add UserInfoClaims

add allow additional audiences
add tracing
update basic example
apply clippy lints
This commit is contained in:
JuliDi 2025-05-15 18:36:44 +02:00
parent 65cb175603
commit 5952cbff95
No known key found for this signature in database
GPG key ID: E1E90AE563D09D63
9 changed files with 226 additions and 52 deletions

View file

@ -1,25 +1,32 @@
[package]
edition = "2021"
name = "basic"
version = "0.1.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
tokio = { version = "1.43", features = ["net", "macros", "rt-multi-thread"] }
axum = { version = "0.8", features = [ "macros" ]}
axum = { version = "0.8", features = ["macros"] }
axum-oidc = { path = "./../.." }
dotenvy = "0.15"
tokio = { version = "1.43", features = ["macros", "net", "rt-multi-thread"] }
tower = "0.5"
tower-sessions = "0.14"
dotenvy = "0.15"
openidconnect = "4.0"
serde = { version = "1.0", features = ["derive"] }
serde_json = "1.0.140"
tracing-subscriber = "0.3.19"
tracing = "0.1.41"
[dev-dependencies]
env_logger = "0.11"
headless_chrome = "1.0"
log = "0.4"
reqwest = { version = "0.12", features = [
"rustls-tls",
], default-features = false }
testcontainers = "0.23"
tokio = { version = "1.43", features = ["rt-multi-thread"] }
reqwest = { version = "0.12", features = ["rustls-tls"], default-features = false }
env_logger = "0.11"
log = "0.4"
headless_chrome = "1.0"
#see https://github.com/rust-headless-chrome/rust-headless-chrome/issues/535
auto_generate_cdp = "=0.4.4"

View file

@ -6,9 +6,10 @@ use axum::{
Router,
};
use axum_oidc::{
error::MiddlewareError, handle_oidc_redirect, EmptyAdditionalClaims, OidcAuthLayer, OidcClaims,
OidcClient, OidcLoginLayer, OidcRpInitiatedLogout,
error::MiddlewareError, handle_oidc_redirect, AdditionalClaims, Audience, Config,
OidcAuthLayer, OidcClaims, OidcClient, OidcLoginLayer, OidcRpInitiatedLogout, OidcUserClaims,
};
use serde::{Deserialize, Serialize};
use tokio::net::TcpListener;
use tower::ServiceBuilder;
use tower_sessions::{
@ -16,6 +17,15 @@ use tower_sessions::{
Expiry, MemoryStore, SessionManagerLayer,
};
#[derive(Clone, Debug, Serialize, Deserialize)]
//struct MyAdditionalClaims(HashMap<String, serde_json::Value>);
struct MyAdditionalClaims {
admin: Option<bool>,
}
impl AdditionalClaims for MyAdditionalClaims {}
impl openidconnect::AdditionalClaims for MyAdditionalClaims {}
pub async fn run(issuer: String, client_id: String, client_secret: Option<String>) {
let session_store = MemoryStore::default();
let session_layer = SessionManagerLayer::new(session_store)
@ -28,30 +38,42 @@ pub async fn run(issuer: String, client_id: String, client_secret: Option<String
dbg!(&e);
e.into_response()
}))
.layer(OidcLoginLayer::<EmptyAdditionalClaims>::new());
.layer(OidcLoginLayer::<MyAdditionalClaims>::new());
let mut oidc_client = OidcClient::<EmptyAdditionalClaims>::builder()
let mut oidc_client = OidcClient::<MyAdditionalClaims>::builder()
.with_default_http_client()
.with_redirect_url(Uri::from_static("http://localhost:8080/oidc"))
.with_client_id(client_id);
.with_redirect_url(Uri::from_static("http://127.0.0.1:8080/oidc"))
.with_client_id(client_id)
.add_scope("profile")
.add_scope("email")
.add_scope("urn:zitadel:iam:org:project:id:zitadel:aud");
if let Some(client_secret) = client_secret {
oidc_client = oidc_client.with_client_secret(client_secret);
}
let oidc_client = oidc_client.discover(issuer).await.unwrap().build();
let config = Config {
other_audiences: vec![
Audience::new("318246545105453932".to_string()),
Audience::new("318244871846527852".to_string()),
Audience::new("317981086246456313".to_string()),
],
};
let oidc_auth_service = ServiceBuilder::new()
.layer(HandleErrorLayer::new(|e: MiddlewareError| async {
dbg!(&e);
e.into_response()
}))
.layer(OidcAuthLayer::new(oidc_client));
.layer(OidcAuthLayer::new(oidc_client, config.clone()));
let app = Router::new()
.route("/foo", get(authenticated))
.route("/logout", get(logout))
.layer(oidc_login_service)
.route("/bar", get(maybe_authenticated))
.route("/oidc", any(handle_oidc_redirect::<EmptyAdditionalClaims>))
.route("/oidc", any(handle_oidc_redirect::<MyAdditionalClaims>))
.with_state(config)
.layer(oidc_auth_service)
.layer(session_layer);
@ -61,24 +83,25 @@ pub async fn run(issuer: String, client_id: String, client_secret: Option<String
.unwrap();
}
async fn authenticated(claims: OidcClaims<EmptyAdditionalClaims>) -> impl IntoResponse {
async fn authenticated(claims: OidcClaims<MyAdditionalClaims>) -> impl IntoResponse {
format!("Hello {}", claims.subject().as_str())
}
#[axum::debug_handler]
async fn maybe_authenticated(
claims: Result<OidcClaims<EmptyAdditionalClaims>, axum_oidc::error::ExtractorError>,
claims: Result<OidcUserClaims<MyAdditionalClaims>, axum_oidc::error::ExtractorError>,
) -> impl IntoResponse {
if let Ok(claims) = claims {
dbg!(&claims);
format!(
"Hello {}! You are already logged in from another Handler.",
claims.subject().as_str()
"Hello {:#?}! You are already logged in from another Handler.",
claims.name().unwrap().get(None).unwrap().as_str()
)
} else {
"Hello anon!".to_string()
"Hello unauthenticated user!".to_string()
}
}
async fn logout(logout: OidcRpInitiatedLogout) -> impl IntoResponse {
logout.with_post_logout_redirect(Uri::from_static("https://example.com"))
logout.with_post_logout_redirect(Uri::from_static("http://127.0.0.1:8080/bar"))
}

View file

@ -1,6 +1,12 @@
use basic::run;
use tracing::Level;
#[tokio::main]
async fn main() {
tracing_subscriber::fmt()
.with_file(true)
.with_line_number(true)
.with_max_level(Level::TRACE)
.init();
dotenvy::dotenv().ok();
let issuer = std::env::var("ISSUER").expect("ISSUER env variable");
let client_id = std::env::var("CLIENT_ID").expect("CLIENT_ID env variable");