tvl-depot/net/alcoholic_jwt
Vincent Ambo db5ba28735 feat(alcoholic_jwt): Add Nix build for crate
... mostly to get CI.

Note that this adds the Cargo.lock file because we require pinning,
but it is generally not required for Rust libraries.

Change-Id: Iedbd3758e8df8a7f60fe67b6b06c8e41aba8f345
Reviewed-on: https://cl.tvl.fyi/c/depot/+/3362
Reviewed-by: tazjin <mail@tazj.in>
Tested-by: BuildkiteCI
2021-08-15 14:18:59 +00:00
..
src fix(alcoholic_jwt): Support multiple values in jwt audience claim 2020-07-06 21:50:05 +00:00
.gitignore chore(alcoholic_jwt): Prepare for depot merge 2019-12-21 01:24:02 +00:00
Cargo.lock feat(alcoholic_jwt): Add Nix build for crate 2021-08-15 14:18:59 +00:00
Cargo.toml chore(alcoholic_jwt): Prepare 1.0.1 release 2021-08-15 14:18:59 +00:00
default.nix feat(alcoholic_jwt): Add Nix build for crate 2021-08-15 14:18:59 +00:00
LICENSE chore(alcoholic_jwt): Prepare for depot merge 2019-12-21 01:24:02 +00:00
README.md chore(alcoholic_jwt): Prepare for depot merge 2019-12-21 01:24:02 +00:00

alcoholic_jwt

Build Status

This is a library for validation of RS256 JWTs using keys from a JWKS. Nothing more, nothing less.

RS256 is the most commonly used asymmetric signature mechanism for JWTs, encountered in for example Google's or Aprila's APIs.

The name of the library stems from the potential side-effects of trying to use the other Rust libraries that are made for similar purposes.

Usage overview

You are retrieving JWTs from some authentication provider that uses RS256 signatures and provides its public keys in JWKS format.

Example for a token that provides the key ID used for signing in the kid claim:

extern crate alcoholic_jwt;

use alcoholic_jwt::{JWKS, Validation, validate, token_kid};

// The function implied here would usually perform an HTTP-GET
// on the JWKS-URL for an authentication provider and deserialize
// the result into the `alcoholic_jwt::JWKS`-struct.
let jwks: JWKS = jwks_fetching_function();

let token: String = some_token_fetching_function();

// Several types of built-in validations are provided:
let validations = vec![
  Validation::Issuer("auth.test.aprila.no".into()),
  Validation::SubjectPresent,
];

// If a JWKS contains multiple keys, the correct KID first
// needs to be fetched from the token headers.
let kid = token_kid(&token)
    .expect("Failed to decode token headers")
    .expect("No 'kid' claim present in token");

let jwk = jwks.find(&kid).expect("Specified key not found in set");

validate(token, jwk, validations).expect("Token validation has failed!");

Under the hood

This library aims to only use trustworthy off-the-shelf components to do the work. Cryptographic operations are provided by the openssl crate, JSON-serialisation is provided by serde_json.