1
0
mirror of https://github.com/actix/actix-extras.git synced 2025-02-08 21:06:07 +01:00

413 lines
13 KiB
Rust
Raw Normal View History

//! HTTP Authentication middleware.
2021-06-27 07:02:38 +01:00
use std::{
future::Future,
marker::PhantomData,
pin::Pin,
rc::Rc,
sync::Arc,
task::{Context, Poll},
2021-06-27 07:02:38 +01:00
};
use actix_web::{
2021-12-11 16:05:21 +00:00
body::{EitherBody, MessageBody},
dev::{Service, ServiceRequest, ServiceResponse, Transform},
Error,
};
use futures_core::ready;
use futures_util::future::{self, FutureExt as _, LocalBoxFuture, TryFutureExt as _};
use crate::extractors::{basic, bearer, AuthExtractor};
/// Middleware for checking HTTP authentication.
///
/// If there is no `Authorization` header in the request, this middleware returns an error
/// immediately, without calling the `F` callback.
2019-06-05 18:52:47 +03:00
///
/// Otherwise, it will pass both the request and the parsed credentials into it. In case of
/// successful validation `F` callback is required to return the `ServiceRequest` back.
#[derive(Debug, Clone)]
pub struct HttpAuthentication<T, F>
where
T: AuthExtractor,
{
process_fn: Arc<F>,
_extractor: PhantomData<T>,
}
impl<T, F, O> HttpAuthentication<T, F>
where
T: AuthExtractor,
F: Fn(ServiceRequest, T) -> O,
2020-01-07 01:00:43 +09:00
O: Future<Output = Result<ServiceRequest, Error>>,
{
/// Construct `HttpAuthentication` middleware with the provided auth extractor `T` and
/// validation callback `F`.
2019-06-05 18:52:47 +03:00
pub fn with_fn(process_fn: F) -> HttpAuthentication<T, F> {
HttpAuthentication {
process_fn: Arc::new(process_fn),
_extractor: PhantomData,
}
}
}
impl<F, O> HttpAuthentication<basic::BasicAuth, F>
where
F: Fn(ServiceRequest, basic::BasicAuth) -> O,
2020-01-07 01:00:43 +09:00
O: Future<Output = Result<ServiceRequest, Error>>,
{
/// Construct `HttpAuthentication` middleware for the HTTP "Basic" authentication scheme.
///
/// # Example
/// ```
/// # use actix_web::Error;
/// # use actix_web::dev::ServiceRequest;
/// # use actix_web_httpauth::middleware::HttpAuthentication;
/// # use actix_web_httpauth::extractors::basic::BasicAuth;
/// // In this example validator returns immediately, but since it is required to return
/// // anything that implements `IntoFuture` trait, it can be extended to query database or to
/// // do something else in a async manner.
2020-01-07 01:00:43 +09:00
/// async fn validator(
2019-06-05 18:52:47 +03:00
/// req: ServiceRequest,
/// credentials: BasicAuth,
2020-01-07 01:00:43 +09:00
/// ) -> Result<ServiceRequest, Error> {
/// // All users are great and more than welcome!
2020-01-07 01:00:43 +09:00
/// Ok(req)
/// }
///
/// let middleware = HttpAuthentication::basic(validator);
/// ```
2019-06-05 18:52:47 +03:00
pub fn basic(process_fn: F) -> Self {
Self::with_fn(process_fn)
}
}
impl<F, O> HttpAuthentication<bearer::BearerAuth, F>
where
F: Fn(ServiceRequest, bearer::BearerAuth) -> O,
2020-01-07 01:00:43 +09:00
O: Future<Output = Result<ServiceRequest, Error>>,
{
/// Construct `HttpAuthentication` middleware for the HTTP "Bearer" authentication scheme.
