actix-jwt-authc Continuous integration

An JWT authentication middleware for Actix that supports checking for invalidated JWTs without paying the cost for a per-request IO call. It does this by periodically pulling a set of invalidated JWTs and storing them in memory from a reader implementation.

This middleware is based on the assumption that since JWTs (should) have an expiry, ultimately, an in-memory set of explicitly invalidated JWTs that are periodically reloaded (ie trimmed) should not be overwhelmingly big.

Uses

Features

Example

The example included in this repo has

Both session and JWT keys are generated on the fly, so JWTs are incompatible across restarts.

It supports tracing and session as features. To run a server on 8080:

shell cargo run --example inmemory --features tracing,session

Supported endpoints

If session is not passed, authentication in the example is dependent on Bearer tokens sent as an Authorization header.