#jwt #axum #keycloak #oidc #tower-layer

axum-keycloak-auth

Protect axum routes with a JWT emitted by Keycloak

10 releases (6 breaking)

new 0.7.0 Jan 5, 2025
0.6.0 Sep 12, 2024
0.5.0 Feb 2, 2024
0.4.1 Jan 30, 2024
0.1.1 Feb 27, 2023

#96 in Authentication

Download history 433/week @ 2024-09-21 467/week @ 2024-09-28 559/week @ 2024-10-05 667/week @ 2024-10-12 376/week @ 2024-10-19 510/week @ 2024-10-26 562/week @ 2024-11-02 474/week @ 2024-11-09 718/week @ 2024-11-16 660/week @ 2024-11-23 730/week @ 2024-11-30 496/week @ 2024-12-07 329/week @ 2024-12-14 148/week @ 2024-12-21 60/week @ 2024-12-28 330/week @ 2025-01-04

949 downloads per month

MIT/Apache

93KB
1.5K SLoC

axum-keycloak-auth

Protect axum routes with a JWT emitted by Keycloak.

Features

  • Tower layer / service that can be attached to axum routers.
  • Automatic OIDC discovery
  • Forwarding only requests providing a verifiable and non-expired JWT.
  • Ability to allow forwarding a failed authentication attempt to possibly handle the authentication using another middleware.
  • Ability to access the extracted JWT data (including roles, the KC uuid, ...) in route handler function.
  • Tests to check that one or more required or forbidden Keycloak realm or client roles were included in the JWT.
  • Ability to access the JWT's raw claims in a handler, allowing to extract custom attributes.
  • An error type implementing IntoResponse providing exact information about why authentication failed in an error response.
  • Ability to define a custom role type from your application to which all roles are automatically parsed.

Planned

  • Ability to provide a custom type into which the token is parsed, with which non-standard JWT claims can be extracted without overhead.
  • Allowing fine-grained control over how an AuthError is converted into a response. Giving the user control and the ability to add context, roll their own.

Usage

This library provides KeycloakAuthLayer, a tower layer/service implementation that parses and validates a JWT.

See the Documentation for more detailed instructions!

enum Role {
    Administrator,
    Unknown(String),
}

pub fn protected_router(instance: KeycloakAuthInstance) -> Router {
    Router::new()
        .route("/protected", get(protected))
        .layer(
            KeycloakAuthLayer::<Role>::builder()
                .instance(instance)
                .passthrough_mode(PassthroughMode::Block)
                .build(),
        )
}

pub async fn protected(Extension(token): Extension<KeycloakToken<Role>>) -> Response {
    expect_role!(&token, Role::Administrator);

    info!("Token payload is {token:#?}");
    (
        StatusCode::OK,
        format!(
            "Hello {name} ({subject}). Your token is valid for another {valid_for} seconds.",
            name = token.extra.profile.preferred_username,
            subject = token.subject,
            valid_for = (token.expires_at - time::OffsetDateTime::now_utc()).whole_seconds()
        ),
    ).into_response()
}

Axum compatibility

axum-keycloak-auth axum
0.2 0.6
0.3 - 0.6 0.7
0.7 0.8

Development

Tests

Run test with

cargo test

Pass the --nocapture flag when developing to be able to see log/tracing output.

cargo test -- --nocapture

Dependencies

~11–27MB
~432K SLoC