S sbstjn.dev
Topics About

Topic: Rust

  • bunsy: Sync Local Folders to Bunny CDN Storage

    Apr 9, 2026 · 4 min read · 669 words
    I run this website and a few other projects on Bunny CDN: the production setup is a Storage Zone for hosting all assets and a Pull Zone for CDN services. After each build I need the same loop over and over — walk the local output tree, compare it to what Bunny already has, upload what changed, and optionally remove objects that no longer exist locally. That workflow is second nature with aws s3 sync; for Bunny’s HTTP storage API I wanted something equally boring and reliable, not a one-off shell script.
  • Multiarch Docker Containers with Rust

    Dec 5, 2025 · 3 min read · 411 words
    This guide shows how to build multiarch Docker containers for Rust applications using cargo zigbuild for cross-compilation and Docker build commands for architecture-specific or multiarch container images. Based on the example for Building a Rust API with Rocket and JWT Authentication, this guide provides the next steps.
  • Building a Rust API with Rocket and JWT Authentication

    Dec 5, 2025 · 11 min read · 1,959 words
    When building backend APIs, JWT authentication is a common requirement. In Rust, you’ve got several web frameworks to choose from, and Rocket is one that makes request handling feel natural with its request guard system. Combining Rocket with JWTiny for JWT validation and JWKServe as a local identity provider gives you a complete setup for development and testing without external dependencies.
  • JWTiny: Minimal JWT Validation for Rust

    Dec 4, 2025 · 8 min read · 1,384 words
    I was learning Rust with an example project that needed JWT validation. The popular jsonwebtoken crate depends on serde, but I wanted miniserde instead. That constraint led me to build my own validator — handling signature verification, claims validation, and remote key fetching, designed for reuse across requests. JWTiny is the result.
  • JWKServe: A Fake JWT Authentication Service for Local Development

    Dec 4, 2025 · 6 min read · 1,047 words
    When writing backend services that validate JWT access tokens, you run into a frustrating problem: you need a real identity provider just to test your authentication logic. With Cognito, Auth0, or other OpenID Connect providers, spinning up an authentication service for local development or CI pipelines adds unnecessary complexity. You need valid signatures and correct claims, not the provider itself. That’s where JWKServe comes in.
S sbstjn.dev

All things Cloud Computing, Serverless, GraphQL, AI, and Software Engineering.

Blog

  • Archive
  • Topics
  • RSS Feed

Projects

  • heft.io
  • 68keys.io
  • jwkserve.com
  • keffeine.com

Legal

  • Privacy
  • Impressum

© 2026 sbstjn.com — All rights reserved.

Made with 🍟 in Hamburg