26 releases (14 breaking)

0.15.1 Apr 10, 2024
0.15.0 Mar 20, 2024
0.14.0 Mar 5, 2024
0.11.3 Dec 31, 2023
0.4.0 Nov 28, 2022

#43 in HTTP server

Download history 1168/week @ 2024-01-26 1110/week @ 2024-02-02 2099/week @ 2024-02-09 1468/week @ 2024-02-16 1650/week @ 2024-02-23 2088/week @ 2024-03-01 1573/week @ 2024-03-08 1778/week @ 2024-03-15 2920/week @ 2024-03-22 2213/week @ 2024-03-29 3148/week @ 2024-04-05 2429/week @ 2024-04-12 2348/week @ 2024-04-19 2733/week @ 2024-04-26 2009/week @ 2024-05-03 1669/week @ 2024-05-10

9,052 downloads per month
Used in 2 crates

MIT license

78KB
1.5K SLoC

axum-login

🪪 User identification, authentication, and authorization for Axum.

🎨 Overview

This crate provides user identification, authentication, and authorization as a tower middleware for axum.

If offers:

  • User Identification, Authentication, and Authorization: Leverage AuthSession to easily manage authentication and authorization. This is also an extractor, so it can be used directly in your axum handlers.
  • Support for Arbitrary Users and Backends: Applications implement a couple of traits, AuthUser and AuthnBackend, allowing for any user type and any user management backend. Your database? Yep. LDAP? Sure. An auth provider? You bet.
  • User and Group Permissions: Authorization is supported via the AuthzBackend trait, which allows applications to define custom permissions. Both user and group permissions are supported.
  • Convenient Route Protection: Middleware for protecting access to routes are provided via the login_required and permission_required macros. Or bring your own by using AuthSession directly with from_fn.
  • Rock-solid Session Management: Uses tower-sessions for high-performing and ergonomic session management. Look ma, no deadlocks!

📦 Install

To use the crate in your project, add the following to your Cargo.toml file:

[dependencies]
axum-login = "0.15.1"

🤸 Usage

We recommend reviewing our sqlite example.

[!NOTE] See the crate documentation for usage information.

🦺 Safety

This crate uses #![forbid(unsafe_code)] to ensure everything is implemented in 100% safe Rust.

🛟 Getting Help

We've put together a number of examples to help get you started. You're also welcome to open a discussion and ask additional questions you might have.

👯 Contributing

We appreciate all kinds of contributions, thank you!

Dependencies

~8–15MB
~180K SLoC