#middleware #cognito #actix-web #actix


Middleware for actix-web that helps you validate Cognito tokens

5 releases (3 breaking)

0.4.0-beta.19 Jan 7, 2022
0.4.0-beta.5 Jun 5, 2021
0.3.0 Sep 25, 2020
0.2.0 Aug 4, 2020
0.1.0 Aug 3, 2020

#436 in HTTP server

MIT license

300 lines


ActionsStatus Crates.io API

Middleware for actix-web that helps you validate Cognito tokens.

Cognito validator

Before setting up the middleware we have to create a CognitoValidator that will be built by receiving some variables from the environment:

  • COGNITO_REGION: The region of the Cognito pool.
  • COGNITO_POOLID: The Cognito pool id.
  • COGNITO_CLIENTID: The client id of your app.
  • COGNITO_ENABLED (optional): if not present or 0 no validation will be done.
  • COGNITO_VERIFY_ACCESSTOKEN (optional): if not present or 0 idToken will be validated. If present, the accessToken will be validated instead.


Setting up the middleware:

// builidng the validator in order to be shared between all threads.
let cognito_validator =
    Arc::new(CognitoValidator::create().expect("Cognito configuration error"));

HttpServer::new(move || {
    // cognito middleware
    let cognito = Cognito::new(cognito_validator.clone());

    // set up the app
        .route("/", web::get().to(index))
.bind(format!("{}", PORT))
.unwrap_or_else(|_| panic!("🔥 Couldn't start the server at port {}", PORT))

Extracting the token from the request

The library provides a CognitoInfo extractor for you to get information about the Cognito token. If the token is invalid or you disable the middleware (by omitting the COGNITO_ENABLED environment variable) you will always get a disabled CognitoInfo, i.e. a CognitoInfo with no token.

async fn index(auth: CognitoInfo) -> impl Responder {
    let msg = format!(
        "User with id {} made this call with token {}",


You can check the example in the repo or run it: cargo run --example main.


~829K SLoC