7 unstable releases
0.4.0 | May 29, 2020 |
---|---|
0.3.0 | May 3, 2017 |
0.2.3 | Dec 31, 2016 |
0.2.2 | Oct 21, 2016 |
0.1.1 | Jun 27, 2016 |
#1060 in Encoding
21 downloads per month
12KB
189 lines
Rebel Web Tokens
For a lot of reasons, I'm not a huge fan of just going into a package manager and grabbing the first library that comes up on a search relating to a task X. One of the big ones is that I occasionally fear what I will term "suicide by standard." Yes, I get that some group of people has gotten together and decided that insert standard here is a good way of doing things, but what if I don't agree?
...In this case, what I have a problem with is the idea that I should be including a header in a JWT that tells me what algorithm to use to decode it. I know the algorithm, guys; it's my application and I'm the one who made the token. Be reasonable.
I'm also not a huge fan of any of the existing Rust implementations of JWT in that they all seem rather opinionated as to what my payload should be. That doesn't make sense to me, either, so I didn't do that here. Actually, I don't do much at all, and that's pretty easy to see: there were originally only 118 lines of code in this library, and I wanna say 50 of those were dedicated to converting various other libraries' errors into my own.
tl;dr: kitchen sink not included.
Features
- Serializes and signs any payload implementing
serde::ser::Serialize
- Deserializes and validates any payload implementing
serde::de::Deserialize
- Refuses to waste bits on JWT headers
- Gives no fucks
Updates
0.3.0
- Support for serde 1.0. Of course, this means we no longer support anything less than that... This also required some API changes.
- Among other things, that means
FromStr
onRwt
is now implemented for payloads that also implementFromStr
instead of for payloads that directly implementDeserialize
. - Additionally,
Rwt(T)
now directly implementsSerialize
andDeserialize
for anyT
which does the same. - Documentation has been added.
- Lastly, I have reformatted this list and decided that the most recent changes should be at the top.
0.2.3
- In order to avoid a potential timing attack vector, we now use
crypto::util::fixed_time_eq
to validate token signatures. Props to @Philipp91 for that.
0.2.1
Rwt
struct is nowEq
andPartialEq
. This is primarily to support testing; whether this has any real purpose for the end user is a mystery to me.
Roadmap
Allow algorithm selection?
I see very little value in this, personally, but it sounds fun to implement.
License
Licensed under either of
- Apache License, Version 2.0, (LICENSE-APACHE or http://www.apache.org/licenses/LICENSE-2.0)
- MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT)
at your option.
Contribution
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
Dependencies
~5.5MB
~90K SLoC