2019-01-31 23:11:20 -05:00
|
|
|
use chrono::Utc;
|
2019-11-14 13:43:43 -05:00
|
|
|
use jsonwebtoken::{
|
|
|
|
crypto::{sign, verify},
|
|
|
|
decode, encode, Algorithm, Header, Validation,
|
|
|
|
};
|
2019-11-03 10:46:08 -05:00
|
|
|
use serde::{Deserialize, Serialize};
|
2019-01-31 23:11:20 -05:00
|
|
|
|
|
|
|
#[derive(Debug, PartialEq, Clone, Serialize, Deserialize)]
|
2019-07-06 14:36:32 -04:00
|
|
|
pub struct Claims {
|
2019-01-31 23:11:20 -05:00
|
|
|
sub: String,
|
|
|
|
company: String,
|
|
|
|
exp: i64,
|
|
|
|
}
|
|
|
|
|
2019-11-06 17:32:13 -05:00
|
|
|
// TODO: remove completely?
|
|
|
|
//#[test]
|
|
|
|
//fn round_trip_sign_verification_pk8() {
|
|
|
|
// let privkey = include_bytes!("private_ecdsa_key.pk8");
|
|
|
|
// let encrypted = sign("hello world", privkey, Algorithm::ES256).unwrap();
|
|
|
|
// let pubkey = include_bytes!("public_ecdsa_key.pk8");
|
|
|
|
// let is_valid = verify(&encrypted, "hello world", pubkey, Algorithm::ES256).unwrap();
|
|
|
|
// assert!(is_valid);
|
|
|
|
//}
|
2019-01-31 23:11:20 -05:00
|
|
|
|
2019-11-03 07:22:51 -05:00
|
|
|
#[test]
|
|
|
|
fn round_trip_sign_verification_pem() {
|
2019-11-06 17:32:13 -05:00
|
|
|
let privkey = include_bytes!("private_ecdsa_key.pem");
|
2019-11-03 07:22:51 -05:00
|
|
|
let encrypted = sign("hello world", privkey, Algorithm::ES256).unwrap();
|
2019-11-06 17:32:13 -05:00
|
|
|
let pubkey = include_bytes!("public_ecdsa_key.pem");
|
2019-11-03 07:22:51 -05:00
|
|
|
let is_valid = verify(&encrypted, "hello world", pubkey, Algorithm::ES256).unwrap();
|
|
|
|
assert!(is_valid);
|
|
|
|
}
|
|
|
|
|
2019-01-31 23:11:20 -05:00
|
|
|
#[test]
|
|
|
|
fn round_trip_claim() {
|
|
|
|
let my_claims = Claims {
|
|
|
|
sub: "b@b.com".to_string(),
|
|
|
|
company: "ACME".to_string(),
|
|
|
|
exp: Utc::now().timestamp() + 10000,
|
|
|
|
};
|
2019-11-06 17:32:13 -05:00
|
|
|
let privkey = include_bytes!("private_ecdsa_key.pem");
|
|
|
|
let token = encode(&Header::new(Algorithm::ES256), &my_claims, privkey).unwrap();
|
|
|
|
let pubkey = include_bytes!("public_ecdsa_key.pem");
|
|
|
|
let token_data = decode::<Claims>(&token, pubkey, &Validation::new(Algorithm::ES256)).unwrap();
|
2019-01-31 23:11:20 -05:00
|
|
|
assert_eq!(my_claims, token_data.claims);
|
|
|
|
assert!(token_data.header.kid.is_none());
|
|
|
|
}
|