: 0.1.0
7-
*
7+
*
88
* Generated by: https://openapi-generator.tech
99
*/
1010

11-
1211
use reqwest;
1312

14-
1513
#[derive(Debug, Clone)]
1614
pub struct Configuration {
1715
pub base_path: String,
16+
pub auth_hostname: String,
1817
pub user_agent: Option<String>,
1918
pub client: reqwest::Client,
2019
pub basic_auth: Option<BasicAuth>,
@@ -32,18 +31,17 @@ pub struct ApiKey {
3231
pub key: String,
3332
}
3433

35-
3634
impl Default for Configuration {
3735
fn default() -> Self {
3836
Configuration {
3937
base_path: "http://localhost".to_owned(),
38+
auth_hostname: "http://localhost".to_owned(),
4039
user_agent: Some("OpenAPI-Generator/0.1.0/rust".to_owned()),
4140
client: reqwest::Client::new(),
4241
basic_auth: None,
4342
oauth_access_token: None,
4443
bearer_access_token: None,
4544
api_key: None,
46-
4745
}
4846
}
4947
}

0 commit comments

Comments
 (0)