Library to Provide a User Authentication and privilege Token Checks. It requires the AxumDatabaseSessions library. This library will help by making it so User ID or authorizations are not stored on the Client side but rather on the Server side. The Authorization is linked by the Clients Serverside Session ID which is stored on the Client side.
You must choose only one of ['postgres', 'mysql', 'sqlite'] features to use this library.
Axum Sessions Authentication uses [tokio
] runtime along with ['sqlx'] and ['axumdatabasesessions']; it supports [native-tls
] and [rustls
] TLS backends. When adding the dependency, you must chose a database feature that is DatabaseType
and a tls
backend. You can only choose one database type and one TLS Backend.
```toml
[dependencies]
axumsessionsauth = { version = "1.1", features = [ "postgres", "rustls" ] } ```
sqlite
: Sqlx
support for the self-contained SQLite database engine.
postgres
: Sqlx
support for the Postgres database server.
mysql
: Sqlx
support for the MySQL/MariaDB database server.
native-tls
: Use the tokio
runtime and native-tls
TLS backend.
rustls
: Use the tokio
runtime and rustls
TLS backend.
```rust use sqlx::{ConnectOptions, postgres::{PgPoolOptions, PgConnectOptions}}; use std::net::SocketAddr; use axumdatabasesessions::{AxumSession, AxumSessionConfig, AxumSessionLayer, AxumDatabasePool}; use axumsessionsauth::{AuthSession, AuthSessionLayer, Authentication}; use axum::{ Router, routing::get, };
async fn main() { # async { let poll = connecttodatabase().await.unwrap();
let session_config = AxumSessionConfig::default()
.with_database("test")
.with_table_name("test_table");
let session_store = AxumSessionStore::new(Some(poll.clone().into()), session_config);
// build our application with some routes
let app = Router::new()
.route("/greet/:name", get(greet))
.layer(AxumSessionLayer::new(session_store))
.layer(AuthSessionLayer::<User>::new(Some(poll.clone().into()), Some(1)));
// run it
let addr = SocketAddr::from(([127, 0, 0, 1], 3000));
tracing::debug!("listening on {}", addr);
axum::Server::bind(&addr)
.serve(app.into_make_service())
.await
.unwrap();
# };
}
//we can get the Method to compare with what Methods we allow. Useful if thius supports multiple methods.
//When called auth is loaded in the background for you.
async fn greet(method: Method, session: AxumSession, auth: AuthSession
if let Some(cur_user) = current_user {
if !Auth::<User>::build([Method::Get], false)
.requires(Rights::none([
Rights::permission("Token::UseAdmin"),
Rights::permission("Token::ModifyPerms"),
]))
.validate(&cur_user, &method, None)
.await
{
return format!("No Permissions! for {}", cur_user.username)[];
}
let username = if !auth.is_authenticated() {
//Set the user ID of the User to the Session so it can be Auto Loaded the next load or redirect
auth.login_user(2);
"".to_string()
} else {
//if the user is loaded and is Authenticated then we can use it.
if let Some(user) = auth.current_user {
user.username.clone()
} else {
"".to_string()
}
};
format!("{}-{}", username, count)[..]
} else {
if !auth.is_authenticated() {
//Set the user ID of the User to the Session so it can be Auto Loaded the next load or redirect
auth.login_user(2);
//redirect here after login if we did indeed login.
}
"No Permissions!"
}
}
pub struct User { pub id: i32, pub anonymous: bool, pub username: String, }
//This is only used if you want to use Token based Authentication checks
impl HasPermission for User { async fn has(&self, perm: &String, pool: &Option<&AxumDatabasePool>) -> bool { match &perm[..] { "Token::UseAdmin" => true, "Token::ModifyUser" => true, _ => false, } } }
impl Authentication
fn is_authenticated(&self) -> bool {
!self.anonymous
}
fn is_active(&self) -> bool {
!self.anonymous
}
fn is_anonymous(&self) -> bool {
self.anonymous
}
}
async fn connecttodatabase() -> anyhow::Result
If you need help with this library please go to our Discord Group