Sputnik

A lightweight layer on top of Hyper to facilitate building web applications.

Sputnik provides:

Sputnik does not:

Error handling

Sputnik defines the following error types:

```rust pub struct SimpleError { pub code: StatusCode, pub message: String, }

pub enum Error { Simple(SimpleError), Response(hyper::Response), } ```

Sputnik implements Into<Error::Simple> for all of its client error types (e.g. deserialization errors), allowing you to easily customize the error presentation. Sometimes however a SimpleError doesn't suffice, e.g. you might want to redirect unauthorized users to your login page instead of showing them an error, for such cases you can return an Error::Response.

CsrfToken example

```rust use std::convert::Infallible; use hyper::service::{servicefn, makeservice_fn}; use hyper::{Method, Server}; use serde::Deserialize; use sputnik::security::CsrfToken; use sputnik::{Error, request::{Parts, Body}, response::Response};

async fn route(req: &mut Parts, body: Body) -> Result { match (req.method(), req.uri().path()) { (&Method::GET, "/form") => getform(req).await, (&Method::POST, "/form") => postform(req, body).await, _ => return Err(Error::notfound("page not found".toowned())) } }

async fn getform(req: &mut Parts) -> Result { let mut response = Response::new(); let csrftoken = CsrfToken::fromparts(req, &mut response); *response.body() = format!("

{}", csrf
token.html_input()).into(); Ok(response) }

[derive(Deserialize)]

struct FormData {text: String}

async fn postform(req: &mut Parts, body: Body) -> Result { let mut response = Response::new(); let csrftoken = CsrfToken::fromparts(req, &mut response); let msg: FormData = body.intoformcsrf(&csrftoken).await?; *response.body() = format!("hello {}", msg.text).into(); Ok(response) }

/// adapt between Hyper's types and Sputnik's convenience types async fn service(req: hyper::Request) -> Result, Infallible> { let (mut parts, body) = sputnik::request::adapt(req); match route(&mut parts, body).await { Ok(res) => Ok(res.into()), Err(err) => match err { Error::Simple(err) => { Ok(err.response_builder().body(err.message.into()).unwrap()) // you can easily wrap or log errors here } Error::Response(err) => Ok(err) } } }

[tokio::main]

async fn main() { let service = makeservicefn(move || { async move { Ok::<_, hyper::Error>(servicefn(move |req| { service(req) })) } });

let addr = ([127, 0, 0, 1], 8000).into();
let server = Server::bind(&addr).serve(service);
println!("Listening on http://{}", addr);
server.await;

} ```

Signed & expiring cookies

After a successful authentication you can build a session id cookie for example as follows:

rust let expiry_date = OffsetDateTime::now_utc() + Duration::hours(24); let mut cookie = Cookie::new("userid", key.sign( &encode_expiring_claim(&userid, expiry_date) )); cookie.set_secure(Some(true)); cookie.set_expires(expiry_date); cookie.set_same_site(SameSite::Lax); resp.set_cookie(cookie);

This session id cookie can then be retrieved and verified as follows:

rust let userid = req.cookies().get("userid") .ok_or_else(|| Error::unauthorized("expected userid cookie".to_owned())) .and_then(|cookie| key.verify(cookie.value()).map_err(Error::unauthorized)) .and_then(|value| decode_expiring_claim(value).map_err(|e| Error::unauthorized(format!("failed to decode userid cookie: {}", e))))?;

Tip: If you want to store multiple claims in the cookie, you can (de)serialize a struct with serde_json. This approach can pose a lightweight alternative to JWT, if you don't care about the standardization aspect.