medallion/examples/custom_headers.rs
Thomas Gideon 42824a133e Update to serde 1.0 (#4)
* Try updating service to 1.0

* Strip bounds from structs

* Clean bounds from Default impl

* Remove pem files, clean up some documentation

* Add badges, categories
2017-08-10 09:39:35 -04:00

55 lines
1.8 KiB
Rust

// need this for custom derivation
#[macro_use]
extern crate serde_derive;
extern crate medallion;
use std::default::Default;
use medallion::{DefaultPayload, Header, DefaultToken};
#[derive(Default, Serialize, Deserialize, PartialEq, Debug)]
struct Custom {
// useful if you want a None to not appear in the serialized JSON
#[serde(skip_serializing_if = "Option::is_none")]
kid: Option<String>,
typ: String,
}
fn new_token(sub: &str, password: &str) -> Option<String> {
// dummy auth, in a real application using something like openidconnect, this would be some
// specific authentication scheme that takes place first then the JWT is generated as part of
// sucess and signed with the provider's private key so other services can validate trust for
// the claims in the token
if password != "password" {
return None;
}
let header = Header {
// customer headers generally are about the token itself, like here describing the type of
// token, as opposed to claims which are about the authenticated user or some output of
// the authentication process
headers: Some(Custom { typ: "JWT".into(), ..Default::default() }),
..Default::default()
};
let payload = DefaultPayload { sub: Some(sub.into()), ..Default::default() };
let token = DefaultToken::new(header, payload);
token.sign(b"secret_key").ok()
}
fn login(token: &str) -> Option<String> {
let token = DefaultToken::<Custom>::parse(token).unwrap();
if token.verify(b"secret_key").unwrap() {
Some(token.payload.sub.unwrap())
} else {
None
}
}
fn main() {
let token = new_token("Random User", "password").unwrap();
let logged_in_user = login(&*token).unwrap();
assert_eq!(logged_in_user, "Random User");
}