Compare commits

...

4 Commits

Author SHA1 Message Date
eb7a3cf985 BLOG-86 refactor: update UserId struct to encapsulate user ID and improve access method
All checks were successful
Frontend CI / build (push) Successful in 1m9s
Auto Comment On PR / add_improve_comment (pull_request) Successful in 16s
PR Title Check / pr-title-check (pull_request) Successful in 17s
2025-08-01 18:05:47 +08:00
a72a567d6a BLOG-86 feat: add auth dependency and integrate UserId in image upload handler 2025-08-01 17:46:50 +08:00
0e8eb809a5 BLOG-86 feat: implement authentication middleware and update routes for user session management 2025-08-01 17:40:34 +08:00
87982fd480 BLOG-86 fix: redis URL in session configuration to use correct localhost address 2025-08-01 17:40:13 +08:00
8 changed files with 78 additions and 7 deletions

1
backend/Cargo.lock generated
View File

@ -1664,6 +1664,7 @@ dependencies = [
"actix-multipart",
"actix-web",
"async-trait",
"auth",
"futures",
"log",
"serde",

View File

@ -1,3 +1,4 @@
pub mod auth_middleware;
pub mod auth_web_routes;
mod constants;

View File

@ -0,0 +1,55 @@
use std::future::{self, Ready};
use actix_session::SessionExt;
use actix_web::{
Error, FromRequest, HttpMessage, HttpRequest,
body::MessageBody,
dev::{Payload, ServiceRequest, ServiceResponse},
error::ErrorUnauthorized,
middleware::Next,
};
use crate::framework::web::constants::SESSION_KEY_USER_ID;
pub async fn auth_middleware(
req: ServiceRequest,
next: Next<impl MessageBody>,
) -> Result<ServiceResponse<impl MessageBody>, Error> {
let session = req.get_session();
let user_id = session.get::<i32>(SESSION_KEY_USER_ID);
if user_id.is_err() {
return next.call(req).await;
}
let user_id = user_id.unwrap();
if user_id.is_none() {
return next.call(req).await;
}
let user_id = user_id.unwrap();
req.extensions_mut().insert(user_id);
next.call(req).await
}
pub struct UserId(i32);
impl UserId {
pub fn get(&self) -> i32 {
self.0
}
}
impl FromRequest for UserId {
type Error = Error;
type Future = Ready<Result<Self, Self::Error>>;
fn from_request(req: &HttpRequest, _: &mut Payload) -> Self::Future {
let user_id = req.extensions().get::<i32>().cloned();
match user_id {
Some(id) => future::ready(Ok(UserId(id))),
None => future::ready(Err(ErrorUnauthorized(""))),
}
}
}

View File

@ -6,8 +6,9 @@ use crate::{
auth_controller::AuthController, oidc_callback_query_dto::OidcCallbackQueryDto,
},
application::error::auth_error::AuthError,
framework::web::constants::{
SESSION_KEY_AUTH_NONCE, SESSION_KEY_AUTH_STATE, SESSION_KEY_USER_ID,
framework::web::{
auth_middleware::UserId,
constants::{SESSION_KEY_AUTH_NONCE, SESSION_KEY_AUTH_STATE, SESSION_KEY_USER_ID},
},
};
@ -18,6 +19,8 @@ pub fn configure_auth_routes(cfg: &mut web::ServiceConfig) {
.route("/callback", web::get().to(oidc_callback_handler))
.route("/logout", web::get().to(logout_handler)),
);
cfg.service(web::resource("/me").route(web::get().to(get_logged_in_user_handler)));
}
async fn oidc_login_handler(
@ -92,10 +95,12 @@ async fn oidc_callback_handler(
}
async fn logout_handler(session: Session) -> impl Responder {
session.remove(SESSION_KEY_AUTH_STATE);
session.remove(SESSION_KEY_AUTH_NONCE);
session.remove(SESSION_KEY_USER_ID);
session.clear();
HttpResponse::Found()
.append_header((header::LOCATION, "/"))
.finish()
}
async fn get_logged_in_user_handler(user_id: UserId) -> impl Responder {
HttpResponse::Ok().body(format!("Logged in user ID: {}", user_id.get()))
}

View File

@ -11,3 +11,5 @@ futures.workspace = true
log.workspace = true
serde.workspace = true
sqlx.workspace = true
auth.workspace = true

View File

@ -1,5 +1,6 @@
use actix_multipart::Multipart;
use actix_web::{HttpResponse, Responder, web};
use auth::framework::web::auth_middleware::UserId;
use futures::StreamExt;
use crate::{
@ -18,6 +19,7 @@ pub fn configure_image_routes(cfg: &mut web::ServiceConfig) {
async fn upload_image_handler(
image_controller: web::Data<dyn ImageController>,
mut payload: Multipart,
_: UserId,
) -> impl Responder {
let mut image_request_dto: Option<ImageRequestDto> = None;

View File

@ -20,7 +20,7 @@ impl SessionConfiguration {
let session_key = Key::from(&session_key_bytes);
let redis_url =
std::env::var("REDIS_URL").unwrap_or_else(|_| "redis://127.0.1:6379".to_string());
std::env::var("REDIS_URL").unwrap_or_else(|_| "redis://127.0.0.1:6379".to_string());
Self {
session_key,

View File

@ -5,9 +5,12 @@ use actix_web::{
App, Error, HttpServer,
body::MessageBody,
dev::{ServiceFactory, ServiceRequest, ServiceResponse},
middleware::from_fn,
web,
};
use auth::framework::web::auth_web_routes::configure_auth_routes;
use auth::framework::web::{
auth_middleware::auth_middleware, auth_web_routes::configure_auth_routes,
};
use image::framework::web::image_web_routes::configure_image_routes;
use openidconnect::reqwest;
use post::framework::web::post_web_routes::configure_post_routes;
@ -63,6 +66,8 @@ fn create_app(
let container = Container::new(db_pool, http_client, configuration);
App::new()
// The middlewares are executed in opposite order as registration.
.wrap(from_fn(auth_middleware))
.wrap(session_middleware_builder.build())
.app_data(web::Data::from(container.auth_controller))
.app_data(web::Data::from(container.image_controller))