Frank JWT Build Status crates.io

Implementation of JSON Web Tokens in Rust.

Algorithms and features supported

Usage

Put this into your Cargo.toml:

toml [dependencies] frank_jwt = "<current version of frank_jwt>"

And this in your crate root:

```rust extern crate frank_jwt;

[macrouse] extern crate serdejson;

use frank_jwt::{Algorithm, encode, decode}; ```

Example

```rust //HS256 let mut payload = json!({ "key1": "val1", "key2": "val2" });

let mut header = json!({}); let secret = "secret123"; let jwt = encode(&header, secret.to_string(), &payload, Algorithm::HS256);

//RS256 use std::env;

let mut payload = json!({ "key1": "val1", "key2": "val2" });

let mut header = json!({}); let mut keypath = env::currentdir().unwrap(); keypath.push("somefolder"); keypath.push("myrsa2048key.pem"); let jwt = encode(&header, &keypath.topathbuf(), &payload, Algorithm::RS256); let (header, payload) = decode(&jwt, &keypath.topath_buf(), Algorithm::RS256, &ValidationOptions::default()); ```

Validation Options

The ValidationOptions structure allows for control over which checks should be preformed when decoding a JWT. Calling new on this will provide a default set of values. There is also a dangerous function that will return validation options that doesn't perform any checking.

The default values are:

It's worth noting that if the expiry check is requested and an exp claim is not within the JWT the check will fail validation.

License

Apache 2.0

Tests

shell cargo test

Contributors

TODO