Go to file
2025-01-30 22:43:30 +01:00
migrations first commit 2025-01-30 22:43:30 +01:00
src first commit 2025-01-30 22:43:30 +01:00
.dockerignore first commit 2025-01-30 22:43:30 +01:00
.env.example first commit 2025-01-30 22:43:30 +01:00
.gitignore first commit 2025-01-30 22:43:30 +01:00
Cargo.toml first commit 2025-01-30 22:43:30 +01:00
compose.yaml first commit 2025-01-30 22:43:30 +01:00
Dockerfile first commit 2025-01-30 22:43:30 +01:00
generate_ssl_key.bat first commit 2025-01-30 22:43:30 +01:00
README.md first commit 2025-01-30 22:43:30 +01:00

# 🦀 RustAPI
**An example API built with Rust, Axum, SQLx, and PostgreSQL**  
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)

## 🚀 Core Features
- **Rust API Template** - Production-ready starter template with modern practices
- **PostgreSQL Integration** - Full database support with SQLx migrations
- **Comprehensive Health Monitoring**  
  Docker-compatible endpoint with system metrics:  
  ```json
  {
    "details": {
      "cpu_usage": {"available_percentage": "9.85", "status": "low"},
      "database": {"status": "ok"},
      "disk_usage": {"status": "ok", "used_percentage": "74.00"},
      "memory": {"available_mb": 21613, "status": "normal"}
    },
    "status": "degraded"
  }
  • JWT Authentication - Secure token-based auth with Argon2 password hashing
  • Granular Access Control - Role-based endpoint protection:
    .route("/", post(post_todo).layer(axum::middleware::from_fn(|req, next| {
        let allowed_roles = vec![1, 2];
        authorize(req, next, allowed_roles)
    })))
    
  • User Context Injection - Automatic user profile handling in endpoints:
    pub async fn post_todo(
        Extension(user): Extension<User>,  // Injected user
        Json(todo): Json<TodoBody>
    ) -> impl IntoResponse {
        if todo.user_id != user.id {
            return Err((StatusCode::FORBIDDEN, Json(json!({ 
                "error": "Cannot create todos for others" 
            }))));
        }
    
  • **Modern protocols ** - HTTP/2 with secure TLS defaults
  • Observability - Integrated tracing
  • Optimized for performance - Brotli compression
  • Easy configuration - .env and environment variables
  • Documented codebase - Extensive inline comments for easy modification and readability
  • Latest dependencies - Regularly updated Rust ecosystem crates

📦 Installation & Usage

# Clone and setup
git clone https://github.com/Riktastic/rustapi.git
cd rustapi && cp .env.example .env

# Database setup
sqlx database create && sqlx migrate run

# Start server
cargo run --release

🔐 Default Accounts

Warning: These accounts should only be used for initial testing. Always change or disable them in production environments.

Email Password Role
user@test.com test User
admin@test.com test Administrator

⚠️ Security Recommendations:

  1. Rotate passwords immediately after initial setup
  2. Disable default accounts before deploying to production
  3. Implement proper user management endpoints

⚙️ Configuration

# ==============================
# 📌 DATABASE CONFIGURATION
# ==============================

# PostgreSQL connection URL (format: postgres://user:password@host/database)
DATABASE_URL="postgres://postgres:1234@localhost/database_name"

# Maximum number of connections in the database pool
DATABASE_MAX_CONNECTIONS=20

# Minimum number of connections in the database pool
DATABASE_MIN_CONNECTIONS=5

# ==============================
# 🌍 SERVER CONFIGURATION
# ==============================

# IP address the server will bind to (0.0.0.0 allows all network interfaces)
SERVER_IP="0.0.0.0"

# Port the server will listen on
SERVER_PORT="3000"

# Enable tracing for debugging/logging (true/false)
SERVER_TRACE_ENABLED=true

# ==============================
# 🔒 HTTPS CONFIGURATION
# ==============================

# Enable HTTPS (true/false)
SERVER_HTTPS_ENABLED=false

# Enable HTTP/2 when using HTTPS (true/false)
SERVER_HTTPS_HTTP2_ENABLED=true

# Path to the SSL certificate file (only used if SERVER_HTTPS_ENABLED=true)
SERVER_HTTPS_CERT_FILE_PATH=cert.pem

# Path to the SSL private key file (only used if SERVER_HTTPS_ENABLED=true)
SERVER_HTTPS_KEY_FILE_PATH=key.pem

# ==============================
# 🚦 RATE LIMIT CONFIGURATION
# ==============================

# Maximum number of requests allowed per period
SERVER_RATE_LIMIT=5

# Time period (in seconds) for rate limiting
SERVER_RATE_LIMIT_PERIOD=1

# ==============================
# 📦 COMPRESSION CONFIGURATION
# ==============================

# Enable Brotli compression (true/false)
SERVER_COMPRESSION_ENABLED=true

# Compression level (valid range: 0-11, where 11 is the highest compression)
SERVER_COMPRESSION_LEVEL=6

# ==============================
# 🔑 AUTHENTICATION CONFIGURATION
# ==============================

# Argon2 salt for password hashing (must be kept secret!)
AUTHENTICATION_ARGON2_SALT="dMjQgtSmoQIH3Imi"

📂 Project Structure

rustapi/
├── migrations/      # SQL schema versions
├── src/
│   ├── core/        # Config, TLS, server setup
│   ├── database/    # Query handling
│   ├── middlewares/ # Auth system
│   ├── models/      # Data structures
│   └── routes/      # API endpoints
└── Dockerfile       # Containerization

🛠️ Technology Stack

Category Key Technologies
Web Framework Axum 0.8 + Tower
Database PostgreSQL + SQLx 0.8
Security JWT + Argon2 + Rustls
Monitoring Tracing + Sysinfo