Actix Database Identity Provider

Build Status docs.rs

SQL database (diesel) integration for actix framework

Description

Implements a SQL backend for Actix-Web's identity middleware. Does not perform any authentication, only "remembers" the user when told to. The returned header containing the authorized token is configurable via the SqlIdentityBuilder::response_header() method.

Normal server application flow:

From here, normal flow according to identity middleware guide can be followed

Normal client application flow:

SQL Variants supported

Features

Default: SQLite, MySQL, Postgres

sqlite: Include SQLite support

mysql: Include MySQL support

postgres: Include PostgreSQL supprt

Database Requirements

This crate requires a table named identities with the following fields:

| Field | Type | Constraints | Description | | --------- | --------- | ----------------------------- | ----------------------------------------------------------- | | id | BIGINT | PRIMARY KEY, AUTO INCREMENT | A unique id that is not the token, for revoking sessions | | token | CHAR(32) | NOT NULL, UNIQUE | The auto-generated token field, will be used to lookup user | | userid | TEXT | NOT NULL | The user id to remember, probably a key in another table | | ip | TEXT | | The IP the user most recently connected from | | useragent | TEXT | | The user-agent of the most recent connection | | created | TIMESTAMP | NOT NULL | Timestamp (w/out timezone) this token was created | | modified | TIMESTAMP | NOT NULL | Timestamp (w/out timezone) this token was last used |

Example SQL files for SQLite, MySQL, and PostgreSQL are available int the sql/ folder on the repository

Server Example

```rust extern crate actixweb; extern crate actixwebsqlidentity;

use actixweb::{http, server, App, HttpRequest, Responder}; use actixweb::middleware::identity::{IdentityService, RequestIdentity}; use actixwebsql_identity::SqlIdentityBuilder;

const POOL_SIZE: usize = 3; // Number of connections per pool

fn login(mut req: HttpRequest) -> impl Responder { // Should pull username/id from request req.remember("usernameorid".tostring()); "Logged in!".tostring() }

fn profile(req: HttpRequest) -> impl Responder { if let Some(user) = req.identity() { format!("Hello, {}!", user) } else { "Hello, anonymous user!".to_string() } }

fn logout(mut req: HttpRequest) -> impl Responder { req.forget(); "Logged out!".to_string() }

fn main() { server::new(|| { // Construct our policy, passing the address and any options let policy = SqlIdentityBuilder::new("sqlite://my.db") .poolsize(POOLSIZE);

    App::new()
        .route("/login", http::Method::POST, login)
        .route("/profile", http::Method::GET, profile)
        .route("/logout", http::Method::POST, logout)
        .middleware(IdentityService::new(
                policy.finish()
                    .expect("failed to connect to database")))
})
.bind("127.0.0.1:7070").unwrap()
.run();

} ```

Client Example

```rust extern crate reqwest;

[macro_use]

extern crate hyper;

use hyper::header::{Authorization, Bearer, Headers}; use reqwest::{Client, Response};

// Build our custom header that will contain our returned token header! { (XActixAuth, "X-Actix-Auth") => [String] }

/// Builds a GET request to send to the server, with optional authentication /// /// # Arguments /// /// * client - Client to build request with /// * uri - Endpoint to target (e.g., /index, /profile, etc) /// * token - An optional authentication token fn buildget(client: &Client, uri: &str, token: Option<&str>) -> Response { let mut req = client .get(format!("http://127.0.0.1:7070{}", uri).asstr());

if let Some(token) = token {
    let mut headers = Headers::new();
    headers.set(Authorization(Bearer {
        token: token.to_owned(),
    }));
    req.headers(headers);
}

let req = req.build()
    .expect("failed to build request");

client.execute(req).expect("failed to send request")

}

/// Builds a POST request to send to the server, with optional authentication /// /// # Arguments /// /// * client - Client to build request with /// * uri - Endpoint to target (e.g., /login, /logout) /// * token - An optional authentication token fn buildpost(client: &Client, uri: &str, token: Option<&str>) -> Response { let mut req = client .post(format!("http://127.0.0.1:7070{}", uri).asstr());

if let Some(token) = token {
    let mut headers = Headers::new();
    headers.set(Authorization(Bearer {
        token: token.to_owned(),
    }));
    req.headers(headers);
}

let req = req.build()
    .expect("failed to build request");

client.execute(req).expect("failed to send request")

}

/// Pretty print a response /// /// # Arguments /// /// * resp - Response to print fn printresponse(resp: &mut Response) { let uri = resp.url().clone(); println!("[{0: <15}] {1: <30} {2}", resp.status(), uri.asstr(), resp.text().expect("failed to read response")); }

fn main() { let client = Client::new();

// Get Index
let mut resp = build_get(&client, "/", None); 
print_response(&mut resp);

// Get Profile (no auth)
let mut resp = build_get(&client, "/profile", None);
print_response(&mut resp);

// Login
let mut resp = build_post(&client, "/login", None);
print_response(&mut resp);

// Extract the auth token from the header
// (Header field can be changed on server, default is used here)
let hdrs = resp.headers();
let token = hdrs.get::<XActixAuth>().unwrap();
//println!("[token]: {:?}", token.0);

// Get Profile (auth)
let mut resp = build_get(&client, "/profile", Some(token.0.as_ref()));
print_response(&mut resp);

// Logout
let mut resp = build_post(&client, "/logout", Some(token.0.as_str()));
print_response(&mut resp);

// Get Profile (auth)
let mut resp = build_get(&client, "/profile", Some(token.0.as_ref()));
print_response(&mut resp);

} ```

License

BSD 3-Clause

Author

Kevin Allison kvnallsn AT gmail.com