1
0
mirror of https://github.com/actix/examples synced 2024-12-02 18:02:22 +01:00
examples/simple-auth-server/src/main.rs

99 lines
3.2 KiB
Rust
Raw Normal View History

2019-03-29 21:43:03 +01:00
#![allow(unused_imports)]
#[macro_use]
extern crate diesel;
#[macro_use]
extern crate serde_derive;
2019-03-29 21:43:03 +01:00
use actix::prelude::*;
use actix_files as fs;
2019-06-17 08:48:03 +02:00
use actix_identity::{CookieIdentityPolicy, IdentityService};
use actix_web::middleware::Logger;
2019-03-29 21:43:03 +01:00
use actix_web::{web, App, HttpServer};
use chrono::Duration;
use diesel::{r2d2::ConnectionManager, PgConnection};
use dotenv::dotenv;
mod auth_handler;
mod auth_routes;
2019-03-10 03:03:09 +01:00
mod email_service;
mod errors;
mod invitation_handler;
mod invitation_routes;
2019-03-10 03:03:09 +01:00
mod models;
mod register_handler;
mod register_routes;
2019-03-10 03:03:09 +01:00
mod schema;
mod utils;
2019-03-29 21:43:03 +01:00
use crate::models::DbExecutor;
2019-03-29 21:43:03 +01:00
fn main() -> std::io::Result<()> {
dotenv().ok();
2019-03-29 21:43:03 +01:00
std::env::set_var(
"RUST_LOG",
"simple-auth-server=debug,actix_web=info,actix_server=info",
);
env_logger::init();
2019-03-30 17:12:42 +01:00
let sys = actix_rt::System::new("example");
2019-03-29 21:43:03 +01:00
let database_url = std::env::var("DATABASE_URL").expect("DATABASE_URL must be set");
// create db connection pool
let manager = ConnectionManager::<PgConnection>::new(database_url);
let pool = r2d2::Pool::builder()
.build(manager)
.expect("Failed to create pool.");
2019-03-10 03:03:09 +01:00
let address: Addr<DbExecutor> =
SyncArbiter::start(4, move || DbExecutor(pool.clone()));
2019-03-29 21:43:03 +01:00
HttpServer::new(move || {
// secret is a random minimum 32 bytes long base 64 string
let secret: String =
std::env::var("SECRET_KEY").unwrap_or_else(|_| "0123".repeat(8));
let domain: String =
std::env::var("DOMAIN").unwrap_or_else(|_| "localhost".to_string());
2019-03-29 21:43:03 +01:00
App::new()
.data(address.clone())
.wrap(Logger::default())
.wrap(IdentityService::new(
CookieIdentityPolicy::new(secret.as_bytes())
.name("auth")
.path("/")
.domain(domain.as_str())
2019-04-21 18:37:29 +02:00
.max_age_time(Duration::days(1))
2019-03-29 21:43:03 +01:00
.secure(false), // this can only be true if you have https
))
// everything under '/api/' route
.service(
web::scope("/api")
// routes for authentication
.service(
web::resource("/auth")
.route(web::post().to_async(auth_routes::login))
.route(web::delete().to(auth_routes::logout))
.route(web::get().to_async(auth_routes::get_me)),
)
// routes to invitation
.service(
web::resource("/invitation").route(
web::post().to_async(invitation_routes::register_email),
),
)
// routes to register as a user after the
.service(
web::resource("/register/{invitation_id}")
.route(web::post().to_async(register_routes::register_user)),
),
)
// serve static files
.service(fs::Files::new("/", "./static/").index_file("index.html"))
})
.bind("127.0.0.1:3000")?
2019-03-30 17:12:42 +01:00
.start();
sys.run()
}