2015-11-02 18:27:28 -05:00
|
|
|
extern crate jsonwebtoken as jwt;
|
2017-04-12 21:29:30 -04:00
|
|
|
#[macro_use]
|
|
|
|
extern crate serde_derive;
|
2015-11-02 15:34:11 -05:00
|
|
|
|
2018-10-28 14:58:35 -04:00
|
|
|
use jwt::errors::ErrorKind;
|
|
|
|
use jwt::{decode, encode, Header, Validation};
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2017-01-09 00:50:51 -05:00
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
2015-11-02 15:34:11 -05:00
|
|
|
struct Claims {
|
|
|
|
sub: String,
|
2018-10-28 14:54:35 -04:00
|
|
|
company: String,
|
|
|
|
exp: usize,
|
2015-11-02 15:34:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
2018-10-28 14:58:35 -04:00
|
|
|
let my_claims =
|
|
|
|
Claims { sub: "b@b.com".to_owned(), company: "ACME".to_owned(), exp: 10000000000 };
|
2015-11-02 16:04:58 -05:00
|
|
|
let key = "secret";
|
2017-04-10 23:54:32 -04:00
|
|
|
let token = match encode(&Header::default(), &my_claims, key.as_ref()) {
|
2015-11-03 11:00:52 -05:00
|
|
|
Ok(t) => t,
|
2018-10-28 14:58:35 -04:00
|
|
|
Err(_) => panic!(), // in practice you would return the error
|
2015-11-03 11:00:52 -05:00
|
|
|
};
|
|
|
|
|
2018-10-28 14:58:35 -04:00
|
|
|
let validation = Validation { sub: Some("b@b.com".to_string()), ..Validation::default() };
|
2017-04-22 02:21:16 -04:00
|
|
|
let token_data = match decode::<Claims>(&token, key.as_ref(), &validation) {
|
2015-11-03 11:00:52 -05:00
|
|
|
Ok(c) => c,
|
2017-01-09 00:50:51 -05:00
|
|
|
Err(err) => match *err.kind() {
|
2018-10-28 14:54:35 -04:00
|
|
|
ErrorKind::InvalidToken => panic!("Token is invalid"), // Example on how to handle a specific error
|
|
|
|
ErrorKind::InvalidIssuer => panic!("Issuer is invalid"), // Example on how to handle a specific error
|
2018-10-28 14:58:35 -04:00
|
|
|
_ => panic!("Some other errors"),
|
|
|
|
},
|
2015-11-03 11:00:52 -05:00
|
|
|
};
|
2015-12-19 20:16:52 -05:00
|
|
|
println!("{:?}", token_data.claims);
|
|
|
|
println!("{:?}", token_data.header);
|
2015-11-02 15:34:11 -05:00
|
|
|
}
|