| Crates.io | middle |
| lib.rs | middle |
| version | 0.3.0 |
| created_at | 2025-02-19 21:52:09.018716+00 |
| updated_at | 2025-02-26 10:14:13.433079+00 |
| description | Client Authorization Middleware for APIs secured via OAuth2 or Bearer Tokens. Tonic & reqwest integration. Based on the `oauth2` crate. |
| homepage | https://github.com/vakamo-labs/middle-rs |
| repository | https://github.com/vakamo-labs/middle-rs |
| max_upload_size | |
| id | 1561923 |
| size | 111,291 |
This crate provides authentication middleware for clients that need to access secure HTTP and gRPC APIs. Features include:
reqwest integration by using a wrapped HttpClienttonic integration via Interceptorsoauth2 crateIn the following example we create a middle::HttpClient that wraps a reqwest::Client.
The token is kept fresh with a background task of the ClientCredentialAuthorizer, so that the client always sends authorized requests.
use std::str::FromStr;
use middle::BasicClientCredentialAuthorizer;
use reqwest::Client;
use url::Url;
#[tokio::main]
async fn main() {
let client_id = "my-client-id";
let client_secret = "my-client-secret";
let token_endpoint = Url::from_str("https://identity.example.com/oauth2/token").unwrap();
// Create a new Authorizer. The Authorizer keeps the token refreshed in the background.
let authorizer =
BasicClientCredentialAuthorizer::new(client_id, client_secret, token_endpoint)
.add_scope("my-scope")
.refresh_tolerance(std::time::Duration::from_secs(30)) // Refresh 30 seconds before expiry
.build()
.await
.unwrap();
// The current authorization header. The header is always kept up-to-date.
// Returns an error if the last refresh failed.
let header = authorizer.authorization_header().unwrap();
// Generate a new reqwest Client and wrap it with `HttpClient`.
let reqwest_client = Client::new();
let client = middle::HttpClient::new(authorizer).set_client(reqwest_client);
// Start using the client - the authorization header is automatically added.
let request = client.get("https://api.example.com/data").unwrap();
let _response = request.send().await.unwrap();
}
ALl Authorizers implemented by the middle crate, implement tonic::service::Interceptor if the tonic feature is enabled.
use hello_world::{greeter_service_client::GreeterServiceClient, SayHelloRequest};
use middle::BearerTokenAuthorizer;
use tonic::transport::Endpoint;
pub mod hello_world {
tonic::include_proto!("helloworld");
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
// All authorizers provided by the `middle` crate implement the `tonic::Interceptor` trait.
let authorizer = BearerTokenAuthorizer::new("my-super-secret-token")?;
let channel = Endpoint::from_static("http://service.example.com:50051")
.connect()
.await?;
// Use the authorizer as an interceptor.
let mut client = GreeterServiceClient::with_interceptor(channel, authorizer);
// All following requests include the authorization header.
let request = tonic::Request::new(SayHelloRequest {
name: "Tonic".into(),
});
let response = client.say_hello(request).await?;
println!("RESPONSE={:?}", response);
Ok(())
}
rustls-tls, tonic, client-credentials, and runtime-tokio.rustls-tls, client-credentials, and runtime-tokio.reqwest/rustls-tls and reqwest/rustls-tls-native-roots.tonic::service::Interceptor for all Authorizerstokio runtime (currently the only supported async runtime). Some Authorizers depend on an async runtime to spawn refresh tasks.ClientCredentialAuthorizer for the OAuth2 Client Credential flow