2019-06-05 18:52:47 +03:00
///
/// # Example
/// ```
/// # use actix_web::Error;
/// # use actix_web::dev::ServiceRequest;
/// # use actix_web_httpauth::middleware::HttpAuthentication;
/// # use actix_web_httpauth::extractors::bearer::{Config, BearerAuth};
/// # use actix_web_httpauth::extractors::{AuthenticationError, AuthExtractorConfig};
2020-01-07 01:00:43 +09:00
/// async fn validator(req: ServiceRequest, credentials: BearerAuth) -> Result<ServiceRequest, Error> {
/// if credentials.token() == "mF_9.B5f-4.1JqM" {
2020-01-07 01:00:43 +09:00
/// Ok(req)
/// } else {
/// let config = req.app_data::<Config>()
/// .map(|data| data.clone())
/// .unwrap_or_else(Default::default)
/// .scope("urn:example:channel=HBO&urn:example:rating=G,PG-13");
///
2020-01-07 01:00:43 +09:00
/// Err(AuthenticationError::from(config).into())
/// }
/// }
///
/// let middleware = HttpAuthentication::bearer(validator);
/// ```
2019-06-05 18:52:47 +03:00
pub fn bearer(process_fn: F) -> Self {
Self::with_fn(process_fn)
}
}
2021-03-21 23:50:26 +01:00
impl<S, B, T, F, O> Transform<S, ServiceRequest> for HttpAuthentication<T, F>
where
2021-03-21 23:50:26 +01:00
S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = Error> + 'static,
S::Future: 'static,
2019-06-05 18:52:47 +03:00
F: Fn(ServiceRequest, T) -> O + 'static,
2020-01-07 01:00:43 +09:00
O: Future<Output = Result<ServiceRequest, Error>> + 'static,
T: AuthExtractor + 'static,
2021-06-27 07:02:38 +01:00
B: MessageBody + 'static,
{
2021-12-11 16:05:21 +00:00
type Response = ServiceResponse<EitherBody<B>>;
type Error = Error;
type Transform = AuthenticationMiddleware<S, F, T>;
type InitError = ();
2020-01-07 01:00:43 +09:00
type Future = future::Ready<Result<Self::Transform, Self::InitError>>;
fn new_transform(&self, service: S) -> Self::Future {
future::ok(AuthenticationMiddleware {
service: Rc::new(service),
2019-06-05 18:52:47 +03:00
process_fn: self.process_fn.clone(),
_extractor: PhantomData,
})
}
}
#[doc(hidden)]
pub struct AuthenticationMiddleware<S, F, T>
where
T: AuthExtractor,
{
service: Rc<S>,
process_fn: Arc<F>,
_extractor: PhantomData<T>,
}
2021-03-21 23:50:26 +01:00
impl<S, B, F, T, O> Service<ServiceRequest> for AuthenticationMiddleware<S, F, T>
where
2021-03-21 23:50:26 +01:00
S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = Error> + 'static,
S::Future: 'static,
2019-06-05 18:52:47 +03:00
F: Fn(ServiceRequest, T) -> O + 'static,
2020-01-07 01:00:43 +09:00
O: Future<Output = Result<ServiceRequest, Error>> + 'static,
T: AuthExtractor + 'static,
2021-06-27 07:02:38 +01:00
B: MessageBody + 'static,
{
2021-12-11 16:05:21 +00:00
type Response = ServiceResponse<EitherBody<B>>;
type Error = S::Error;
2021-12-11 16:05:21 +00:00
type Future = LocalBoxFuture<'static, Result<Self::Response, Self::Error>>;
actix_service::forward_ready!(service);
2021-03-21 23:50:26 +01:00
fn call(&self, req: ServiceRequest) -> Self::Future {
let process_fn = Arc::clone(&self.process_fn);
2020-06-11 10:10:18 -05:00
let service = Rc::clone(&self.service);
2020-01-07 01:00:43 +09:00
async move {
let (req, credentials) = match Extract::<T>::new(req).await {
Ok(req) => req,
Err((err, req)) => {
2021-12-11 16:05:21 +00:00
return Ok(req.error_response(err).map_into_right_body());
}
};
// TODO: alter to remove ? operator; an error response is required for downstream
// middleware to do their thing (eg. cors adding headers)
2020-01-07 01:00:43 +09:00
let req = process_fn(req, credentials).await?;
