2019-05-17 17:28:57 +03:00
|
|
|
//! HTTP Authentication middleware.
|
|
|
|
|
2020-06-11 10:10:18 -05:00
|
|
|
use std::cell::RefCell;
|
2020-05-21 17:23:59 +09:00
|
|
|
use std::future::Future;
|
2019-05-17 17:28:57 +03:00
|
|
|
use std::marker::PhantomData;
|
2020-01-07 01:00:43 +09:00
|
|
|
use std::pin::Pin;
|
2020-06-11 10:10:18 -05:00
|
|
|
use std::rc::Rc;
|
2019-06-08 00:20:55 +03:00
|
|
|
use std::sync::Arc;
|
2019-05-17 17:28:57 +03:00
|
|
|
|
|
|
|
use actix_service::{Service, Transform};
|
|
|
|
use actix_web::dev::{ServiceRequest, ServiceResponse};
|
|
|
|
use actix_web::Error;
|
2020-05-21 17:23:59 +09:00
|
|
|
use futures_util::future::{self, FutureExt, LocalBoxFuture, TryFutureExt};
|
|
|
|
use futures_util::task::{Context, Poll};
|
2019-05-17 17:28:57 +03:00
|
|
|
|
|
|
|
use crate::extractors::{basic, bearer, AuthExtractor};
|
|
|
|
|
|
|
|
/// Middleware for checking HTTP authentication.
|
|
|
|
///
|
|
|
|
/// If there is no `Authorization` header in the request,
|
|
|
|
/// this middleware returns an error immediately,
|
|
|
|
/// without calling the `F` callback.
|
2019-06-05 18:52:47 +03:00
|
|
|
///
|
|
|
|
/// Otherwise, it will pass both the request and
|
|
|
|
/// the parsed credentials into it.
|
|
|
|
/// In case of successful validation `F` callback
|
|
|
|
/// is required to return the `ServiceRequest` back.
|
2019-06-08 00:20:55 +03:00
|
|
|
#[derive(Debug, Clone)]
|
2019-05-17 17:28:57 +03:00
|
|
|
pub struct HttpAuthentication<T, F>
|
|
|
|
where
|
|
|
|
T: AuthExtractor,
|
|
|
|
{
|
2019-06-08 00:20:55 +03:00
|
|
|
process_fn: Arc<F>,
|
2019-05-17 17:28:57 +03:00
|
|
|
_extractor: PhantomData<T>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T, F, O> HttpAuthentication<T, F>
|
|
|
|
where
|
|
|
|
T: AuthExtractor,
|
2019-07-20 00:34:59 +09:00
|
|
|
F: Fn(ServiceRequest, T) -> O,
|
2020-01-07 01:00:43 +09:00
|
|
|
O: Future<Output = Result<ServiceRequest, Error>>,
|
2019-05-17 17:28:57 +03:00
|
|
|
{
|
|
|
|
/// Construct `HttpAuthentication` middleware
|
|
|
|
/// with the provided auth extractor `T` and
|
|
|
|
/// validation callback `F`.
|
2019-06-05 18:52:47 +03:00
|
|
|
pub fn with_fn(process_fn: F) -> HttpAuthentication<T, F> {
|
2019-05-17 17:28:57 +03:00
|
|
|
HttpAuthentication {
|
2019-06-08 00:20:55 +03:00
|
|
|
process_fn: Arc::new(process_fn),
|
2019-05-17 17:28:57 +03:00
|
|
|
_extractor: PhantomData,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<F, O> HttpAuthentication<basic::BasicAuth, F>
|
|
|
|
where
|
2019-07-20 00:34:59 +09:00
|
|
|
F: Fn(ServiceRequest, basic::BasicAuth) -> O,
|
2020-01-07 01:00:43 +09:00
|
|
|
O: Future<Output = Result<ServiceRequest, Error>>,
|
2019-05-17 17:28:57 +03:00
|
|
|
{
|
|
|
|
/// Construct `HttpAuthentication` middleware for the HTTP "Basic"
|
|
|
|
/// authentication scheme.
