[−][src]Module oxide_auth::frontends
A base for implementing front-ends.
Front-ends are glue adapters from other http server crates to the interface exposed by individual methods offered in this crate. The exact usage of the front-end varies from implementation to implementation. Composability and usability are the main concerns for front-ends, full feature support is a secondary concern.
Usage
This only adds some base functionality for front-ends. The following front-ends have been implemented in separate crates:
simple
: Implemented here, can be reused in other web servers.actix
:oxide-auth-actix
iron
:oxide-auth-iron
rouille
:oxide-auth-rouille
rocket
:oxide-auth-rocket
Guide to implementing a custom front-end
All front-end implementations should start with two closely related traits: [WebRequest
] and
[WebResponse
]. These central interfaces are used to interact with the libraries supported
token flows (currently only authorization code grant).
Lets step through those implementations one by one. As an example request type, let's pretend that the web interface consists of the following types:
use oxide_auth::frontends::dev::*; struct ExampleRequest { /// The query part of the retrieved uri, conveniently pre-parsed. query: NormalizedParameter, /// The value of the authorization header if any was wet. authorization_header: Option<String>, /// A correctly interpreted version of the body of the request, only if its content type /// `application/x-form-urlencoded` urlbody: Option<NormalizedParameter>, } struct ExampleResponse { /// The http status code, 200 for OK status: u16, /// The Content or MIME type of the body content_type: Option<String>, /// The value of the `WWW-Authenticate` header if any www_authenticate: Option<String>, /// The value of the `Location` header if any location: Option<String>, /// The body sent body: Option<String>, }
This is obviously incredibly simplified but will showcase the most valuable features of this library. Let's implement the required traits:
use oxide_auth::frontends::dev::*; impl WebRequest for ExampleRequest { // Declare the corresponding response type. type Response = ExampleResponse; // Our internal frontends error type is `OAuthError` type Error = OAuthError; fn query(&mut self) -> Result<Cow<QueryParameter + 'static>, OAuthError> { Ok(Cow::Borrowed(&self.query)) } fn urlbody(&mut self) -> Result<Cow<QueryParameter + 'static>, OAuthError> { self.urlbody.as_ref() .map(|body| Cow::Borrowed(body as &QueryParameter)) .ok_or(OAuthError::PrimitiveError) } fn authheader(&mut self) -> Result<Option<Cow<str>>, OAuthError> { // Borrow the data if it exists, else we had no header. No error cases. Ok(self.authorization_header.as_ref().map(|string| string.as_str().into())) } } impl WebResponse for ExampleResponse { // Redeclare our error type as in the request, those two must be the same. type Error = OAuthError; fn ok(&mut self) -> Result<(), OAuthError> { self.status = 200; self.www_authenticate = None; self.location = None; Ok(()) } fn redirect(&mut self, target: Url) -> Result<(), OAuthError> { self.status = 302; self.www_authenticate = None; self.location = Some(target.into_string()); Ok(()) } fn client_error(&mut self) -> Result<(), OAuthError> { self.status = 400; self.www_authenticate = None; self.location = None; Ok(()) } fn unauthorized(&mut self, www_authenticate: &str) -> Result<(), OAuthError> { self.status = 401; self.www_authenticate = Some(www_authenticate.to_string()); self.location = None; Ok(()) } fn body_text(&mut self, text: &str) -> Result<(), OAuthError> { self.body = Some(text.to_string()); self.content_type = Some("text/plain".to_string()); Ok(()) } fn body_json(&mut self, json: &str) -> Result<(), OAuthError> { self.body = Some(json.to_string()); self.content_type = Some("application/json".to_string()); Ok(()) } }
And we're done, the library is fully usable. In fact, the implementation for simple
is
almost the same as what we just did with some minor extras. All that is missing is your web
servers main loop to drive the thing and a look into the
code_grant::endpoint::{AuthorizationFlow, GrantFlow, AccessFlow}
which will explain the usage
of the above traits in the context of the Authorization Code Grant.
Of course, this style might not the intended way for some server libraries. In this case, you
may want to provide additional wrappers. The actix
front-end adds utilities for abstracting
futures and actor messaging, for example.
Modules
dev | Simply a prelude useful for writing front-ends. |
simple | A baseline implemention of |