9 releases (5 breaking)

0.7.0 Sep 4, 2022
0.6.1 May 25, 2022
0.6.0 Apr 10, 2022
0.5.0 Feb 27, 2022
0.2.2 Aug 19, 2021

#838 in HTTP server

Download history 41/week @ 2024-03-14 20/week @ 2024-03-21 36/week @ 2024-03-28 57/week @ 2024-04-04 54/week @ 2024-04-11 29/week @ 2024-04-18 18/week @ 2024-04-25 8/week @ 2024-05-02 17/week @ 2024-05-16 70/week @ 2024-05-23 57/week @ 2024-05-30 624/week @ 2024-06-06 2901/week @ 2024-06-13 4324/week @ 2024-06-20 3152/week @ 2024-06-27

11,007 downloads per month

MIT/Apache

45KB
770 lines

actix-csrf

CSRF middleware for actix-web 4.0.0 or newer that uses the Double-Submit Token pattern.

This crate has not yet been audited. Use in production at your own risk.

Usage

Installing the middleware is standard: Specify a cryptographically secure RNG to use, and declare which paths should set a CSRF cookie and when should validate a CSRF cookie.

#[actix_web::main]
async fn main() -> std::io::Result<()> {
    HttpServer::new(|| {
        let csrf = Csrf::<StdRng>::new()
            .set_cookie(Method::GET, "/login");
        App::new().wrap(csrf).service(login_ui).service(login)
    })
    .bind(("127.0.0.1", 8080))?
    .run()
    .await
}

Then, use the CsrfCookie extractor to pull the CSRF cookie and validate it with a CSRF token provided as part of the protected request.

#[derive(Deserialize)]
struct LoginForm {
    csrf_token: CsrfToken,
    username: String,
    password: String,
}

impl CsrfGuarded for LoginForm {
    fn csrf_token(&self) -> &CsrfToken {
        &self.csrf_token
    }
}

/// Validates a login form that has a CSRF token.
#[post("/login")]
async fn login(form: Csrf<Form<LoginForm>>) -> impl Responder {
    // At this point, we have a valid CSRF token, so we can treat the request
    // as legitimate.

    HttpResponse::Ok().finish()
}

This is only one of many ways to use the Double-Submit Token pattern; see the docs and examples for more information.

Security Considerations

There are advantages and limitations to using the Double Submit Token pattern. Users are highly recommended to read the Owasp article on CSRF Protection before using this middleware.

This crate attempts to have secure defaults, and users must explicitly disable defense-in-depth features.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~15–28MB
~467K SLoC