|
|
|
|
///
|
|
|
|
/// ## Example
|
|
|
|
///
|
2020-01-14 13:31:20 +09:00
|
|
|
/// ```
|
2019-05-17 17:28:57 +03:00
|
|
|
/// # use actix_web::Error;
|
|
|
|
/// # use actix_web::dev::ServiceRequest;
|
|
|
|
/// # use actix_web_httpauth::middleware::HttpAuthentication;
|
|
|
|
/// # use actix_web_httpauth::extractors::basic::BasicAuth;
|
|
|
|
/// // In this example validator returns immediately,
|
|
|
|
/// // but since it is required to return anything
|
|
|
|
/// // that implements `IntoFuture` trait,
|
|
|
|
/// // it can be extended to query database
|
|
|
|
/// // or to do something else in a async manner.
|
2020-01-07 01:00:43 +09:00
|
|
|
/// async fn validator(
|
2019-06-05 18:52:47 +03:00
|
|
|
/// req: ServiceRequest,
|
2019-06-08 00:20:55 +03:00
|
|
|
/// credentials: BasicAuth,
|
2020-01-07 01:00:43 +09:00
|
|
|
/// ) -> Result<ServiceRequest, Error> {
|
2019-05-17 17:28:57 +03:00
|
|
|
/// // All users are great and more than welcome!
|
2020-01-07 01:00:43 +09:00
|
|
|
/// Ok(req)
|
2019-05-17 17:28:57 +03:00
|
|
|
/// }
|
|
|
|
///
|
|
|
|
/// let middleware = HttpAuthentication::basic(validator);
|
|
|
|
/// ```
|
2019-06-05 18:52:47 +03:00
|
|
|
pub fn basic(process_fn: F) -> Self {
|
|
|
|
Self::with_fn(process_fn)
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<F, O> HttpAuthentication<bearer::BearerAuth, F>
|
|
|
|
where
|
2019-07-20 00:34:59 +09:00
|
|
|
F: Fn(ServiceRequest, bearer::BearerAuth) -> O,
|
2020-01-07 01:00:43 +09:00
|
|
|
O: Future<Output = Result<ServiceRequest, Error>>,
|
2019-05-17 17:28:57 +03:00
|
|
|
{
|
|
|
|
/// Construct `HttpAuthentication` middleware for the HTTP "Bearer"
|
|
|
|
/// authentication scheme.
|
2019-06-05 18:52:47 +03:00
|
|
|
///
|
2019-05-17 17:28:57 +03:00
|
|
|
/// ## Example
|
|
|
|
///
|
2020-01-14 13:31:20 +09:00
|
|
|
/// ```
|
2019-05-17 17:28:57 +03:00
|
|
|
/// # use actix_web::Error;
|
|
|
|
/// # use actix_web::dev::ServiceRequest;
|
|
|
|
/// # use actix_web_httpauth::middleware::HttpAuthentication;
|
|
|
|
/// # use actix_web_httpauth::extractors::bearer::{Config, BearerAuth};
|
|
|
|
/// # use actix_web_httpauth::extractors::{AuthenticationError, AuthExtractorConfig};
|
2020-01-07 01:00:43 +09:00
|
|
|
/// async fn validator(req: ServiceRequest, credentials: BearerAuth) -> Result<ServiceRequest, Error> {
|
2019-05-17 17:28:57 +03:00
|
|
|
/// if credentials.token() == "mF_9.B5f-4.1JqM" {
|
2020-01-07 01:00:43 +09:00
|
|
|
/// Ok(req)
|
2019-05-17 17:28:57 +03:00
|
|
|
/// } else {
|
|
|
|
/// let config = req.app_data::<Config>()
|
|
|
|
/// .map(|data| data.get_ref().clone())
|
|
|
|
/// .unwrap_or_else(Default::default)
|
|
|
|
/// .scope("urn:example:channel=HBO&urn:example:rating=G,PG-13");
|
|
