oauth-certs

Crates.iooauth-certs
lib.rsoauth-certs
version0.6.0
sourcesrc
created_at2023-08-06 11:22:06.148973
updated_at2024-08-06 17:41:53.712302
descriptionThe project fetches oauth certificates from providers during runtime and stores them in static Read / Write lock.
homepagehttps://github.com/pagescrape/oauth-certs
repositoryhttps://github.com/pagescrape/oauth-certs
max_upload_size
id937091
size8,618
Ernestas Poskus (ernestas-poskus)

documentation

https://docs.rs/oauth-certs

README

oauth-certs CI

The project fetches oauth certificates from providers during runtime and stores them in static Read / Write lock.

The gist of basic usage

/// `GooglePayload` is the user data from google.
/// see https://developers.google.com/identity/openid-connect/openid-connect for more info.
#[derive(Debug, Clone, Serialize, Deserialize)]
#[non_exhaustive]
pub struct ClaimsGoogle {
    // These fields are marked `always`.
    aud: String,
    exp: u64,
    iat: u64,
    iss: String,
    sub: String,

    /// Email
    email: String,
    /// Email verified or not
    email_verified: Option<bool>,
}

/// decode JWT token into Claims
pub async fn decode(token: &str) -> Result<ClaimsGoogle> {
    let header = jsonwebtoken::decode_header(token)?;

    let certs = oauth_certs::google::oauth2_v3_certs().await.map_err(|e| {
        // tracing::error!("Failed to get google oauth certs: {}", e);
        jsonwebtoken::errors::ErrorKind::RsaFailedSigning
    })?;

    let jwt_key = (certs)
        .keys
        .iter()
        .find(|cert| cert.common.key_id == header.kid)
        .ok_or::<jsonwebtoken::errors::Error>(
            jsonwebtoken::errors::ErrorKind::InvalidKeyFormat.into(),
        )?;

    let decoding_key = DecodingKey::from_jwk(jwt_key)?;

    jsonwebtoken::decode::<ClaimsGoogle>(token, &decoding_key, &validation())
        .map(|token_data| token_data.claims)
}
Commit count: 9

cargo fmt