Actix web security is a NOT OFFICIAL crate to secure web apps built with actix web.
This library is not verified to be secure. It has neither been audited to be safe in an audit nor been pentested.
The library was developed to the best of knowledge and belief.
It's in your own responsibility to check the code for potential security issues or bugs and your own decision
whether you see it as safe and trustworthy or whether you prefer to not use it.
In other words (excerpt of the MIT license):
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Add the following dependency to your cargo.toml
.
toml
actix-web-security = "0.1.0-alpha.2"
The following features can be activated:
* jwk-loader
This feature can be activated to download custom JWKs from an authorization server
toml
actix-web-security = { version="0.1.0-alpha.2", features = ["jwk-loader"] }
jwk-default-loader
DefaultJwks
from an authorization server.
toml
actix-web-security = { version="0.1.0-alpha.2", features = ["jwk-default-loader"] }
Both features require openssl
to be installed on the system.
The documentation about how to install it can be found here.
Sample applications can be found here.
A concrete type of UserDetails, BasicUserDetailsService or JwtUserDetailsService,
UserDetails
is a marker trait to be implemented by a user entity. The user entity can be
added to the request extensions to inject it in the API endpoints.
```rust
pub struct User { pub id: i64, pub user_id: String, pub name: String }
impl UserDetails for User {} ```
One of BasicUserDetailsService
and JwtUserDetailsService
traits must be implemented to
resolve users for given credentials / JWTs.
A JwtUserDetailsService
implementation could look like:
```rust
pub struct JwtUserDetailsServiceImpl {
pub(crate) user_repository: Arc
impl JwtUserDetailsService for JwtUserDetailsServiceImpl {
#[allow(clippy::borrowedbox)]
async fn finduser(&self, token: &Box
One of BasicAuthenticationExtractor
or BearerAuthenticationExtractor
must be configured.
A BasicAuthenticationExtractor
can be created easily as shown below:
rust
BasicAuthenticationExtractor::new()
In case of the BearerAuthenticationExtractor one or more TokenDecoder
must be configured as well.
If the crate feature jwk-default-loader
is used the JWKs can be downloaded automatically and token
decoders instantiated automatically by using the load_default_rsa_jwks
function.
rust
BearerAuthenticationExtractor::new(load_default_rsa_jwks(auth_server_jwks_url, Algorithm::RS256));
The credentials extraction and authentication can be limited to specific endpoints or applied
to all endpoints. A EndpointMatcher
must be instantiated. There are two default implementations
available: AllEndpointsMatcher
to protect all endpoints and SpecificUrlsMatcher
to protect
the URS with the exact matching URLs. Custom ones can be implemented if the defaults are not
applicable for the use-case.
rust
AllUrlMatcher::new()
Warning: Endpoints are only protected if the matcher covered the endpoints.
An AuthenticationProvider
is an abstraction that is used to do the authentication.
There are two default implementations BasicAuthenticationProvider
and JwtAuthenticationProvider
.
A custom implementation can be written to use different authentication mechanisms.
A BasicAuthenticationProvider
can be instantiated as easy as:
rust
BasicAuthenticationProvider::new(Box::new(user_details_service))
A JwtAuthenticationProvider
can be instantiated as easy as:
rust
JwtAuthenticationProvider::new(Box::new(user_details_service))
One or more AuthenticationProvider
must be configured to authenticate users.
They are registered in a ProviderManager
.
rust
ProviderManager::new(vec![authentication_provider1, authentication_provider2])
The HttpAuthenticationModdleware
is the wrapper of all previously described
components that handles the actual authentication process.
rust
HttpAuthenticationMiddleware::new(
ProviderManager::new(vec![
Box::new(JwtAuthenticationProvider::new(
Box::new(user_details_service)
))
]),
Box::new(authentication_extractor),
Box::new(endpoint_matcher),
)
The middleware can be registered normal in actix:
rust
HttpServer::new(move || {
let cors_middleware = ...;
let auth_middleware = ...;
App::new()
.wrap(auth_middleware)
.wrap(cors_middleware)
.service(api::endpoint1)
})
.bind("0.0.0.0:8081")?
.run()
.await?;
More details can be found in the sample applications repository.
This project is licensed under either of
at your option.