1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
// Copyright 2018-2020 Cargill Incorporated
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! Provides an API for managing user sessions, including issuing and validating JWT tokens
use ;
use Serialize;
pub use ;
pub use ;
pub use AccessTokenIssuer;
const DEFAULT_LEEWAY: i64 = 10; // default leeway in seconds.
/// Implementers can issue JWT tokens
/// Deserializes a JWT token, checks that a sigures is valid and checks that the claims are
/// valid. It also and performs the extra validation provided by the caller.
///
/// # Arguments
///
/// * `token` - The serialized token to be validated
/// * `secret` - The secret to be used to validate the token signature
/// * `issuer` - The expected value for the token issuer
/// * `extra_validation` - Closure that performs extra validation, returns Ok(()) if the claims
/// are valid or an error if they are not.
///
/// ```
/// use splinter::rest_api::sessions::{validate_token, TokenValidationError};
///
/// let token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.\
/// eyJ1c2VyX2lkIjoiY2RmMTIwNzAtNjk1Mi00NTNmLWFiNmMtYjRlMzllZmM3YzA4IiwiZXhwIjo0MTMzO\
/// Dk0NDAwLCJpc3MiOiJzZWxmLWlzc3VlZCIsImFkbWluIjoidHJ1ZSJ9.\
/// km0hcHqWC7HFy02x2V-4QrKArNpzy4fXpBpqdL70e48";
///
/// validate_token(token, "super_secret", "self-issued", |claims| {
/// let custom_claims = claims.custom_claims();
/// let is_admin = custom_claims.get("admin").ok_or_else(|| {
/// TokenValidationError::InvalidClaim("User is not an admin".to_string())
/// })?;
/// match is_admin.as_ref() {
/// "true" => Ok(()),
/// _ => Err(TokenValidationError::InvalidClaim("User is not an admin".to_string()))
/// }
/// }).unwrap();
/// ```