medallion/examples/hs256.rs

44 lines
1.3 KiB
Rust
Raw Normal View History

2017-02-14 15:51:39 +00:00
extern crate medallion;
2017-02-13 23:40:07 +00:00
2018-11-18 15:46:19 +00:00
use medallion::{DefaultPayload, DefaultToken, Header};
2017-02-13 23:40:07 +00:00
fn new_token(user_id: &str, password: &str) -> Option<String> {
// dummy auth, in a real application using something like openidconnect, this would be some
// specific authentication scheme that takes place first then the JWT is generated as part of
// sucess and signed with the provider's private key so other services can validate trust for
// the claims in the token
2017-02-13 23:40:07 +00:00
if password != "password" {
return None;
2017-02-13 23:40:07 +00:00
}
// can satisfy Header's generic parameter with an empty type
2018-11-18 15:46:19 +00:00
let header: Header = Header::default();
let payload = DefaultPayload {
2017-02-14 15:51:39 +00:00
iss: Some("example.com".into()),
2017-02-13 23:40:07 +00:00
sub: Some(user_id.into()),
2018-11-18 15:46:19 +00:00
..DefaultPayload::default()
2017-02-13 23:40:07 +00:00
};
let token = DefaultToken::new(header, payload);
2017-02-13 23:40:07 +00:00
token.sign(b"secret_key").ok()
2017-02-13 23:40:07 +00:00
}
fn login(token: &str) -> Option<String> {
let token: DefaultToken<()> = DefaultToken::parse(token).unwrap();
2017-02-13 23:40:07 +00:00
// the key for HMAC is some secret known to trusted/trusting parties
2017-02-17 16:53:12 +00:00
if token.verify(b"secret_key").unwrap() {
token.payload.sub
2017-02-13 23:40:07 +00:00
} else {
None
}
}
fn main() {
2017-02-14 15:51:39 +00:00
let token = new_token("Random User", "password").unwrap();
2017-02-13 23:40:07 +00:00
let logged_in_user = login(&*token).unwrap();
2017-02-14 15:51:39 +00:00
assert_eq!(logged_in_user, "Random User");
2017-02-13 23:40:07 +00:00
}