[package]
name = "securitydept-core"
version = "0.2.0"
edition = "2024"
authors = ["Zhou Yeheng <root@aitiotekt.com>"]
description = "Core of SecurityDept, a layered authentication and authorization toolkit built as reusable Rust crates."
license = "MIT"
repository = "https://github.com/ethaxon/securitydept"
homepage = "https://securitydept.ethaxon.com/"
documentation = "https://docs.rs/securitydept-core"
readme = "README.md"
keywords = ["auth","oauth","oidc","security","token"]
categories = ["authentication","network-programming","web-programming"]
[features]
full = [
"reexport-oauth2",
"reexport-openidconnect",
"reexport-jsonwebtoken",
"reexport-josekit",
"basic-auth-context",
"creds",
"creds-jwk",
"creds-oidc",
"creds-jwt",
"creds-jwe",
"creds-rfc9068",
"creds-manage",
"creds-manage-migration",
"oauth-provider",
"oauth-resource-server",
"oauth-resource-server-jwe",
"oidc-client",
"oidc-client-recommend",
"oidc-client-claims-script",
"oidc-client-recommend-pending-store",
"oidc-client-moka-pending-store",
"realip",
"realip-docker",
"realip-kube",
"session-context",
"session-context-service",
"token-set-context",
"token-set-context-recommend",
"token-set-context-recommend-pending-store",
"token-set-context-moka-pending-store",
"token-set-context-recommend-propagation-forwarder",
"token-set-context-axum-reverse-proxy-propagation-forwarder",
"utils",
]
reexport-oauth2 = ["dep:oauth2"]
reexport-openidconnect = [
"dep:openidconnect",
"reexport-oauth2",
]
reexport-jsonwebtoken = ["dep:jsonwebtoken"]
reexport-josekit = ["dep:josekit"]
basic-auth-context = [
"dep:securitydept-basic-auth-context",
"utils",
"creds",
"realip",
]
creds = [
"dep:securitydept-creds",
"utils",
]
creds-jwk = [
"creds",
"securitydept-creds/jwk",
]
creds-oidc = [
"creds",
"securitydept-creds/oidc",
"reexport-openidconnect",
]
creds-jwt = [
"creds",
"securitydept-creds/jwt",
"reexport-jsonwebtoken",
"creds-jwk",
]
creds-jwe = [
"creds",
"securitydept-creds/jwe",
"creds-jwt",
"reexport-josekit",
"creds-jwk",
]
creds-rfc9068 = [
"creds",
"securitydept-creds/rfc9068",
"creds-jwt",
"creds-jwk",
]
creds-manage = [
"dep:securitydept-creds-manage",
"utils",
"creds",
"reexport-openidconnect",
]
creds-manage-migration = [
"creds-manage",
"securitydept-creds-manage/migration",
]
oauth-provider = [
"dep:securitydept-oauth-provider",
"utils",
"reexport-openidconnect",
"reexport-oauth2",
]
oauth-resource-server = [
"dep:securitydept-oauth-resource-server",
"oauth-provider",
"creds-rfc9068",
"creds-oidc",
"utils",
"reexport-openidconnect",
"reexport-oauth2",
]
oauth-resource-server-jwe = [
"oauth-resource-server",
"securitydept-oauth-resource-server/jwe",
"creds-jwe",
"reexport-josekit",
]
oidc-client = [
"dep:securitydept-oidc-client",
"oauth-provider",
"utils",
"reexport-openidconnect",
]
oidc-client-recommend = [
"oidc-client",
"securitydept-oidc-client/recommend",
"oidc-client-claims-script",
"oidc-client-recommend-pending-store",
]
oidc-client-claims-script = [
"oidc-client",
"securitydept-oidc-client/claims-script",
]
oidc-client-recommend-pending-store = [
"oidc-client",
"securitydept-oidc-client/recommend-pending-store",
"oidc-client-moka-pending-store",
]
oidc-client-moka-pending-store = [
"oidc-client",
"securitydept-oidc-client/moka-pending-store",
]
realip = ["dep:securitydept-realip"]
realip-docker = [
"realip",
"securitydept-realip/docker",
]
realip-kube = [
"realip",
"securitydept-realip/kube",
]
session-context = [
"dep:securitydept-session-context",
"utils",
]
session-context-service = [
"session-context",
"securitydept-session-context/service",
"oidc-client",
]
token-set-context = [
"dep:securitydept-token-set-context",
"oauth-provider",
"oidc-client",
"oauth-resource-server",
"utils",
]
token-set-context-recommend = [
"token-set-context",
"securitydept-token-set-context/recommend",
"token-set-context-recommend-pending-store",
"token-set-context-axum-reverse-proxy-propagation-forwarder",
]
token-set-context-recommend-pending-store = [
"token-set-context",
"securitydept-token-set-context/recommend-pending-store",
"token-set-context-moka-pending-store",
]
token-set-context-moka-pending-store = [
"token-set-context",
"securitydept-token-set-context/moka-pending-store",
]
token-set-context-recommend-propagation-forwarder = [
"token-set-context",
"securitydept-token-set-context/recommend-propagation-forwarder",
"token-set-context-axum-reverse-proxy-propagation-forwarder",
]
token-set-context-axum-reverse-proxy-propagation-forwarder = [
"token-set-context",
"securitydept-token-set-context/axum-reverse-proxy-propagation-forwarder",
]
utils = ["dep:securitydept-utils"]
[dependencies]
securitydept-utils = { version = "~0.2.0", path = "../utils", optional = true }
securitydept-oauth-provider = { version = "~0.2.0", path = "../oauth-provider", optional = true }
securitydept-oidc-client = { version = "~0.2.0", path = "../oidc-client", optional = true }
securitydept-oauth-resource-server = { version = "~0.2.0", path = "../oauth-resource-server", optional = true }
securitydept-basic-auth-context = { version = "~0.2.0", path = "../basic-auth-context", optional = true }
securitydept-session-context = { version = "~0.2.0", path = "../session-context", optional = true }
securitydept-token-set-context = { version = "~0.2.0", path = "../token-set-context", optional = true }
securitydept-realip = { version = "~0.2.0", path = "../realip", optional = true, default-features = false }
securitydept-creds = { version = "~0.2.0", path = "../creds", optional = true }
securitydept-creds-manage = { version = "~0.2.0", path = "../creds-manage", optional = true }
openidconnect = { workspace = true, optional = true }
oauth2 = { workspace = true, optional = true }
jsonwebtoken = { workspace = true, optional = true }
josekit = { workspace = true, optional = true }