2 releases
0.4.1 | Mar 10, 2024 |
---|---|
0.4.0 | Mar 10, 2024 |
#1540 in Parser implementations
59 downloads per month
76KB
1.5K
SLoC
jsonwebkey
JSON Web Key (JWK) (de)serialization, generation, and conversion.
Goals
tl;dr: get keys into a format that can be used by other crates; be as safe as possible while doing so.
- Serialization and deserialization of Required and Recommended key types (HS256, HS384, HS512 RS256, RS384, RS512, ES256, ES384)
- Conversion to PEM for interop with existing JWT libraries (e.g., jsonwebtoken)
- Key generation (particularly useful for testing)
Non-goals
- be a fully-featured JOSE framework
Examples
Deserializing from JSON
extern crate jsonwebkey as jwk;
// Generated using https://mkjwk.org/.
let jwt_str = r#"{
"kty": "oct",
"use": "sig",
"kid": "my signing key",
"k": "Wpj30SfkzM_m0Sa_B2NqNw",
"alg": "HS256"
}"#;
let the_jwk: jwk::JsonWebKey = jwt_str.parse().unwrap();
println!("{:#?}", the_jwk); // looks like `jwt_str` but with reordered fields.
Using with other crates
#[cfg(all(feature = "generate", feature = "jwt-convert"))] {
extern crate jsonwebtoken as jwt;
extern crate jsonwebkey as jwk;
#[derive(serde::Serialize, serde::Deserialize)]
struct TokenClaims {
exp: usize
}
let mut my_jwk = jwk::JsonWebKey::new(jwk::Key::generate_p256());
my_jwk.set_algorithm(jwk::Algorithm::ES256);
let alg: jwt::Algorithm = my_jwk.algorithm.unwrap().into();
let token = jwt::encode(
&jwt::Header::new(alg),
&TokenClaims { exp: 1492 },
&my_jwk.key.to_encoding_key(),
).unwrap();
let mut validation = jwt::Validation::new(alg);
validation.validate_exp = false;
jwt::decode::<TokenClaims>(&token, &my_jwk.key.to_decoding_key(), &validation).unwrap();
}
Features
pkcs-convert
- enablesKey::{to_der, to_pem}
. This pulls in the yasna crate.generate
- enablesKey::{generate_p256, generate_symmetric}
. This pulls in the p256 and rand crates.jwt-convert
- enables conversions to types in the jsonwebtoken crate.
Dependencies
~1–10MB
~127K SLoC