2021-12-11 16:05:21 +00:00
service.call(req).await.map(|res| res.map_into_left_body())
2020-01-07 01:00:43 +09:00
}
.boxed_local()
}
}
struct Extract<T> {
req: Option<ServiceRequest>,
2020-01-07 01:00:43 +09:00
f: Option<LocalBoxFuture<'static, Result<T, Error>>>,
_extractor: PhantomData<fn() -> T>,
}
impl<T> Extract<T> {
pub fn new(req: ServiceRequest) -> Self {
Extract {
req: Some(req),
f: None,
_extractor: PhantomData,
}
}
}
impl<T> Future for Extract<T>
where
T: AuthExtractor,
T::Future: 'static,
T::Error: 'static,
{
type Output = Result<(ServiceRequest, T), (Error, ServiceRequest)>;
fn poll(mut self: Pin<&mut Self>, ctx: &mut Context<'_>) -> Poll<Self::Output> {
if self.f.is_none() {
let req = self.req.as_ref().expect("Extract future was polled twice!");
2020-01-07 01:00:43 +09:00
let f = T::from_service_request(req).map_err(Into::into);
self.f = Some(f.boxed_local());
}
let f = self
.f
.as_mut()
.expect("Extraction future should be initialized at this point");
let credentials = ready!(f.as_mut().poll(ctx)).map_err(|err| {
(
err,
// returning request allows a proper error response to be created
self.req.take().expect("Extract future was polled twice!"),
)
})?;
let req = self.req.take().expect("Extract future was polled twice!");
2020-01-07 01:00:43 +09:00
Poll::Ready(Ok((req, credentials)))
}
}
2020-06-11 10:10:18 -05:00
#[cfg(test)]
mod tests {
use super::*;
use crate::extractors::basic::BasicAuth;
2020-06-11 10:10:18 -05:00
use crate::extractors::bearer::BearerAuth;
use actix_service::{into_service, Service};
use actix_web::error::ErrorForbidden;
use actix_web::http::StatusCode;
use actix_web::test::TestRequest;
use actix_web::{error, web, App, HttpResponse};
2020-06-11 10:10:18 -05:00
/// This is a test for https://github.com/actix/actix-extras/issues/10
2022-02-03 22:33:47 +00:00
#[actix_web::test]
2020-06-11 10:10:18 -05:00
async fn test_middleware_panic() {
2021-03-21 23:50:26 +01:00
let middleware = AuthenticationMiddleware {
service: Rc::new(into_service(|_: ServiceRequest| async move {
2022-02-03 22:33:47 +00:00
actix_web::rt::time::sleep(std::time::Duration::from_secs(1)).await;
Err::<ServiceResponse, _>(error::ErrorBadRequest("error"))
})),
process_fn: Arc::new(|req, _: BearerAuth| async { Ok(req) }),
2020-06-11 10:10:18 -05:00
_extractor: PhantomData,
};
2021-03-21 23:50:26 +01:00
let req = TestRequest::get()
.append_header(("Authorization", "Bearer 1"))
.to_srv_request();
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let f = middleware.call(req).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let _res = futures_util::future::lazy(|cx| middleware.poll_ready(cx)).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
assert!(f.is_err());
2020-06-11 10:10:18 -05:00
}
/// This is a test for https://github.com/actix/actix-extras/issues/10
2022-02-03 22:33:47 +00:00
#[actix_web::test]
2020-06-11 10:10:18 -05:00
async fn test_middleware_panic_several_orders() {
2021-03-21 23:50:26 +01:00
let middleware = AuthenticationMiddleware {
service: Rc::new(into_service(|_: ServiceRequest| async move {
2022-02-03 22:33:47 +00:00
actix_web::rt::time::sleep(std::time::Duration::from_secs(1)).await;
Err::<ServiceResponse, _>(error::ErrorBadRequest("error"))
})),
process_fn: Arc::new(|req, _: BearerAuth| async { Ok(req) }),
2020-06-11 10:10:18 -05:00
_extractor: PhantomData,
};
2021-03-21 23:50:26 +01:00
let req = TestRequest::get()
.append_header(("Authorization", "Bearer 1"))
.to_srv_request();
