jsonwebtoken/examples/claims.rs

50 lines
1.2 KiB
Rust
Raw Normal View History

2015-11-02 18:27:28 -05:00
extern crate jsonwebtoken as jwt;
2015-11-02 15:34:11 -05:00
extern crate rustc_serialize;
2015-12-18 16:07:48 -05:00
use jwt::{encode, decode, Header, Algorithm};
2015-11-03 11:00:52 -05:00
use jwt::errors::{Error};
2015-11-02 15:34:11 -05:00
2015-11-02 15:34:11 -05:00
#[derive(Debug, RustcEncodable, RustcDecodable)]
struct Claims {
sub: String,
company: String
}
// Example validation implementation
impl Claims {
2016-12-25 23:20:18 -05:00
fn is_valid(&self) -> bool {
if self.company != "ACME" {
return false;
}
// expiration etc
true
}
}
2015-11-02 15:34:11 -05:00
fn main() {
let my_claims = Claims {
sub: "b@b.com".to_owned(),
company: "ACME".to_owned()
};
2015-11-02 16:04:58 -05:00
let key = "secret";
let token = match encode(Header::default(), &my_claims, key.as_ref()) {
2015-11-03 11:00:52 -05:00
Ok(t) => t,
Err(_) => panic!() // in practice you would return the error
};
2016-03-23 09:27:46 -04:00
println!("{:?}", token);
let token_data = match decode::<Claims>(&token, key.as_ref(), Algorithm::HS256) {
2015-11-03 11:00:52 -05:00
Ok(c) => c,
Err(err) => match err {
Error::InvalidToken => panic!(), // Example on how to handle a specific error
_ => panic!()
}
};
println!("{:?}", token_data.claims);
println!("{:?}", token_data.header);
println!("{:?}", token_data.claims.is_valid());
2015-11-02 15:34:11 -05:00
}