Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/davidgraeff/firestore-db-and-auth-rs
Easy Rust access to your Google Firestore DB via service account or OAuth impersonated Google Firebase Auth credentials
https://github.com/davidgraeff/firestore-db-and-auth-rs
authentication firebase firestore
Last synced: about 24 hours ago
JSON representation
Easy Rust access to your Google Firestore DB via service account or OAuth impersonated Google Firebase Auth credentials
- Host: GitHub
- URL: https://github.com/davidgraeff/firestore-db-and-auth-rs
- Owner: davidgraeff
- License: mit
- Created: 2019-06-03T11:11:53.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2024-01-23T20:11:39.000Z (10 months ago)
- Last Synced: 2024-04-24T01:21:16.229Z (7 months ago)
- Topics: authentication, firebase, firestore
- Language: Rust
- Size: 217 KB
- Stars: 95
- Watchers: 7
- Forks: 35
- Open Issues: 7
-
Metadata Files:
- Readme: readme.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
README
# Firestore API and Auth
[![Integration](https://github.com/davidgraeff/firestore-db-and-auth-rs/actions/workflows/integration.yml/badge.svg)](https://github.com/davidgraeff/firestore-db-and-auth-rs/actions/workflows/integration.yml)
[![With Rocket](https://github.com/davidgraeff/firestore-db-and-auth-rs/actions/workflows/with_rocket.yml/badge.svg)](https://github.com/davidgraeff/firestore-db-and-auth-rs/actions/workflows/with_rocket.yml)
[![](https://meritbadge.herokuapp.com/firestore-db-and-auth)](https://crates.io/crates/firestore-db-and-auth)
[![](https://img.shields.io/badge/license-MIT-blue.svg)](http://opensource.org/licenses/MIT)
![docs.rs](https://img.shields.io/docsrs/firestore-db-and-auth)This crate allows easy access to your Google Firestore DB via service account or OAuth impersonated Google Firebase Auth credentials.
Minimum Rust version: 1.64Features:
* Asynchronous API
* Subset of the Firestore v1 API
* Optionally handles authentication and token refreshing for you
* Support for the downloadable Google service account json file from [Google Clound console](https://console.cloud.google.com/apis/credentials/serviceaccountkey).
(See https://cloud.google.com/storage/docs/reference/libraries#client-libraries-install-cpp)Use-cases:
* Strictly typed document read/write/query access
* Cloud functions (Google Compute, AWS Lambda) access to FirestoreLimitations:
* Listening to document / collection changes is not yet possible### Cargo features
* **native-tls**, **default-tls**, **rustls-tls**: Choose any of those features for encrypted connections (https).
rustls-tls is the default (the rustls crate will be used).* **rocket_support**: [Rocket](https://rocket.rs/) is a web framework.
This feature enables rocket integration and adds a [Request Guard](https://rocket.rs/v0.4/guide/requests/#request-guards).
Only Firestore Auth authorized requests can pass this guard.### Document operations
This crate operates on DTOs (Data transfer objects) for type-safe operations on your Firestore DB.
```rust,no_run
use firestore_db_and_auth::{Credentials, ServiceSession, documents, errors::Result};
use serde::{Serialize,Deserialize};#[derive(Serialize, Deserialize)]
struct DemoDTO {
a_string: String,
an_int: u32,
another_int: u32,
}
#[derive(Serialize, Deserialize)]
struct DemoPartialDTO {
#[serde(skip_serializing_if = "Option::is_none")]
a_string: Option,
an_int: u32,
}/// Write the given object with the document id "service_test" to the "tests" collection.
/// You do not need to provide a document id (use "None" instead) and let Firestore generate one for you.
///
/// In either way a document is created or updated (overwritten).
///
/// The write method will return document metadata (including a possible generated document id)
fn write(session: &ServiceSession) -> Result<()> {
let obj = DemoDTO { a_string: "abcd".to_owned(), an_int: 14, another_int: 10 };
let result = documents::write(session, "tests", Some("service_test"), &obj, documents::WriteOptions::default())?;
println!("id: {}, created: {}, updated: {}", result.document_id, result.create_time.unwrap(), result.update_time.unwrap());
Ok(())
}/// Only write some fields and do not overwrite the entire document.
/// Either via Option<> or by not having the fields in the structure, see DemoPartialDTO.
fn write_partial(session: &ServiceSession) -> Result<()> {
let obj = DemoPartialDTO { a_string: None, an_int: 16 };
let result = documents::write(session, "tests", Some("service_test"), &obj, documents::WriteOptions{merge:true})?;
println!("id: {}, created: {}, updated: {}", result.document_id, result.create_time.unwrap(), result.update_time.unwrap());
Ok(())
}
```Read the document with the id "service_test" from the Firestore "tests" collection:
```rust,no_run
use firestore_db_and_auth::{documents};
let obj : DemoDTO = documents::read(&session, "tests", "service_test")?;
```For listing all documents of the "tests" collection you want to use the `list` method which implements an async stream.
This hide the complexity of the paging API and fetches new documents when necessary:```rust,no_run
use firestore_db_and_auth::{documents};let mut stream = documents::list(&session, "tests");
while let Some(Ok(doc_result)) = stream.next().await {
// The document is wrapped in a Result<> because fetching new data could have failed
let (doc, _metadata) = doc_result;
let doc: DemoDTO = doc;
println!("{:?}", doc);
}
```*Note:* The resulting list or list cursor is a snapshot view with a limited lifetime.
You cannot keep the iterator/stream for long or expect new documents to appear in an ongoing iteration.For querying the database you would use the `query` method.
