68 lines
1.9 KiB
Rust
68 lines
1.9 KiB
Rust
use chrono::Utc;
|
|
use jsonwebtoken::{
|
|
crypto::{sign, verify},
|
|
decode, encode, Algorithm, DecodingKey, EncodingKey, Header, Validation,
|
|
};
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
#[derive(Debug, PartialEq, Clone, Serialize, Deserialize)]
|
|
pub struct Claims {
|
|
sub: String,
|
|
company: String,
|
|
exp: i64,
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip_sign_verification_pk8() {
|
|
let privkey = include_bytes!("private_ed25519_key.pk8");
|
|
let pubkey = include_bytes!("public_ed25519_key.pk8");
|
|
|
|
let encrypted =
|
|
sign(b"hello world", &EncodingKey::from_ed_der(privkey), Algorithm::EdDSA).unwrap();
|
|
let is_valid =
|
|
verify(&encrypted, b"hello world", &DecodingKey::from_ed_der(pubkey), Algorithm::EdDSA)
|
|
.unwrap();
|
|
assert!(is_valid);
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip_sign_verification_pem() {
|
|
let privkey_pem = include_bytes!("private_ed25519_key.pem");
|
|
let pubkey_pem = include_bytes!("public_ed25519_key.pem");
|
|
let encrypted =
|
|
sign(b"hello world", &EncodingKey::from_ed_pem(privkey_pem).unwrap(), Algorithm::EdDSA)
|
|
.unwrap();
|
|
let is_valid = verify(
|
|
&encrypted,
|
|
b"hello world",
|
|
&DecodingKey::from_ed_pem(pubkey_pem).unwrap(),
|
|
Algorithm::EdDSA,
|
|
)
|
|
.unwrap();
|
|
assert!(is_valid);
|
|
}
|
|
|
|
#[test]
|
|
fn round_trip_claim() {
|
|
let privkey_pem = include_bytes!("private_ed25519_key.pem");
|
|
let pubkey_pem = include_bytes!("public_ed25519_key.pem");
|
|
let my_claims = Claims {
|
|
sub: "b@b.com".to_string(),
|
|
company: "ACME".to_string(),
|
|
exp: Utc::now().timestamp() + 10000,
|
|
};
|
|
let token = encode(
|
|
&Header::new(Algorithm::EdDSA),
|
|
&my_claims,
|
|
&EncodingKey::from_ed_pem(privkey_pem).unwrap(),
|
|
)
|
|
.unwrap();
|
|
let token_data = decode::<Claims>(
|
|
&token,
|
|
&DecodingKey::from_ed_pem(pubkey_pem).unwrap(),
|
|
&Validation::new(Algorithm::EdDSA),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(my_claims, token_data.claims);
|
|
}
|