actix-jwt-authc

Crates.io docs.rs Continuous integration Coverage Status

JWT authentication middleware for Actix that supports checking for invalidated JWTs without paying the cost of a per-request IO call. It periodically pulls a set of invalidated JWTs and storing them in memory from a reader implementation that can be efficiently implemented.

This middleware is based on the assumption that since JWTs (should) have an expiry, ultimately, an in-memory set of explicitly-invalidated-yet-unexpired JWTs that are periodically reloaded should not be overwhelmingly big enough to cause problems. Only measurements can help answer if it causes problems in your specific usecase.

Docs for main

Uses

Features

Example

The example included in this repo has

Both session and JWT keys are generated on the fly, so JWTs are incompatible across restarts.

It supports tracing and session as features. To run a server on 8080:

shell cargo run --example inmemory --features tracing,session

Supported endpoints

If session is not passed, authentication in the example is dependent on Bearer tokens sent as an Authorization header.

Disclaimer

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.