Crates.io | gotham_middleware_aws_sig_verify |
lib.rs | gotham_middleware_aws_sig_verify |
version | 0.2.0 |
source | src |
created_at | 2020-03-24 21:45:36.700225 |
updated_at | 2020-05-26 05:34:26.604743 |
description | Gotham middleware for AWS SigV4 verification |
homepage | https://github.com/dacut/gotham-middleware-aws-sig-verify |
repository | https://github.com/dacut/gotham-middleware-aws-sig-verify |
max_upload_size | |
id | 222456 |
size | 25,891 |
The gotham_middleware_aws_sig_verify
crate integrates AWS SigV4 verification
(from aws_sig_verify) into the
Gotham web framework.
Assuming you have a function get_signing_key
that can return signing keys
given AWS access keys (and optionally tokens), integration would be done
similarly to:
use gotham;
use gotham::pipeline::new_pipeline;
use gotham::pipeline::single::single_pipeline;
use gotham::router::builder::{build_router, DefineSingleRoute, DrawRoutes};
use gotham::router::Router;
use gotham::state::State;
use gotham_middleware_aws_sig_verify::{AWSSigV4Verifier, SigningKeyKind, SignatureError};
use http::status::StatusCode;
use hyper::{Body, Response};
const SERVICE: &str = "myservice";
const REGION: &str = "local";
fn router() -> Router {
let verifier = AWSSigV4Verifier::new(get_signing_key, SERVICE, REGION);
let (chain, pipelines) = single_pipeline(new_pipeline().add(verifier).build());
build_router(chain, pipelines, |route| {
route.get("/").to(my_handler);
})
}
fn my_handler(state: State) -> (State, Response<Body>) {
let response: Response<Body> = Response::builder()
.header("Content-Type", "text/plain; charset=utf-8")
.status(StatusCode::OK)
.body(Body::from("OK"))
.unwrap();
(state, response)
}
fn get_signing_key(
kind: SigningKeyKind,
access_key_id: &str,
session_token: Option<&str>,
req_date_opt: Option<&str>,
region_opt: Option<&str>,
service_opt: Option<&str>
) -> Result<Vec<u8>, SignatureError> {
...
}
pub fn main() {
gotham::start("127.0.0.1:8080", router())
}