2015-12-19 20:16:52 -05:00
|
|
|
extern crate jsonwebtoken as jwt;
|
2017-01-09 00:50:51 -05:00
|
|
|
#[macro_use]
|
|
|
|
extern crate serde_derive;
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2018-10-28 14:58:35 -04:00
|
|
|
use jwt::errors::ErrorKind;
|
|
|
|
use jwt::{decode, encode, Algorithm, Header, Validation};
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2017-01-09 00:50:51 -05:00
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
2015-12-19 20:16:52 -05:00
|
|
|
struct Claims {
|
|
|
|
sub: String,
|
2018-10-28 14:54:35 -04:00
|
|
|
company: String,
|
|
|
|
exp: usize,
|
2015-12-19 20:16:52 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
2018-10-28 14:58:35 -04:00
|
|
|
let my_claims =
|
|
|
|
Claims { sub: "b@b.com".to_owned(), company: "ACME".to_owned(), exp: 10000000000 };
|
2015-12-19 20:16:52 -05:00
|
|
|
let key = "secret";
|
|
|
|
|
|
|
|
let mut header = Header::default();
|
|
|
|
header.kid = Some("signing_key".to_owned());
|
2015-12-21 14:23:10 -05:00
|
|
|
header.alg = Algorithm::HS512;
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2017-04-10 23:54:32 -04:00
|
|
|
let token = match encode(&header, &my_claims, key.as_ref()) {
|
2015-12-19 20:16:52 -05:00
|
|
|
Ok(t) => t,
|
2018-10-28 14:58:35 -04:00
|
|
|
Err(_) => panic!(), // in practice you would return the error
|
2015-12-19 20:16:52 -05:00
|
|
|
};
|
2017-04-13 03:36:32 -04:00
|
|
|
println!("{:?}", token);
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2018-10-28 14:58:35 -04:00
|
|
|
let token_data =
|
|
|
|
match decode::<Claims>(&token, key.as_ref(), &Validation::new(Algorithm::HS512)) {
|
|
|
|
Ok(c) => c,
|
|
|
|
Err(err) => match *err.kind() {
|
|
|
|
ErrorKind::InvalidToken => panic!(), // Example on how to handle a specific error
|
|
|
|
_ => panic!(),
|
|
|
|
},
|
|
|
|
};
|
2015-12-19 20:16:52 -05:00
|
|
|
println!("{:?}", token_data.claims);
|
|
|
|
println!("{:?}", token_data.header);
|
|
|
|
}
|