Skip to content

Conversation

@alvarowolfx
Copy link
Collaborator

Towards #3449

@alvarowolfx alvarowolfx requested review from a team as code owners November 10, 2025 19:40
@codecov
Copy link

codecov bot commented Nov 10, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 96.19%. Comparing base (2085f49) to head (082b1c7).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #3762   +/-   ##
=======================================
  Coverage   96.19%   96.19%           
=======================================
  Files         153      153           
  Lines        5842     5842           
=======================================
  Hits         5620     5620           
  Misses        222      222           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Copy link
Collaborator

@coryan coryan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR does not look ready, too many strange things.

Copy link
Collaborator Author

@alvarowolfx alvarowolfx left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

addressed review comments. Some extra files were due to some mismatch between mdformat running on my cloudtop and also mdbook not liking when you rename files and move things around.

Copy link
Collaborator

@coryan coryan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Blocking for now. The documentation is publish on each release, which would be bad for these changes because the features are not enabled by default. We should queue these changes until the features are enabled too.

@alvarowolfx alvarowolfx added the do not merge Indicates a pull request not ready for merge, due to either quality or timing. label Nov 11, 2025
alvarowolfx added a commit that referenced this pull request Nov 17, 2025
Splitting work on #3762 that can already be merged.
alvarowolfx added a commit that referenced this pull request Nov 19, 2025
Splitting work on
#3762 that can
already be merged.
@alvarowolfx alvarowolfx removed the do not merge Indicates a pull request not ready for merge, due to either quality or timing. label Nov 19, 2025
Copy link
Collaborator

@coryan coryan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A few suggestions for the text. I think we should put this guide into docs.cloud.google.com/rust right away, but maybe talk to the tech writer first in case they have suggestions about where to place it or any pre-requisites.

Comment on lines +29 to +30
ID tokens are particularly useful in scenarios where you need to authenticate to
a service that is not a Google Cloud API. For example, you can use ID tokens to
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I cannot put my finger on it, but it seems like this paragraph should be closer to "ID tokens are used for service-to-service authentication."

Comment on lines +22 to +33
ID tokens are a standardized way to verify the identity of a principal in a
secure and portable manner. Unlike access tokens, which are used to authorize
access to Google Cloud APIs, ID tokens are used for service-to-service
authentication. The requesting service can generate an ID token and include it
in the `Authorization` header of a request to the receiving service. The
receiving service can then verify the token to authenticate the caller.

ID tokens are particularly useful in scenarios where you need to authenticate to
a service that is not a Google Cloud API. For example, you can use ID tokens to
securely authenticate requests if your target service is running on [Cloud Run]
or behind an [Identity-Aware Proxy]. See the [service-to-service authentication]
guide for more information.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe this:

Suggested change
ID tokens are a standardized way to verify the identity of a principal in a
secure and portable manner. Unlike access tokens, which are used to authorize
access to Google Cloud APIs, ID tokens are used for service-to-service
authentication. The requesting service can generate an ID token and include it
in the `Authorization` header of a request to the receiving service. The
receiving service can then verify the token to authenticate the caller.
ID tokens are particularly useful in scenarios where you need to authenticate to
a service that is not a Google Cloud API. For example, you can use ID tokens to
securely authenticate requests if your target service is running on [Cloud Run]
or behind an [Identity-Aware Proxy]. See the [service-to-service authentication]
guide for more information.
ID tokens are a standardized way to verify the identity of a principal in a
secure and portable manner. Unlike access tokens, which are used to authorize
access to Google Cloud APIs, ID tokens are used for service-to-service
authentication. For example, you can use ID tokens to securely authenticate
requests if your target service is running on [Cloud Run] or behind an
[Identity-Aware Proxy]. See the [service-to-service authentication] guide for
more information.
When using ID tokens, the requesting service _generates_ an ID token and
includes it in the `Authorization` header of a request to the receiving service. The
receiving service can then _verify_ the token to authenticate the caller.


## Obtaining ID Tokens

An ID token contains claims about the identity of a principal, such as a service
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is the first time you talk about "claims", it would be useful to define it or link to a definition.

Suggested change
An ID token contains claims about the identity of a principal, such as a service
An ID token contains *claims* about the identity of a principal, such as a service

Comment on lines +60 to +62
the token. This is typically the URL of the service that will verify the token's
signature and claims to authenticate the caller. For example, if you are calling
a Cloud Run service, the audience should be the URL of that service.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not sure what "claims to authenticate the caller" means. Maybe:

Suggested change
the token. This is typically the URL of the service that will verify the token's
signature and claims to authenticate the caller. For example, if you are calling
a Cloud Run service, the audience should be the URL of that service.
the token. This is typically the URL of the service that will verify the token's
signature. For example, if you are calling
a Cloud Run service, the audience should be the URL of that service.
The audience may also include additional claims about the caller. These are
not discussed in this introduction, see [blah blah] for more information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants