tame-oidc

A (very) thin layer of OIDC like functionality

10 releases (breaking)

0.7.0 Dec 19, 2023
0.6.1 Oct 25, 2023
0.6.0 Sep 13, 2022
0.5.0 Apr 25, 2022
0.2.0 Mar 1, 2021

#171 in Authentication

Download history 336/week @ 2024-06-25 469/week @ 2024-07-02 237/week @ 2024-07-09 205/week @ 2024-07-16 123/week @ 2024-07-23 147/week @ 2024-07-30 73/week @ 2024-08-06 72/week @ 2024-08-13 57/week @ 2024-08-20 114/week @ 2024-08-27 152/week @ 2024-09-03 56/week @ 2024-09-10 68/week @ 2024-09-17 53/week @ 2024-09-24 3221/week @ 2024-10-01 3191/week @ 2024-10-08

6,544 downloads per month

MIT/Apache

38KB
928 lines

🧬 tame-oidc

tame-oidc is a small OpenID Connect crate that follows the sans-io approach.

Embark Embark Crates.io Docs dependency status Build status

Supported RFCs:

Why?

  • You want to control how you actually make OIDC HTTP requests

Why not?

  • The only auth flow that is currently implemented are the flows we are using internally. Other flows can be added, but right now that is the only one we need.
  • This crate requires more boilerplate to use.

Usage

See example code in examples/embark.rs

Examples

embark basic

Usage: cargo run --example embark-basic

A small example of using tame-oidc together with reqwest using the basic auth flow.

embark pkce

Usage: cargo run --example embark-pkce

A small example of using tame-oidc together with reqwest using the PKCE auth flow.

Contributing

Contributor Covenant

We welcome community contributions to this project.

Please read our Contributor Guide for more information on how to get started.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~3–12MB
~172K SLoC