All in one creating session and session validation library for actix.
It's designed to extract session using middleware and validate endpoint simply by using actix-web extractors.
Currently you can extract tokens from Header or Cookie. It's possible to implement Path, Query
or Body using [ServiceRequest::extract]
but you must have struct to which values will be
extracted so it's easy to do if you have your own fields.
Example:
```rust use serde::Deserialize;
struct MyJsonBody {
jwt: Option
To start with this library you need to create your own AppClaims
structure and implement
actix_jwt_session::Claims
trait for it.
```rust use serde::{Serialize, Deserialize};
pub enum Audience { Web, }
pub struct Claims { #[serde(rename = "exp")] pub expirationtime: u64, #[serde(rename = "iat")] pub issuesat: usize, /// Account login #[serde(rename = "sub")] pub subject: String, #[serde(rename = "aud")] pub audience: Audience, #[serde(rename = "jti")] pub jwtid: uuid::Uuid, #[serde(rename = "aci")] pub accountid: i32, #[serde(rename = "nbf")] pub not_before: u64, }
impl actixjwtsession::Claims for Claims { fn jti(&self) -> uuid::Uuid { self.jwt_id }
fn subject(&self) -> &str {
&self.subject
}
}
impl Claims { pub fn accountid(&self) -> i32 { self.accountid } } ```
Then you must create middleware factory with session storage. Currently there's adapter only for redis so we will goes with it in this example.
redis_async_pool
.```rust use std::sync::Arc; use actixjwtsession::*;
async fn create
// load or create new keys in `./config`
let keys = JwtSigningKeys::load_or_create();
// create new [SessionStorage] and [SessionMiddlewareFactory]
let (storage, factory) = SessionMiddlewareFactory::<AppClaims>::build(
Arc::new(keys.encoding_key),
Arc::new(keys.decoding_key),
Algorithm::EdDSA
)
// pass redis connection
.with_redis_pool(redis.clone())
// Check if header "Authorization" exists and contains Bearer with encoded JWT
.with_jwt_header("Authorization")
// Check if cookie "jwt" exists and contains encoded JWT
.with_jwt_cookie("acx-a")
.with_refresh_header("ACX-Refresh")
// Check if cookie "jwt" exists and contains encoded JWT
.with_refresh_cookie("acx-r")
.finish();
} ```
As you can see we have there [SessionMiddlewareBuilder::withrefreshcookie] and [SessionMiddlewareBuilder::withrefreshheader]. Library uses internal structure [RefreshToken] which is created and managed internally without any additional user work.
This will be used to extend JWT lifetime. This lifetime comes from 2 structures which describe time to live. [JwtTtl] describes how long access token should be valid, [RefreshToken] describes how long refresh token is valid. [SessionStorage] allows to extend livetime of both with single call of [SessionStorage::refresh] and it will change time of creating tokens to current time.
```rust use actixjwtsession::{JwtTtl, RefreshTtl, Duration};
fn examplettl() { let jwtttl = JwtTtl(Duration::days(14)); let refresh_ttl = RefreshTtl(Duration::days(3 * 31)); } ```
Now you just need to add those structures to [actix_web::App] using .app_data
and .wrap
and
you are ready to go. Bellow you have full example of usage.
Examples usage:
```rust use std::sync::Arc; use actixjwtsession::; use actix_web::{get, post}; use actix_web::web::{Data, Json}; use actix_web::{HttpResponse, App, HttpServer}; use jsonwebtoken::; use serde::{Serialize, Deserialize};
async fn main() { let redis = { use redisasyncpool::{RedisConnectionManager, RedisPool}; RedisPool::new( RedisConnectionManager::new( redis::Client::open("redis://localhost:6379").expect("Fail to connect to redis"), true, None, ), 5, ) };
let keys = JwtSigningKeys::load_or_create();
let (storage, factory) = SessionMiddlewareFactory::<AppClaims>::build(
Arc::new(keys.encoding_key),
Arc::new(keys.decoding_key),
Algorithm::EdDSA
)
.with_redis_pool(redis.clone())
// Check if header "Authorization" exists and contains Bearer with encoded JWT
.with_jwt_header(JWT_HEADER_NAME)
// Check if cookie JWT exists and contains encoded JWT
.with_jwt_cookie(JWT_COOKIE_NAME)
.with_refresh_header(REFRESH_HEADER_NAME)
// Check if cookie JWT exists and contains encoded JWT
.with_refresh_cookie(REFRESH_COOKIE_NAME)
.finish();
let jwt_ttl = JwtTtl(Duration::days(14));
let refresh_ttl = RefreshTtl(Duration::days(3 * 31));
HttpServer::new(move || {
App::new()
.app_data(Data::new(storage.clone()))
.app_data(Data::new( jwt_ttl ))
.app_data(Data::new( refresh_ttl ))
.wrap(factory.clone())
.app_data(Data::new(redis.clone()))
.service(must_be_signed_in)
.service(may_be_signed_in)
.service(register)
.service(sign_in)
.service(sign_out)
.service(refresh_session)
.service(session_info)
.service(root)
})
.bind(("0.0.0.0", 8080)).unwrap()
.run()
.await.unwrap();
}
pub struct SessionData { id: uuid::Uuid, subject: String, }
async fn mustbesignedin(session: Authenticated
async fn maybesignedin(session: MaybeAuthenticated
struct SignUpPayload { login: String, password: String, password_confirmation: String, }
async fn register(payload: Json
// Validate payload
// Save model and return HttpResponse
let model = AccountModel {
id: -1,
login: payload.login,
// Encrypt password before saving to database
pass_hash: Hashing::encrypt(&payload.password).unwrap(),
};
// Save model
todo!()
}
struct SignInPayload { login: String, password: String, }
async fn signin(
store: Data
async fn signout(store: Data
async fn session_info(auth: Authenticated
async fn refreshsession(
auth: Authenticated
async fn root() -> HttpResponse { HttpResponse::Ok().finish() }
pub enum Audience { Web, }
pub struct AppClaims { #[serde(rename = "exp")] pub expirationtime: u64, #[serde(rename = "iat")] pub issuesat: usize, /// Account login #[serde(rename = "sub")] pub subject: String, #[serde(rename = "aud")] pub audience: Audience, #[serde(rename = "jti")] pub jwtid: uuid::Uuid, #[serde(rename = "aci")] pub accountid: i32, #[serde(rename = "nbf")] pub not_before: u64, }
impl actixjwtsession::Claims for AppClaims { fn jti(&self) -> uuid::Uuid { self.jwt_id }
fn subject(&self) -> &str {
&self.subject
}
}
impl AppClaims { pub fn accountid(&self) -> i32 { self.accountid } }
struct AccountModel { id: i32, login: String, pass_hash: String, } ```
1.0.0