Popularity
4.6
Declining
Activity
3.1
-
250
9
48

Programming language: Rust
License: Apache License 2.0
Tags: Web Programming     JSON     Token     Jwt     HTTP Server     Fengsp/pencil —     Encryption     Auth0-jwt    

frank_jwt alternatives and similar packages

Based on the "fengsp/pencil —" category.
Alternatively, view frank_jwt alternatives based on common mentions on social networks and blogs.

Do you think we are missing an alternative of frank_jwt or a related project?

Add another 'fengsp/pencil —' Package

README

Frank JWT Build Status crates.io

Implementation of JSON Web Tokens in Rust.

Algorithms and features supported

  • [x] HS256
  • [x] HS384
  • [x] HS512
  • [x] RS256
  • [x] RS384
  • [x] RS512
  • [x] ES256
  • [x] ES384
  • [x] ES512
  • [x] Sign
  • [x] Verify
  • [ ] iss (issuer) check
  • [ ] sub (subject) check
  • [ ] aud (audience) check
  • [x] exp (expiration time) check
  • [ ] nbf (not before time) check
  • [ ] iat (issued at) check
  • [ ] jti (JWT id) check

Usage

Put this into your Cargo.toml:

[dependencies]
frank_jwt = "<current version of frank_jwt>"

And this in your crate root:

extern crate frank_jwt;
#[macro_use] extern crate serde_json;


use frank_jwt::{Algorithm, encode, decode};

Example

//HS256
let mut payload = json!({
    "key1": "val1",
    "key2": "val2"
});

let mut header = json!({});
let secret = "secret123";
let jwt = encode(&header, secret.to_string(), &payload, Algorithm::HS256);

//RS256
use std::env;

let mut payload = json!({
    "key1": "val1",
    "key2": "val2"
});

let mut header = json!({});
let mut keypath = env::current_dir().unwrap();
keypath.push("some_folder");
keypath.push("my_rsa_2048_key.pem");
let jwt = encode(&header, &keypath.to_path_buf(), &payload, Algorithm::RS256);
let (header, payload) = decode(&jwt, &keypath.to_path_buf(), Algorithm::RS256, &ValidationOptions::default());

Validation Options

The ValidationOptions structure allows for control over which checks should be preformed when decoding a JWT. Calling new on this will provide a default set of values. There is also a dangerous function that will return validation options that doesn't perform any checking.

The default values are:

  • Perform expiry check
  • Allow 0 leeway for the expiry check.

It's worth noting that if the expiry check is requested and an exp claim is not within the JWT the check will fail validation.

License

Apache 2.0

Tests

cargo test

Contributors

TODO


*Note that all licence references and agreements mentioned in the frank_jwt README section above are relevant to that project's source code only.