2019-11-03 10:46:08 -05:00
|
|
|
use jsonwebtoken::errors::ErrorKind;
|
2019-12-29 15:50:06 -05:00
|
|
|
use jsonwebtoken::{decode, encode, DecodingKey, EncodingKey, Header, Validation};
|
2019-11-03 10:46:08 -05:00
|
|
|
use serde::{Deserialize, Serialize};
|
2015-12-19 20:16:52 -05:00
|
|
|
|
2017-01-09 00:50:51 -05:00
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
2015-11-02 15:34:11 -05:00
|
|
|
struct Claims {
|
|
|
|
sub: String,
|
2018-10-28 14:54:35 -04:00
|
|
|
company: String,
|
|
|
|
exp: usize,
|
2015-11-02 15:34:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
2019-12-29 12:42:35 -05:00
|
|
|
let key = b"secret";
|
2018-10-28 14:58:35 -04:00
|
|
|
let my_claims =
|
|
|
|
Claims { sub: "b@b.com".to_owned(), company: "ACME".to_owned(), exp: 10000000000 };
|
2019-12-29 12:42:35 -05:00
|
|
|
let token = match encode(&Header::default(), &my_claims, &EncodingKey::from_secret(key)) {
|
2015-11-03 11:00:52 -05:00
|
|
|
Ok(t) => t,
|
2018-10-28 14:58:35 -04:00
|
|
|
Err(_) => panic!(), // in practice you would return the error
|
2015-11-03 11:00:52 -05:00
|
|
|
};
|
|
|
|
|
2018-10-28 14:58:35 -04:00
|
|
|
let validation = Validation { sub: Some("b@b.com".to_string()), ..Validation::default() };
|
2019-12-29 15:50:06 -05:00
|
|
|
let token_data = match decode::<Claims>(&token, &DecodingKey::from_secret(key), &validation) {
|
2015-11-03 11:00:52 -05:00
|
|
|
Ok(c) => c,
|
2017-01-09 00:50:51 -05:00
|
|
|
Err(err) => match *err.kind() {
|
2018-10-28 14:54:35 -04:00
|
|
|
ErrorKind::InvalidToken => panic!("Token is invalid"), // Example on how to handle a specific error
|
|
|
|
ErrorKind::InvalidIssuer => panic!("Issuer is invalid"), // Example on how to handle a specific error
|
2018-10-28 14:58:35 -04:00
|
|
|
_ => panic!("Some other errors"),
|
|
|
|
},
|
2015-11-03 11:00:52 -05:00
|
|
|
};
|
2015-12-19 20:16:52 -05:00
|
|
|
println!("{:?}", token_data.claims);
|
|
|
|
println!("{:?}", token_data.header);
|
2015-11-02 15:34:11 -05:00
|
|
|
}
|