Crates.io | protect-axum |
lib.rs | protect-axum |
version | 0.1.2 |
source | src |
created_at | 2024-04-10 18:01:56.454948 |
updated_at | 2024-05-30 22:48:57.719932 |
description | Authorization extension for `axum` to protect your endpoints |
homepage | https://github.com/DDtKey/protect-endpoints |
repository | https://github.com/DDtKey/protect-endpoints |
max_upload_size | |
id | 1203836 |
size | 50,299 |
Authorization extension for
axum
to protect your endpoints.
To check user access to specific services, you can use built-in proc-macro
or manual.
The library can also be integrated with third-party solutions (e.g. jwt-middlewares).
The easiest way is to declare a function with the following signature (trait is already implemented for such Fn):
use axum::extract::Request;
use axum::response::Response;
// You can use custom type instead of String
pub async fn extract(req: &mut Request) -> Result<HashSet<String>, Response>
Router::new()
.route("/endpoint", get(your_handler))
.layer(GrantsLayer::with_extractor(extract));
Steps 1 and 2 can be replaced by custom middleware or integration with another libraries.
proc-macro
way protection#[get("/secure")]
#[protect_axum::protect("OP_READ_SECURED_INFO")]
async fn macro_secured() -> &'static str {
return "Hello, World!";
}
Here is an example using the ty
and expr
attributes. But these are independent features.
expr
allows you to include some checks in the macro based on function params, it can be combined with authorities by
using all
/any
.
ty
allows you to use a custom type for th authorities (then the middleware needs to be configured).
Take a look at an enum-role example
use enums::Role::{self, ADMIN};
use dto::User;
#[get("/info/{user_id}")]
#[protect_axum::protect("ADMIN", expr = "user_id.into_inner() == user.id", ty = "Role")]
async fn macro_secured(Path(user_id): Path<i32>, Json(user): Json<User>) -> &'static str {
"some secured response"
}
#[post("/info/{user_id}")]
#[protect_axum::protect(any("ADMIN", expr = "user.is_super_user()"), ty = "Role")]
async fn admin_or_super_user(Path(user_id): Path<i32>, Json(user): Json<User>) -> &'static str {
"some secured response"
}
use protect_axum::authorities::{AuthDetails, AuthoritiesCheck};
async fn manual_secure(details: AuthDetails) -> &'static str {
if details.has_authority(ROLE_ADMIN) {
return "ADMIN_RESPONSE";
}
"OTHER_RESPONSE"
}
You can find more examples
in the git repository folder and documentation
.