Implementation of JSON Web Tokens in Rust.
Put this into your Cargo.toml
:
toml
[dependencies]
frank_jwt = "<current version of frank_jwt>"
And this in your crate root:
```rust extern crate frank_jwt;
use frank_jwt::{Algorithm, encode, decode}; ```
```rust //HS256 let mut payload = json!({ "key1": "val1", "key2": "val2" });
let mut header = json!({}); let secret = "secret123"; let jwt = encode(&header, secret.to_string(), &payload, Algorithm::HS256);
//RS256 use std::env;
let mut payload = json!({ "key1": "val1", "key2": "val2" });
let mut header = json!({}); let mut keypath = env::currentdir().unwrap(); keypath.push("somefolder"); keypath.push("myrsa2048key.pem"); let jwt = encode(&header, &keypath.topathbuf(), &payload, Algorithm::RS256); let (header, payload) = decode(&jwt, &keypath.topath_buf(), Algorithm::RS256, &ValidationOptions::default()); ```
The ValidationOptions structure allows for control over which checks should be preformed when decoding a JWT. Calling new on this will provide a default set of values. There is also a dangerous function that will return validation options that doesn't perform any checking.
The default values are:
It's worth noting that if the expiry check is requested and an exp claim is not within the JWT the check will fail validation.
Apache 2.0
shell
cargo test
TODO