#jwt #cognito #token #jwk #jwks #access-token

jsonwebtokens-cognito

Decodes and verifies Json Web Tokens issued by AWS Cognito

9 releases

0.1.1 May 8, 2022
0.1.0-alpha.10 Aug 15, 2021
0.1.0-alpha.9 Jan 17, 2020
0.1.0-alpha.8 Dec 30, 2019

#239 in Authentication

Download history 93/week @ 2023-12-13 70/week @ 2023-12-20 69/week @ 2023-12-27 167/week @ 2024-01-03 183/week @ 2024-01-10 197/week @ 2024-01-17 182/week @ 2024-01-24 112/week @ 2024-01-31 124/week @ 2024-02-07 158/week @ 2024-02-14 260/week @ 2024-02-21 321/week @ 2024-02-28 301/week @ 2024-03-06 379/week @ 2024-03-13 351/week @ 2024-03-20 304/week @ 2024-03-27

1,387 downloads per month
Used in actix-web-middleware-cogn…

MIT license

21KB
253 lines

A Rust library for verifying Json Web Tokens issued by AWS Cognito

Install

jsonwebtokens-cognito = "0.1.0-alpha"

Usage

let keyset = KeySet::new("eu-west-1", "my-user-pool-id")?;
let verifier = keyset.new_id_token_verifier(&["client-id-0", "client-id-1"])
    .string_equals("custom_claim0", "value")
    .string_equals("custom_claim1", "value")
    .build()?;

let claims = keyset.verify(token, &verifier).await?;

This library builds on top of jsonwebtokens token verifiers.

The keyset will fetch from the appropriate .jwks url when verifying the first token or, alternatively the cache can be primed by calling keyset.prefetch_jwks():

let keyset = KeySet::new("eu-west-1", "my-user-pool-id")?;
keyset.prefetch_jwks().await?;

If you need to perform token verification in a non-async context, or don't wan't to allow network I/O while verifying tokens then if you have explicitly prefetched the jwks key set you can verify tokens with try_verify:

let keyset = KeySet::new("eu-west-1", "my-user-pool-id")?;
keyset.prefetch_jwks().await?;
let verifier = keyset.new_id_token_verifier(&["client-id-0", "client-id-1"])
    .string_equals("custom_claim0", "value")
    .string_equals("custom_claim1", "value")
    .build()?;

let claims = keyset.try_verify(token, verifier).await?;

try_verify() will return a CacheMiss error if the required key has not been prefetched

A Keyset is Send safe so it can be used for authentication within a multi-threaded server.

Examples:

Verify an AWS Cognito Access token

let keyset = KeySet::new(AWS_REGION, AWS_POOL_ID)?;
let verifier = keyset.new_access_token_verifier(&[AWS_CLIENT_ID]).build()?;

keyset.verify(&token_str, &verifier).await?;

Verify an AWS Cognito Identity token

let keyset = KeySet::new(AWS_REGION, AWS_POOL_ID)?;
let verifier = keyset.new_id_token_verifier(&[AWS_CLIENT_ID]).build()?;

keyset.verify(&token_str, &verifier).await?;

Verify an AWS Cognito Access token with custom claims

let keyset = KeySet::new(AWS_REGION, AWS_POOL_ID)?;
let verifier = keyset.new_access_token_verifier(&[AWS_CLIENT_ID])
    .string_equals("my_claim", "foo")
    .build()?;

keyset.verify(&token_str, &verifier).await?;

See jsonwebtokens for more examples of how to verify custom claims.

Dependencies

~10–24MB
~471K SLoC