Extension for
actix-web
to validate user permissions.
To check user access to specific services, you can use built-in proc-macro
, PermissionGuard
or manual.
The library can also be integrated with third-party solutions (like [actix-web-httpauth
]).
The easiest way is to declare a function with the following signature (trait is already implemented for such Fn): ```rust,ignore use actix_web::{dev::ServiceRequest, Error};
// You can use custom type instead of String
async fn extract(req: &ServiceRequest) -> Result
rust,ignore
App::new()
.wrap(GrantsMiddleware::with_extractor(extract))
Steps 1 and 2 can be replaced by custom middleware or integration with another libraries. Take a look at an jwt-httpauth example
proc-macro
way protection```rust,ignore use actixwebgrants::procmacro::{haspermissions};
async fn macrosecured() -> HttpResponse { HttpResponse::Ok().body("ADMINRESPONSE") } ```
Here is an example using the type
and secure
attributes. But these are independent features.
secure
allows you to include some checks in the macro based on function params.
type
allows you to use a custom type for the roles and permissions (then the middleware needs to be configured).
Take a look at an enum-role example
```rust,ignore use actixwebgrants::procmacro::{hasrole}; use enums::Role::{self, ADMIN}; use dto::User;
async fn macrosecured(userid: web::Path
Guard
way protection```rust,ignore use actixwebgrants::{PermissionGuard, GrantsMiddleware};
App::new() .wrap(GrantsMiddleware::withextractor(extract)) .service(web::resource("/admin") .to(|| async { HttpResponse::Ok().finish() }) .guard(PermissionGuard::new("ROLEADMIN".to_string()))) .service(web::resource("/admin") // fallback endpoint if you want to return a 403 HTTP code .to(|| async { HttpResponse::Forbidden().finish() })) ```
Scope
with Guard
Since Guard
is intended only for routing, if the user doesn't have permissions, it returns a 404
HTTP code. But you can override the behavior like this:
```rust,ignore use actixwebgrants::{PermissionGuard, GrantsMiddleware}; use actix_web::http::header;
App::new()
.wrap(GrantsMiddleware::withextractor(extract))
.service(web::scope("/admin")
.guard(PermissionGuard::new("ROLEADMINACCESS".tostring()))
.service(web::resource("/users")
.to(|| async { HttpResponse::Ok().finish() }))
).service(
web::resource("/admin{regex:$|/.*?}").to(|| async {
HttpResponse::TemporaryRedirect().appendheader((header::LOCATION, "/login")).finish()
}))
``
When
Guardlets you in the
Scope(meaning you have
"ROLEADMINACCESS"), the redirect will be unreachable for you. Even if you will request
/admin/someundefined_page`.
Note: regex
is a Path
variable containing passed link.
```rust,ignore use actixwebgrants::permissions::{AuthDetails, PermissionsCheck};
async fn manualsecure(details: AuthDetails) -> HttpResponse { if details.haspermission(ROLEADMIN) { return HttpResponse::Ok().body("ADMINRESPONSE"); } HttpResponse::Ok().body("OTHER_RESPONSE") } ```
You can find more [examples
] in the git repository folder and [documentation
].
actix-web
versionsactix-web-grants: 2.*
supported version of actix-web
is 3.*
actix-web-grants: 3.*
supported version of actix-web
is 4.*