JWT ![Build Status] ![Latest Version]

A JSON Web Token library.

Documentation

Usage

Note, for legacy support (not recommended), import from jwt::legacy instead of directly from jwt. Everything should work as before, with some small improvements.

Only Claims

If you don't care about that header as long as the header is verified, signing and verification can be done with just a few traits.

Signing

Claims can be any serde::Serialize type, usually derived with serde_derive.

```rust extern crate hmac; extern crate jwt; extern crate sha2;

use hmac::{Hmac, Mac}; use jwt::SignWithKey; use sha2::Sha256; use std::collections::BTreeMap;

let key: Hmac = Hmac::new_varkey(b"some-secret").unwrap(); let mut claims = BTreeMap::new(); claims.insert("sub", "someone");

let tokenstr = claims.signwith_key(&key).unwrap();

asserteq!(tokenstr, "eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJzb21lb25lIn0.5wwE1sBrs-vftww_BGIuTVDeHtc1Jsjo-fiHhDwR8m0"); ```

Verification

Claims can be any serde::de::DeserializeOwned type, usually derived with serde_derive.

```rust extern crate hmac; extern crate jwt; extern crate sha2;

use hmac::{Hmac, Mac}; use jwt::VerifyWithKey; use sha2::Sha256; use std::collections::BTreeMap;

let key: Hmac = Hmac::newvarkey(b"some-secret").unwrap(); let tokenstr = "eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJzb21lb25lIn0.5wwE1sBrs-vftww_BGIuTVDeHtc1Jsjo-fiHhDwR8m0";

let claims: BTreeMap = VerifyWithKey::verifywithkey(token_str, &key).unwrap();

assert_eq!(claims["sub"], "someone"); ```

Header and Claims

If you need to customize the header, you can use the Token struct. For convenience, a Header struct is provided for all of the commonly defined fields, but any type that implements JoseHeader can be used.

Signing

Both header and claims have to implement serde::Serialize.

```rust extern crate hmac; extern crate jwt; extern crate sha2;

use hmac::{Hmac, Mac}; use jwt::{AlgorithmType, Header, SignWithKey, Token}; use sha2::Sha384; use std::collections::BTreeMap;

let key: Hmac = Hmac::new_varkey(b"some-secret").unwrap(); let header = Header { algorithm: AlgorithmType::Hs384, ..Default::default() }; let mut claims = BTreeMap::new(); claims.insert("sub", "someone");

let token = Token::new(header, claims).signwithkey(&key).unwrap();

asserteq!(token.asstr(), "eyJhbGciOiJIUzM4NCJ9.eyJzdWIiOiJzb21lb25lIn0.WMWnPUkHK6zm6Wz7zk1kmIxz990Te7nlDjQ3vzcye29szZ-Sj47rLNSTJNzpQd"); ```

Verification

Both header and claims have to implement serde::de::DeserializeOwned.

```rust extern crate hmac; extern crate jwt; extern crate sha2;

use hmac::{Hmac, Mac}; use jwt::{AlgorithmType, Header, Token, VerifyWithKey}; use sha2::Sha384; use std::collections::BTreeMap;

let key: Hmac = Hmac::newvarkey(b"some-secret").unwrap(); let tokenstr = "eyJhbGciOiJIUzM4NCJ9.eyJzdWIiOiJzb21lb25lIn0.WMWnPUkHK6zm6Wz7zk1kmIxz990Te7nlDjQ3vzcye29szZ-Sj47rLNSTJNzpQd";

let token: Token, > = VerifyWithKey::verifywithkey(tokenstr, &key).unwrap(); let header = token.header(); let claims = token.claims();

asserteq!(header.algorithm, AlgorithmType::Hs384); asserteq!(claims["sub"], "someone"); ```