securitydept-core 0.2.0

Core of SecurityDept, a layered authentication and authorization toolkit built as reusable Rust crates.
Documentation
[package]
name = "securitydept-core"
version = "0.2.0"
edition = "2024"

authors = ["Zhou Yeheng <root@aitiotekt.com>"]
description = "Core of SecurityDept, a layered authentication and authorization toolkit built as reusable Rust crates."
license = "MIT"
repository = "https://github.com/ethaxon/securitydept"
homepage = "https://securitydept.ethaxon.com/"
documentation = "https://docs.rs/securitydept-core"
readme = "README.md"
keywords = ["auth","oauth","oidc","security","token"]
categories = ["authentication","network-programming","web-programming"]
[features]
# Keep this in sync with all user-facing features below.
# IMPORTANT: Any new feature added to this crate must also be added to `full`.
full = [
    "reexport-oauth2",
    "reexport-openidconnect",
    "reexport-jsonwebtoken",
    "reexport-josekit",
    "basic-auth-context",
    "creds",
    "creds-jwk",
    "creds-oidc",
    "creds-jwt",
    "creds-jwe",
    "creds-rfc9068",
    "creds-manage",
    "creds-manage-migration",
    "oauth-provider",
    "oauth-resource-server",
    "oauth-resource-server-jwe",
    "oidc-client",
    "oidc-client-recommend",
    "oidc-client-claims-script",
    "oidc-client-recommend-pending-store",
    "oidc-client-moka-pending-store",
    "realip",
    "realip-docker",
    "realip-kube",
    "session-context",
    "session-context-service",
    "token-set-context",
    "token-set-context-recommend",
    "token-set-context-recommend-pending-store",
    "token-set-context-moka-pending-store",
    "token-set-context-recommend-propagation-forwarder",
    "token-set-context-axum-reverse-proxy-propagation-forwarder",
    "utils",
]

# Reexports
reexport-oauth2 = ["dep:oauth2"]
reexport-openidconnect = [
    "dep:openidconnect",
    "reexport-oauth2",
]
reexport-jsonwebtoken = ["dep:jsonwebtoken"]
reexport-josekit = ["dep:josekit"]

# Basic Auth Context
basic-auth-context = [
    "dep:securitydept-basic-auth-context",
    "utils",
    "creds",
    "realip",
]

# Creds
creds = [
    "dep:securitydept-creds",
    "utils",
]
creds-jwk = [
    "creds",
    "securitydept-creds/jwk",
]
creds-oidc = [
    "creds",
    "securitydept-creds/oidc",
    "reexport-openidconnect",
]
creds-jwt = [
    "creds",
    "securitydept-creds/jwt",
    "reexport-jsonwebtoken",
    "creds-jwk",
]
creds-jwe = [
    "creds",
    "securitydept-creds/jwe",
    "creds-jwt",
    "reexport-josekit",
    "creds-jwk",
]
creds-rfc9068 = [
    "creds",
    "securitydept-creds/rfc9068",
    "creds-jwt",
    "creds-jwk",
]

# Creds Manage
creds-manage = [
    "dep:securitydept-creds-manage",
    "utils",
    "creds",
    "reexport-openidconnect",
]
creds-manage-migration = [
    "creds-manage",
    "securitydept-creds-manage/migration",
]

# Oauth Provider
oauth-provider = [
    "dep:securitydept-oauth-provider",
    "utils",
    "reexport-openidconnect",
    "reexport-oauth2",
]

# Oauth Resource Server
oauth-resource-server = [
    "dep:securitydept-oauth-resource-server",
    "oauth-provider",
    "creds-rfc9068",
    "creds-oidc",
    "utils",
    "reexport-openidconnect",
    "reexport-oauth2",
]
oauth-resource-server-jwe = [
    "oauth-resource-server",
    "securitydept-oauth-resource-server/jwe",
    "creds-jwe",
    "reexport-josekit",
]

# Oidc Client
oidc-client = [
    "dep:securitydept-oidc-client",
    "oauth-provider",
    "utils",
    "reexport-openidconnect",
]
oidc-client-recommend = [
    "oidc-client",
    "securitydept-oidc-client/recommend",
    "oidc-client-claims-script",
    "oidc-client-recommend-pending-store",
]
oidc-client-claims-script = [
    "oidc-client",
    "securitydept-oidc-client/claims-script",
]
oidc-client-recommend-pending-store = [
    "oidc-client",
    "securitydept-oidc-client/recommend-pending-store",
    "oidc-client-moka-pending-store",
]
oidc-client-moka-pending-store = [
    "oidc-client",
    "securitydept-oidc-client/moka-pending-store",
]

# Realip
realip = ["dep:securitydept-realip"]
realip-docker = [
    "realip",
    "securitydept-realip/docker",
]
realip-kube = [
    "realip",
    "securitydept-realip/kube",
]

# Session Context
session-context = [
    "dep:securitydept-session-context",
    "utils",
]
session-context-service = [
    "session-context",
    "securitydept-session-context/service",
    "oidc-client",
]

# Token Set Context
token-set-context = [
    "dep:securitydept-token-set-context",
    "oauth-provider",
    "oidc-client",
    "oauth-resource-server",
    "utils",
]
token-set-context-recommend = [
    "token-set-context",
    "securitydept-token-set-context/recommend",
    "token-set-context-recommend-pending-store",
    "token-set-context-axum-reverse-proxy-propagation-forwarder",
]
token-set-context-recommend-pending-store = [
    "token-set-context",
    "securitydept-token-set-context/recommend-pending-store",
    "token-set-context-moka-pending-store",
]
token-set-context-moka-pending-store = [
    "token-set-context",
    "securitydept-token-set-context/moka-pending-store",
]
token-set-context-recommend-propagation-forwarder = [
    "token-set-context",
    "securitydept-token-set-context/recommend-propagation-forwarder",
    "token-set-context-axum-reverse-proxy-propagation-forwarder",
]
token-set-context-axum-reverse-proxy-propagation-forwarder = [
    "token-set-context",
    "securitydept-token-set-context/axum-reverse-proxy-propagation-forwarder",
]

# Utils
utils = ["dep:securitydept-utils"]

[dependencies]
securitydept-utils = { version = "~0.2.0", path = "../utils", optional = true }
securitydept-oauth-provider = { version = "~0.2.0", path = "../oauth-provider", optional = true }
securitydept-oidc-client = { version = "~0.2.0", path = "../oidc-client", optional = true }
securitydept-oauth-resource-server = { version = "~0.2.0", path = "../oauth-resource-server", optional = true }
securitydept-basic-auth-context = { version = "~0.2.0", path = "../basic-auth-context", optional = true }
securitydept-session-context = { version = "~0.2.0", path = "../session-context", optional = true }
securitydept-token-set-context = { version = "~0.2.0", path = "../token-set-context", optional = true }
securitydept-realip = { version = "~0.2.0", path = "../realip", optional = true, default-features = false }
securitydept-creds = { version = "~0.2.0", path = "../creds", optional = true }
securitydept-creds-manage = { version = "~0.2.0", path = "../creds-manage", optional = true }
openidconnect = { workspace = true, optional = true }
oauth2 = { workspace = true, optional = true }
jsonwebtoken = { workspace = true, optional = true }
josekit = { workspace = true, optional = true }