|
|
///
|
2020-01-07 01:00:43 +09:00
|
|
|
/// Err(AuthenticationError::from(config).into())
|
2019-05-17 17:28:57 +03:00
|
|
|
/// }
|
|
|
|
/// }
|
|
|
|
///
|
|
|
|
/// let middleware = HttpAuthentication::bearer(validator);
|
|
|
|
/// ```
|
2019-06-05 18:52:47 +03:00
|
|
|
pub fn bearer(process_fn: F) -> Self {
|
|
|
|
Self::with_fn(process_fn)
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<S, B, T, F, O> Transform<S> for HttpAuthentication<T, F>
|
|
|
|
where
|
2020-07-21 03:51:51 +09:00
|
|
|
S: Service<Request = ServiceRequest, Response = ServiceResponse<B>, Error = Error>
|
|
|
|
+ 'static,
|
2019-05-17 17:28:57 +03:00
|
|
|
S::Future: 'static,
|
2019-06-05 18:52:47 +03:00
|
|
|
F: Fn(ServiceRequest, T) -> O + 'static,
|
2020-01-07 01:00:43 +09:00
|
|
|
O: Future<Output = Result<ServiceRequest, Error>> + 'static,
|
2019-05-17 17:28:57 +03:00
|
|
|
T: AuthExtractor + 'static,
|
|
|
|
{
|
|
|
|
type Request = ServiceRequest;
|
|
|
|
type Response = ServiceResponse<B>;
|
|
|
|
type Error = Error;
|
|
|
|
type Transform = AuthenticationMiddleware<S, F, T>;
|
|
|
|
type InitError = ();
|
2020-01-07 01:00:43 +09:00
|
|
|
type Future = future::Ready<Result<Self::Transform, Self::InitError>>;
|
2019-05-17 17:28:57 +03:00
|
|
|
|
|
|
|
fn new_transform(&self, service: S) -> Self::Future {
|
|
|
|
future::ok(AuthenticationMiddleware {
|
2020-06-11 10:10:18 -05:00
|
|
|
service: Rc::new(RefCell::new(service)),
|
2019-06-05 18:52:47 +03:00
|
|
|
process_fn: self.process_fn.clone(),
|
2019-05-17 17:28:57 +03:00
|
|
|
_extractor: PhantomData,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[doc(hidden)]
|
|
|
|
pub struct AuthenticationMiddleware<S, F, T>
|
|
|
|
where
|
|
|
|
T: AuthExtractor,
|
|
|
|
{
|
2020-06-11 10:10:18 -05:00
|
|
|
service: Rc<RefCell<S>>,
|
2019-06-08 00:20:55 +03:00
|
|
|
process_fn: Arc<F>,
|
2019-05-17 17:28:57 +03:00
|
|
|
_extractor: PhantomData<T>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<S, B, F, T, O> Service for AuthenticationMiddleware<S, F, T>
|
|
|
|
where
|
2020-07-21 03:51:51 +09:00
|
|
|
S: Service<Request = ServiceRequest, Response = ServiceResponse<B>, Error = Error>
|
|
|
|
+ 'static,
|
2019-05-17 17:28:57 +03:00
|
|
|
S::Future: 'static,
|
2019-06-05 18:52:47 +03:00
|
|
|
F: Fn(ServiceRequest, T) -> O + 'static,
|
2020-01-07 01:00:43 +09:00
|
|
|
O: Future<Output = Result<ServiceRequest, Error>> + 'static,
|
2019-05-17 17:28:57 +03:00
|
|
|
T: AuthExtractor + 'static,
|
|
|
|
{
|
|
|
|
type Request = ServiceRequest;
|
|
|
|
type Response = ServiceResponse<B>;
|
|
|
|
type Error = S::Error;
|
2020-01-07 01:00:43 +09:00
|
|
|
type Future = LocalBoxFuture<'static, Result<ServiceResponse<B>, Error>>;
|
2019-05-17 17:28:57 +03:00
