| Crates.io | axum-jwt |
| lib.rs | axum-jwt |
| version | 0.1.3 |
| created_at | 2025-08-01 03:57:46.080279+00 |
| updated_at | 2025-09-24 11:43:30.257381+00 |
| description | Axum JWT extractors and middleware |
| homepage | |
| repository | https://github.com/nanoqsh/axum-jwt |
| max_upload_size | |
| id | 1776080 |
| size | 52,531 |
The library provides extractors for performing JWT authentication. Under the hood, tokens are parsed using the jsonwebtoken crate. For more details, see the documentation.
In this example, the request token is validated and the username is extracted:
use {
axum::{Router, routing},
axum_jwt::{Claims, Decoder, jsonwebtoken::DecodingKey},
serde::Deserialize,
std::io::Error,
tokio::net::TcpListener,
};
#[derive(Deserialize)]
struct User {
sub: String,
}
async fn hello(Claims(u): Claims<User>) -> String {
format!("Hello, {}!", u.sub)
}
#[tokio::main]
async fn main() -> Result<(), Error> {
let decoder = Decoder::from_key(DecodingKey::from_secret(b"secret"));
let app = Router::new()
.route("/", routing::get(hello))
.with_state(decoder);
let listener = TcpListener::bind("0.0.0.0:3000").await?;
axum::serve(listener, app).await
}
In case of failed authentication, for example if the token is invalid or expired, a 401 Unauthorized status code is returned.