In the following example the collection "tests" is queried for document(s) with the "id" field equal to "Sam Weiss".```rust,no_run
use firestore_db_and_auth::{documents, dto};let values = documents::query(&session, "tests", "Sam Weiss".into(), dto::FieldOperator::EQUAL, "id").await?;
for metadata in values {
println!("id: {}, created: {}, updated: {}", metadata.name.as_ref().unwrap(), metadata.create_time.as_ref().unwrap(), metadata.update_time.as_ref().unwrap());
// Fetch the actual document
// The data is wrapped in a Result<> because fetching new data could have failed
let doc : DemoDTO = documents::read_by_name(&session, metadata.name.as_ref().unwrap())?;
println!("{:?}", doc);
}
```Did you notice the `into` on `"Sam Weiss".into()`?
Firestore stores document fields strongly typed.
The query value can be a string, an integer, a floating point number and potentially even an array or object (not tested).*Note:* The query method returns a vector, because a query potentially returns multiple matching documents.
### Error handling
The returned `Result` will have a `FirebaseError` set in any error case.
This custom error type wraps all possible errors (IO, Reqwest, JWT errors etc)
and Google REST API errors. If you want to specifically check for an API error,
you could do so:```rust,no_run
use firestore_db_and_auth::{documents, errors::FirebaseError};let r = documents::delete(&session, "tests/non_existing", true).await;
if let Err(e) = r.err() {
if let FirebaseError::APIError(code, message, context) = e {
assert_eq!(code, 404);
assert!(message.contains("No document to update"));
assert_eq!(context, "tests/non_existing");
}
}
```The code is numeric, the message is what the Google server returned as message.
The context string depends on the called method.
It may be the collection or document id or any other context information.### Document access via service account
1. Download the service accounts credentials file and store it as "firebase-service-account.json".
The file should contain `"private_key_id": ...`.
2. Add another field `"api_key" : "YOUR_API_KEY"` and replace YOUR_API_KEY with your *Web API key*, to be found in the [Google Firebase console](https://console.firebase.google.com) in "Project Overview -> Settings - > General".```rust,no_run
use firestore_db_and_auth::{Credentials, ServiceSession};/// Create credentials object. You may as well do that programmatically.
let cred = Credentials::from_file("firebase-service-account.json").await
.expect("Read credentials file")
.download_jwkset().await
.expect("Failed to download public keys");
/// To use any of the Firestore methods, you need a session first. You either want
/// an impersonated session bound to a Firebase Auth user or a service account session.
let session = ServiceSession::new(&cred)
.expect("Create a service account session");
```### Document access via a firebase user access / refresh token or via user_id
You can create a user session in various ways.
If you just have the firebase Auth user_id, you would follow these steps:```rust,no_run
use firestore_db_and_auth::{Credentials, sessions};/// Create credentials object. You may as well do that programmatically.
let cred = Credentials::from_file("firebase-service-account.json").await
.expect("Read credentials file")
.download_jwkset().await
.expect("Failed to download public keys");/// To use any of the Firestore methods, you need a session first.
/// Create an impersonated session bound to a Firebase Auth user via your service account credentials.
let session = UserSession::by_user_id(&cred, "the_user_id").await
.expect("Create a user session");
```If you already have a valid refresh token and want to generate an access token (and a session object), you do this instead:
```rust,no_run
let refresh_token = "fkjandsfbajsbfd;asbfdaosa.asduabsifdabsda,fd,a,sdbasfadfasfas.dasdasbfadusbflansf";
let session = UserSession::by_refresh_token(&cred, &refresh_token).await?;
```Another way of retrieving a session object is by providing a valid access token like so:
```rust,no_run
let access_token = "fkjandsfbajsbfd;asbfdaosa.asduabsifdabsda,fd,a,sdbasfadfasfas.dasdasbfadusbflansf";
let session = UserSession::by_access_token(&cred, &access_token).await?;
```The `by_access_token` method will fail if the token is not valid anymore.
Please note that a session created this way is not able to automatically refresh its access token.
(There is no *refresh_token* associated with it.)## Cloud functions: Improve cold-start time
The usual start up procedure includes three IO operations:
* downloading two public jwks keys from a Google server,
* and read in the json credentials file.Avoid those by embedding the credentials and public key files into your application.
First download the 2 public key files:
* https://www.googleapis.com/service_accounts/v1/jwk/[email protected] -> Store as `securetoken.jwks`
* https://www.googleapis.com/service_accounts/v1/jwk/{your-service-account-email} -> Store as `service-account.jwks`
* Merge the two files into one `firebase-service-account.jwks`Create a `Credentials` object like so:
```rust,no_run
use firestore_db_and_auth::Credentials;
let c = Credentials::new(include_str!("firebase-service-account.json")).await?
.with_jwkset(&JWKSet::new(include_str!("firebase-service-account.jwks"))?).await?;
```> Please note though, that Googles JWK keys change periodically.
> You probably want to redeploy your service with fresh public keys about every three weeks.
>
> For long-running service you want to call Credentials::download_google_jwks() periodically.### More information
* [Firestore Auth: Background information](doc/auth_background.md)
* [Use your own authentication implementation](doc/own_auth.md)
* [Http Rocket Server integration](doc/rocket_integration.md)
* Build the documentation locally with `cargo +nightly doc --features external_doc,rocket_support`## Testing
To perform a full integration test (`cargo test`), you need a valid "firebase-service-account.json" file.
The tests expect a Firebase user with the ID given in `examples/test_user_id.txt` to exist.
[More Information](/doc/integration_tests.md)#### What can be done to make this crate more awesome
This library does not have the ambition to mirror the http/gRPC API 1:1.
There are auto-generated libraries for this purpose. But the following fits into the crates schema:* Nice to have: Transactions, batch_get support for Firestore