|
|
|
|
2020-07-21 03:51:51 +09:00
|
|
|
fn poll_ready(&mut self, ctx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
|
|
|
|
self.service.borrow_mut().poll_ready(ctx)
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
fn call(&mut self, req: Self::Request) -> Self::Future {
|
2019-06-05 18:52:47 +03:00
|
|
|
let process_fn = self.process_fn.clone();
|
2020-06-11 10:10:18 -05:00
|
|
|
|
|
|
|
let service = Rc::clone(&self.service);
|
2019-05-17 17:28:57 +03:00
|
|
|
|
2020-01-07 01:00:43 +09:00
|
|
|
async move {
|
|
|
|
let (req, credentials) = Extract::<T>::new(req).await?;
|
|
|
|
let req = process_fn(req, credentials).await?;
|
2020-06-11 10:10:18 -05:00
|
|
|
// It is important that `borrow_mut()` and `.await` are on
|
|
|
|
// separate lines, or else a panic occurs.
|
|
|
|
let fut = service.borrow_mut().call(req);
|
|
|
|
fut.await
|
2020-01-07 01:00:43 +09:00
|
|
|
}
|
|
|
|
.boxed_local()
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct Extract<T> {
|
|
|
|
req: Option<ServiceRequest>,
|
2020-01-07 01:00:43 +09:00
|
|
|
f: Option<LocalBoxFuture<'static, Result<T, Error>>>,
|
|
|
|
_extractor: PhantomData<fn() -> T>,
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<T> Extract<T> {
|
|
|
|
pub fn new(req: ServiceRequest) -> Self {
|
|
|
|
Extract {
|
|
|
|
req: Some(req),
|
|
|
|
f: None,
|
|
|
|
_extractor: PhantomData,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T> Future for Extract<T>
|
|
|
|
where
|
|
|
|
T: AuthExtractor,
|
|
|
|
T::Future: 'static,
|
|
|
|
T::Error: 'static,
|
|
|
|
{
|
2020-01-07 01:00:43 +09:00
|
|
|
type Output = Result<(ServiceRequest, T), Error>;
|
2019-05-17 17:28:57 +03:00
|
|
|
|
2020-07-21 03:51:51 +09:00
|
|
|
fn poll(mut self: Pin<&mut Self>, ctx: &mut Context<'_>) -> Poll<Self::Output> {
|
2019-05-17 17:28:57 +03:00
|
|
|
if self.f.is_none() {
|
2020-07-21 03:51:51 +09:00
|
|
|
let req = self.req.as_ref().expect("Extract future was polled twice!");
|
2020-01-07 01:00:43 +09:00
|
|
|
let f = T::from_service_request(req).map_err(Into::into);
|
|
|
|
self.f = Some(f.boxed_local());
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
let f = self
|
|
|
|
.f
|
|
|
|
.as_mut()
|
|
|
|
.expect("Extraction future should be initialized at this point");
|
2020-05-21 17:23:59 +09:00
|
|
|
let credentials = futures_util::ready!(Future::poll(f.as_mut(), ctx))?;
|
2019-05-17 17:28:57 +03:00
|
|
|
|
|
|
|
let req = self.req.take().expect("Extract future was polled twice!");
|
2020-01-07 01:00:43 +09:00
|
|
|
Poll::Ready(Ok((req, credentials)))
|
2019-05-17 17:28:57 +03:00
|
|
|
}
|
|
|
|
}
|
2020-06-11 10:10:18 -05:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use crate::extractors::bearer::BearerAuth;
|
