Struct actix_plus_auth::AuthenticationProvider[][src]

pub struct AuthenticationProvider<DataProviderImpl: DataProvider> { /* fields omitted */ }

A clone of this struct is provided to each App instance in Actix as Data, thus providing access to the authentication system in each route.

Implementations

impl<DataProviderImpl: DataProvider> AuthenticationProvider<DataProviderImpl>[src]

pub fn new(provider: DataProviderImpl, jwt_secret: Vec<u8>) -> Self[src]

Creates a new AuthenticationProvider with the provided jwt_secret and data provider. The jwt secret is used to sign and verify the json web tokens, so it should be secret, long enough to be secure, and persistent over a period of days. Changing this token will invalidate all current sessions, but they may not be cleanly logged out if you set your own cookies in addition to the token.

pub async fn register(
    &self,
    account: DataProviderImpl::AccountType,
    password: &str
) -> ResponseResult<RegistrationOutcome<DataProviderImpl::AccountType>>
[src]

Registers the provided account with the provided password. See the documentation on RegistrationOutcome for details on what to do next.

#[post("/register")]
async fn register(auth: Data<ExampleAuthProvider>, dto: Json<RegistrationDto>) -> Response {
    let dto = dto.into_inner();
    Ok(
        match auth.register(
            ExampleAccount {
                username: dto.username,
                email: dto.email,
            },
            &dto.password,
        )? {
            RegistrationOutcome::Successful(_account) => {
                HttpResponse::Ok()
                    .json(RegistrationResponseDto {
                        succeeded: true,
                        message: None,
                    })
                    .await?
            }
            RegistrationOutcome::InvalidEmail => {
                HttpResponse::Ok()
                    .json(RegistrationResponseDto {
                        succeeded: false,
                        message: Some("Invalid Email".into()),
                    })
                    .await?
            }
            RegistrationOutcome::EmailTaken => {
                HttpResponse::Ok()
                    .json(RegistrationResponseDto {
                        succeeded: false,
                        message: Some("Email is already taken".into()),
                    })
                    .await?
            }
        },
    )
}

pub async fn login(
    &self,
    email: &str,
    password: &str
) -> ResponseResult<LoginOutcome<DataProviderImpl::AccountType>>
[src]

Attempts to login to the specified account. See the documentation on LoginOutcome for details on what to do next.

#[post("/login")]
async fn login(auth: Data<ExampleAuthProvider>, dto: Json<LoginDto>) -> Response {
    Ok(match auth.login(&dto.email, &dto.password)? {
        LoginOutcome::Successful(account, cookie) => {
            HttpResponse::Ok()
                .cookie(CookieBuilder::new("username", account.username).finish()) //this is how you make information available to your frontend, note that anything in your account type is visible to users as it is encoded as a JWT!!!!!
                .cookie(cookie)
                .json(LoginResponseDto {
                    succeeded: true,
                    message: None,
                })
                .await?
        }
        LoginOutcome::InvalidEmailOrPassword => {
            HttpResponse::Ok()
                .json(LoginResponseDto {
                    succeeded: false,
                    message: Some("Invalid username or password".into()),
                })
                .await?
        }
    })
}

pub fn current_user(
    &self,
    request: &HttpRequest
) -> ResponseResult<DataProviderImpl::AccountType>
[src]

Gets the current user if a valid session is present on the provided HTTP request, otherwise returns a ResponseResult that when propagated with the actix-plus-error crate causes Actix web to return 401 Not Authorized.

#[get("/private_page")]
async fn private_page(request: HttpRequest, auth: Data<ExampleAuthProvider>) -> Response {
    let account = auth.current_user(&request)?;
    Ok(HttpResponse::Ok()
        .body(format!("Hello {}", account.username))
        .await?)
}

Trait Implementations

impl<DataProviderImpl: Clone + DataProvider> Clone for AuthenticationProvider<DataProviderImpl>[src]

Auto Trait Implementations

impl<DataProviderImpl> RefUnwindSafe for AuthenticationProvider<DataProviderImpl> where
    DataProviderImpl: RefUnwindSafe

impl<DataProviderImpl> Send for AuthenticationProvider<DataProviderImpl> where
    DataProviderImpl: Send

impl<DataProviderImpl> Sync for AuthenticationProvider<DataProviderImpl> where
    DataProviderImpl: Sync

impl<DataProviderImpl> Unpin for AuthenticationProvider<DataProviderImpl> where
    DataProviderImpl: Unpin

impl<DataProviderImpl> UnwindSafe for AuthenticationProvider<DataProviderImpl> where
    DataProviderImpl: UnwindSafe

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> From<T> for T[src]

impl<T> Instrument for T[src]

impl<T> Instrument for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> Same<T> for T

type Output = T

Should always be Self

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

impl<V, T> VZip<V> for T where
    V: MultiLane<T>,