Struct actix_plus_auth::AuthenticationProvider [−][src]
A clone of this struct is provided to each App instance in Actix as Data, thus providing access to the authentication system in each route.
Implementations
impl<DataProviderImpl: DataProvider> AuthenticationProvider<DataProviderImpl>
[src]
pub fn new(provider: DataProviderImpl, jwt_secret: Vec<u8>) -> Self
[src]
Creates a new AuthenticationProvider with the provided jwt_secret and data provider. The jwt secret is used to sign and verify the json web tokens, so it should be secret, long enough to be secure, and persistent over a period of days. Changing this token will invalidate all current sessions, but they may not be cleanly logged out if you set your own cookies in addition to the token.
pub async fn register(
&self,
account: DataProviderImpl::AccountType,
password: &str
) -> ResponseResult<RegistrationOutcome<DataProviderImpl::AccountType>>
[src]
&self,
account: DataProviderImpl::AccountType,
password: &str
) -> ResponseResult<RegistrationOutcome<DataProviderImpl::AccountType>>
Registers the provided account with the provided password. See the documentation on RegistrationOutcome for details on what to do next.
#[post("/register")] async fn register(auth: Data<ExampleAuthProvider>, dto: Json<RegistrationDto>) -> Response { let dto = dto.into_inner(); Ok( match auth.register( ExampleAccount { username: dto.username, email: dto.email, }, &dto.password, )? { RegistrationOutcome::Successful(_account) => { HttpResponse::Ok() .json(RegistrationResponseDto { succeeded: true, message: None, }) .await? } RegistrationOutcome::InvalidEmail => { HttpResponse::Ok() .json(RegistrationResponseDto { succeeded: false, message: Some("Invalid Email".into()), }) .await? } RegistrationOutcome::EmailTaken => { HttpResponse::Ok() .json(RegistrationResponseDto { succeeded: false, message: Some("Email is already taken".into()), }) .await? } }, ) }
pub async fn login(
&self,
email: &str,
password: &str
) -> ResponseResult<LoginOutcome<DataProviderImpl::AccountType>>
[src]
&self,
email: &str,
password: &str
) -> ResponseResult<LoginOutcome<DataProviderImpl::AccountType>>
Attempts to login to the specified account. See the documentation on LoginOutcome for details on what to do next.
#[post("/login")] async fn login(auth: Data<ExampleAuthProvider>, dto: Json<LoginDto>) -> Response { Ok(match auth.login(&dto.email, &dto.password)? { LoginOutcome::Successful(account, cookie) => { HttpResponse::Ok() .cookie(CookieBuilder::new("username", account.username).finish()) //this is how you make information available to your frontend, note that anything in your account type is visible to users as it is encoded as a JWT!!!!! .cookie(cookie) .json(LoginResponseDto { succeeded: true, message: None, }) .await? } LoginOutcome::InvalidEmailOrPassword => { HttpResponse::Ok() .json(LoginResponseDto { succeeded: false, message: Some("Invalid username or password".into()), }) .await? } }) }
pub fn current_user(
&self,
request: &HttpRequest
) -> ResponseResult<DataProviderImpl::AccountType>
[src]
&self,
request: &HttpRequest
) -> ResponseResult<DataProviderImpl::AccountType>
Gets the current user if a valid session is present on the provided HTTP request, otherwise returns a ResponseResult that when propagated with the actix-plus-error crate causes Actix web to return 401 Not Authorized.
#[get("/private_page")] async fn private_page(request: HttpRequest, auth: Data<ExampleAuthProvider>) -> Response { let account = auth.current_user(&request)?; Ok(HttpResponse::Ok() .body(format!("Hello {}", account.username)) .await?) }
Trait Implementations
impl<DataProviderImpl: Clone + DataProvider> Clone for AuthenticationProvider<DataProviderImpl>
[src]
fn clone(&self) -> AuthenticationProvider<DataProviderImpl>
[src]
pub fn clone_from(&mut self, source: &Self)
1.0.0[src]
Auto Trait Implementations
impl<DataProviderImpl> RefUnwindSafe for AuthenticationProvider<DataProviderImpl> where
DataProviderImpl: RefUnwindSafe,
DataProviderImpl: RefUnwindSafe,
impl<DataProviderImpl> Send for AuthenticationProvider<DataProviderImpl> where
DataProviderImpl: Send,
DataProviderImpl: Send,
impl<DataProviderImpl> Sync for AuthenticationProvider<DataProviderImpl> where
DataProviderImpl: Sync,
DataProviderImpl: Sync,
impl<DataProviderImpl> Unpin for AuthenticationProvider<DataProviderImpl> where
DataProviderImpl: Unpin,
DataProviderImpl: Unpin,
impl<DataProviderImpl> UnwindSafe for AuthenticationProvider<DataProviderImpl> where
DataProviderImpl: UnwindSafe,
DataProviderImpl: UnwindSafe,
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,
type Error = <U as TryFrom<T>>::Error
The type returned in the event of a conversion error.
pub fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>
[src]
impl<V, T> VZip<V> for T where
V: MultiLane<T>,
V: MultiLane<T>,