mod.rs 968 B

1234567891011121314151617181920212223242526272829303132333435363738
  1. //[dependencies]
  2. //jwt = "0.12.0"
  3. //hmac = "0.9.0"
  4. //sha2 = "0.9.2"
  5. //serde = {version = "1.0", features = ["derive"] }
  6. use hmac::{Hmac, NewMac};
  7. use jwt::VerifyWithKey;
  8. use sha2::Sha256;
  9. use serde::{Serialize, Deserialize};
  10. pub fn main() {
  11. let jwt_util = JWTUtil::new("0wsszP*VI4#)@Ekmq");
  12. let claims = jwt_util.verify("eyJhbGciOiJIUzI1NiIsImV4cCI6MTYxNDg0MjUzNCwidHlwIjoiSldUIn0.eyJpZCI6MTAwMSwiZXhwIjoxNjE0ODQyNTM0fQ.tuBCDxAqTjI0SbABL_jv9DEGWdbLl_YiYxGI5RMWqxw");
  13. println!("{:?}", claims);
  14. }
  15. #[derive(Debug, Serialize, Deserialize)]
  16. struct Claims {
  17. id: i64,
  18. exp: i64
  19. }
  20. pub struct JWTUtil {
  21. key: Hmac<Sha256>
  22. }
  23. impl JWTUtil {
  24. fn new(secret: &str) -> JWTUtil {
  25. let key: Hmac<Sha256> = Hmac::new_varkey(secret.as_bytes())
  26. .expect("HMAC can take key of any size");
  27. JWTUtil { key }
  28. }
  29. fn verify(&self, token_str: &str) -> Claims {
  30. token_str.verify_with_key(&self.key).expect("invalid")
  31. }
  32. }