2020-07-21 03:51:51 +09:00
|
|
|
use actix_service::{into_service, Service};
|
2020-06-11 10:10:18 -05:00
|
|
|
use actix_web::error;
|
2020-07-21 03:51:51 +09:00
|
|
|
use actix_web::test::TestRequest;
|
|
|
|
use futures_util::join;
|
2020-06-11 10:10:18 -05:00
|
|
|
|
|
|
|
/// This is a test for https://github.com/actix/actix-extras/issues/10
|
|
|
|
#[actix_rt::test]
|
|
|
|
async fn test_middleware_panic() {
|
|
|
|
let mut middleware = AuthenticationMiddleware {
|
2020-07-21 03:51:51 +09:00
|
|
|
service: Rc::new(RefCell::new(into_service(
|
|
|
|
|_: ServiceRequest| async move {
|
2020-06-11 10:10:18 -05:00
|
|
|
actix_rt::time::delay_for(std::time::Duration::from_secs(1)).await;
|
|
|
|
Err::<ServiceResponse, _>(error::ErrorBadRequest("error"))
|
2020-07-21 03:51:51 +09:00
|
|
|
},
|
|
|
|
))),
|
|
|
|
process_fn: Arc::new(|req, _: BearerAuth| async { Ok(req) }),
|
2020-06-11 10:10:18 -05:00
|
|
|
_extractor: PhantomData,
|
|
|
|
};
|
|
|
|
|
|
|
|
let req = TestRequest::with_header("Authorization", "Bearer 1").to_srv_request();
|
|
|
|
|
|
|
|
let f = middleware.call(req);
|
|
|
|
|
2020-07-21 03:51:51 +09:00
|
|
|
let res = futures_util::future::lazy(|cx| middleware.poll_ready(cx));
|
2020-06-11 10:10:18 -05:00
|
|
|
|
|
|
|
assert!(join!(f, res).0.is_err());
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This is a test for https://github.com/actix/actix-extras/issues/10
|
|
|
|
#[actix_rt::test]
|
|
|
|
async fn test_middleware_panic_several_orders() {
|
|
|
|
let mut middleware = AuthenticationMiddleware {
|
2020-07-21 03:51:51 +09:00
|
|
|
service: Rc::new(RefCell::new(into_service(
|
|
|
|
|_: ServiceRequest| async move {
|
2020-06-11 10:10:18 -05:00
|
|
|
actix_rt::time::delay_for(std::time::Duration::from_secs(1)).await;
|
|
|
|
Err::<ServiceResponse, _>(error::ErrorBadRequest("error"))
|
2020-07-21 03:51:51 +09:00
|
|
|
},
|
|
|
|
))),
|
|
|
|
process_fn: Arc::new(|req, _: BearerAuth| async { Ok(req) }),
|
2020-06-11 10:10:18 -05:00
|
|
|
_extractor: PhantomData,
|
|
|
|
};
|
|
|
|
|
|
|
|
let req = TestRequest::with_header("Authorization", "Bearer 1").to_srv_request();
|
|
|
|
|
|
|
|
let f1 = middleware.call(req);
|
|
|
|
|
|
|
|
let req = TestRequest::with_header("Authorization", "Bearer 1").to_srv_request();
|
|
|
|
|
|
|
|
let f2 = middleware.call(req);
|
|
|
|
|
|
|
|
let req = TestRequest::with_header("Authorization", "Bearer 1").to_srv_request();
|
|
|
|
|
|
|
|
let f3 = middleware.call(req);
|
|
|
|
|
|
|
|
let res = futures_util::future::lazy(|cx| middleware.poll_ready(cx));
|
|
|
|
|
|
|
|
let result = join!(f1, f2, f3, res);
|
|
|
|
|
|
|
|
assert!(result.0.is_err());
|
|
|
|
assert!(result.1.is_err());
|
|
|
|
assert!(result.2.is_err());
|
|
|
|
}
|
|
|
|
}
|