This crate implements a JSON Webtoken (JWT) middleware for the actix-web framework.
For the moment it uses Curve25519 implemented in the ed25519_dalek crate for the signing process of the token but i will be working on a generalization soon.
## Features
Automatic insertion and extraction of claims into the Extensions object on the request. For this your type has to implement the FromRequest trait or it has to be annotated with the #[derive(actix-jwt-auth-middleware::FromRequest)]
macro which implements this trait for your type.
```rust #[derive(Serialize, Deserialize, Clone, FromRequest)] struct UserClaims { id: u32, role: Role, }
#[derive(Serialize, Deserialize, Clone)] enum Role { Admin, BaseUser, }
#[get("/hello")] async fn hello(userclaims: UserClaims) -> impl Responder { format!("Hello user with id: {}!", userclaims.id) } ```
Guard functions on top of JWT authentication.
Your guard function has to implement the Handler trait and return a type that is partially equatable to a boolean. Luckily the Handler trait is implemented for functions (up to an arity of 12) by actix_web.
The Application State can also be accessed with the guard function, for this use the web::Data
rust
async fn verify_service_request(user_claims: UserClaims) -> bool {
match user_claims.role {
Role::Admin => true,
Role::BaseUser => false,
}
}
## Example
```rust use actixjwtauthmiddleware::{AuthError, AuthService, Authority, FromRequest}; use actixweb::{ get, web::{self, Data}, App, HttpResponse, HttpServer, Responder, }; use serde::{Deserialize, Serialize};
#[derive(Serialize, Deserialize, Clone, FromRequest)] struct UserClaims { id: u32, role: Role, }
#[derive(Serialize, Deserialize, Clone)] enum Role { Admin, BaseUser, }
async fn verifyservicerequest(userclaims: UserClaims) -> bool { match userclaims.role { Role::Admin => true, Role::BaseUser => false, } }
#[actixweb::main]
async fn main() -> std::io::Result<()> {
// we initialize a new Authority passing the underling type the JWT token should destructure into.
let authauthority = Authority::
#[get("/hello")] async fn hello(userclaims: UserClaims) -> impl Responder { format!("Hello user with id: {}!", userclaims.id) }
// calling this route will give you access to the rest of the apps scopes
#[get("/login")]
async fn login(authauthority: Data
Ok(HttpResponse::Accepted()
.cookie(cookie)
.body("You are now logged in"))
}
// calling this route will not give you access to the rest of the apps scopes because you are not an admin
#[get("/login-as-base-user")]
async fn loginasbaseuser(
authauthority: Data
Ok(HttpResponse::Accepted()
.cookie(cookie)
.body("You are now logged in"))
} ```
License: MIT OR Apache-2.0