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let f1 = middleware.call(req).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let req = TestRequest::get()
.append_header(("Authorization", "Bearer 1"))
.to_srv_request();
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let f2 = middleware.call(req).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let req = TestRequest::get()
.append_header(("Authorization", "Bearer 1"))
.to_srv_request();
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let f3 = middleware.call(req).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
let _res = futures_util::future::lazy(|cx| middleware.poll_ready(cx)).await;
2020-06-11 10:10:18 -05:00
2021-03-21 23:50:26 +01:00
assert!(f1.is_err());
assert!(f2.is_err());
assert!(f3.is_err());
2020-06-11 10:10:18 -05:00
}
2022-02-03 22:33:47 +00:00
#[actix_web::test]
async fn test_middleware_opt_extractor() {
let middleware = AuthenticationMiddleware {
service: Rc::new(into_service(|req: ServiceRequest| async move {
Ok::<ServiceResponse, _>(req.into_response(HttpResponse::Ok().finish()))
})),
process_fn: Arc::new(|req, auth: Option<BearerAuth>| {
assert!(auth.is_none());
async { Ok(req) }
}),
_extractor: PhantomData,
};
let req = TestRequest::get()
.append_header(("Authorization996", "Bearer 1"))
.to_srv_request();
let f = middleware.call(req).await;
let _res = futures_util::future::lazy(|cx| middleware.poll_ready(cx)).await;
assert!(f.is_ok());
}
2022-02-03 22:33:47 +00:00
#[actix_web::test]
async fn test_middleware_res_extractor() {
let middleware = AuthenticationMiddleware {
service: Rc::new(into_service(|req: ServiceRequest| async move {
Ok::<ServiceResponse, _>(req.into_response(HttpResponse::Ok().finish()))
})),
process_fn: Arc::new(
|req, auth: Result<BearerAuth, <BearerAuth as AuthExtractor>::Error>| {
assert!(auth.is_err());
async { Ok(req) }
},
),
_extractor: PhantomData,
};
let req = TestRequest::get()
.append_header(("Authorization", "BearerLOL"))
.to_srv_request();
let f = middleware.call(req).await;
let _res = futures_util::future::lazy(|cx| middleware.poll_ready(cx)).await;
assert!(f.is_ok());
}
#[actix_rt::test]
async fn test_middleware_works_with_app() {
async fn validator(
_req: ServiceRequest,
_credentials: BasicAuth,
) -> Result<ServiceRequest, actix_web::Error> {
Err(ErrorForbidden("You are not welcome!"))
}
let middleware = HttpAuthentication::basic(validator);
let srv = actix_web::test::init_service(
App::new()
.wrap(middleware)
.route("/", web::get().to(|| web::HttpResponse::Ok())),
)
.await;
let req = actix_web::test::TestRequest::with_uri("/")
.append_header(("Authorization", "Basic DontCare"))
.to_request();
let resp = srv.call(req).await.unwrap();
assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
}
#[actix_rt::test]
async fn test_middleware_works_with_scope() {
async fn validator(
_req: ServiceRequest,
_credentials: BasicAuth,
) -> Result<ServiceRequest, actix_web::Error> {
Err(ErrorForbidden("You are not welcome!"))
}
let middleware = actix_web::middleware::Compat::new(HttpAuthentication::basic(validator));
let srv = actix_web::test::init_service(
App::new().service(
web::scope("/")
.wrap(middleware)
.route("/", web::get().to(|| web::HttpResponse::Ok())),
),
)
.await;
let req = actix_web::test::TestRequest::with_uri("/")
.append_header(("Authorization", "Basic DontCare"))
.to_request();
let resp = srv.call(req).await.unwrap();
assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
}
2020-06-11 10:10:18 -05:00
}