An open API service indexing awesome lists of open source software.

https://github.com/casbin-rs/axum-casbin

Axum authorization middleware based on Casbin
https://github.com/casbin-rs/axum-casbin

abac acl auth authentication authz axum casbin casbin-rs middleware permission rbac rust

Last synced: 6 months ago
JSON representation

Axum authorization middleware based on Casbin

Awesome Lists containing this project

README

          

# axum-casbin

[![Crates.io](https://img.shields.io/crates/d/axum-casbin)](https://crates.io/crates/axum-casbin)
[![Docs](https://docs.rs/axum-casbin/badge.svg)](https://docs.rs/axum-casbin)
[![CI](https://github.com/casbin-rs/axum-casbin/actions/workflows/ci.yml/badge.svg)](https://github.com/casbin-rs/axum-casbin/actions/workflows/ci.yml)
[![codecov](https://codecov.io/gh/casbin-rs/axum-casbin/branch/master/graph/badge.svg)](https://codecov.io/gh/casbin-rs/axum-casbin)

[Casbin](https://github.com/casbin/casbin-rs) access control middleware for [axum](https://github.com/tokio-rs/axum) framework

## Install

Add dependencies to `Cargo.toml`

```bash
cargo add axum
cargo add axum-casbin
cargo add tokio --features full
```

## Requirement

**Casbin only takes charge of permission control**, so you need to implement an `Authentication Middleware` to identify user.

You should put `axum_casbin::CasbinVals` which contains `subject`(username) and `domain`(optional) into [Extension](https://docs.rs/http/0.2.8/http/struct.Extensions.html).

For example:
```rust
use axum::{response::Response, BoxError};
use futures::future::BoxFuture;

use bytes::Bytes;
use http::{self, Request};
use http_body::Body as HttpBody;
use std::{
boxed::Box,
convert::Infallible,
task::{Context, Poll},
};
use tower::{Layer, Service};

use axum_casbin::CasbinVals;

#[derive(Clone)]
struct FakeAuthLayer;

impl Layer for FakeAuthLayer {
type Service = FakeAuthMiddleware;

fn layer(&self, inner: S) -> Self::Service {
FakeAuthMiddleware { inner }
}
}

#[derive(Clone)]
struct FakeAuthMiddleware {
inner: S,
}

impl Service> for FakeAuthMiddleware
where
S: Service, Response = Response, Error = Infallible>
+ Clone
+ Send
+ 'static,
S::Future: Send + 'static,
ReqBody: Send + 'static,
Infallible: From<>>::Error>,
ResBody: HttpBody + Send + 'static,
ResBody::Error: Into,
{
type Response = S::Response;
type Error = S::Error;
// `BoxFuture` is a type alias for `Pin>`
type Future = BoxFuture<'static, Result>;

fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll> {
self.inner.poll_ready(cx)
}

fn call(&mut self, mut req: Request) -> Self::Future {
let not_ready_inner = self.inner.clone();
let mut inner = std::mem::replace(&mut self.inner, not_ready_inner);

Box::pin(async move {
let vals = CasbinVals {
subject: String::from("alice"),
domain: None,
};
req.extensions_mut().insert(vals);
inner.call(req).await
})
}
}
```

## Example
```rust
use axum::{routing::get, Router};
use axum_casbin::{CasbinAxumLayer};
use axum_casbin::casbin::function_map::key_match2;
use axum_casbin::casbin::{CoreApi, DefaultModel, FileAdapter, Result};

// Handler that immediately returns an empty `200 OK` response.
async fn handler() {}

#[tokio::main]
async fn main() -> Result<()> {
let m = DefaultModel::from_file("examples/rbac_with_pattern_model.conf")
.await
.unwrap();

let a = FileAdapter::new("examples/rbac_with_pattern_policy.csv");

let casbin_middleware = CasbinAxumLayer::new(m, a).await.unwrap();

casbin_middleware
.write()
.await
.get_role_manager()
.write()
.matching_fn(Some(key_match2), None);

let app = Router::new()
.route("/pen/1", get(handler))
.route("/pen/2", get(handler))
.route("/book/:id", get(handler))
.layer(casbin_middleware)
.layer(FakeAuthLayer);

axum::Server::bind(&"127.0.0.1:8080".parse().unwrap())
.serve(app.into_make_service())
.await;

Ok(())
}
```

## License

This project is licensed under

* Apache License, Version 2.0, ([LICENSE-APACHE](LICENSE-APACHE) or [http://www.apache.org/licenses/LICENSE-2.0](http://www.apache.org/licenses/LICENSE-2.0))