@veloze/jwt
v2.1.0
Published
todo
Readme
@veloze/jwt
Middleware to verify JSON-Web-Tokens (JWT) sent in Bearer Authorization Header.
If public-keys are required to verify JWTs the JWKS URI can be detected by
issuer using .well-known/openid-configuration URLs.
Supports multiple issuers with the jwks() method.
Works also with express using jwtAuthExpress().
usage
Installation
npm i @veloze/jwtIn your code:
import { Server } from 'veloze'
import { jwtAuth } from '@veloze/jwt'
const server = new Server()
const issuer = 'https://sym.oau.th'
// for HS256, HS384, HS512 token provide secret
const protect = jwtAuth({ issuer, secret: 's€cr3t' })
server.get('/', protect, (req, res) => res.end())
server.listen(443)
// ----
await fetch('https://server', {
headers: {
authorization: 'Bearer <TOKEN>' // H256 Token with issuer https://my.oau.th
}
})For OIDC servers with .well-known/openid-configuration
import { jwtAuth, jwtAuthPass, jwks } from '@veloze/jwt'
// with asymmetric keys
const issuer = 'https://my.oau.th'
const issuer2 = 'https://oauth.other'
// (optionally) add issuer with symmetric keys
const secretsByIssuer = {
'https://sym.oau.th': 's€cr3t'
}
// supports multiple issuers
const secret = await jwks([issuer, issuer2], { secretsByIssuer })
// protect middleware throws on invalid token
const protect = jwtAuth({ secret })
// pass middleware does NOT throw on invalid token, but adds payload to
// `req[requestProperty]` which defaults to `req.auth`
// Validation MUST happen in the aftermath!!! E.g.
// `if (!req.auth) { throw new HttpError(401) }`
const pass = jwtAuthPass({ secret })API
jwtAuth
type KeyLike = Uint8Array | jose.CryptoKey;
interface DecodedJWT = {
header: {
kid: string;
alg: string;
};
payload: {
iat: number;
exp: number;
[prop: string]: any;
};
signature: string;
};
type GetKeyLikeFn = (decodedToken: DecodedJWT) => Promise<KeyLike>;
interface JwtOptions extends jose.JWTVerifyOptions {
/**
* for HS256...HS512 provide secret as Buffer or string
* for asymmetric JWT provide publicKey as secret
*/
secret: string|Buffer|KeyLike|GetKeyLikeFn
/**
* if verification is successful then payload of decoded token is added to
* request using this property e.g. default is `req.auth`
* @default 'auth'
*/
requestProperty: string
}
/**
* throws validation errors as HttpError(401)
*/
function jwtAuth (options: JwtOptions):
Promise<(req: Request, res: Response): void>
/**
* does not throw on errors, just passes. If valid token was found, sets
* req[requestProperty]
*/
function jwtAuthPass (options: JwtOptions):
Promise<(req: Request, res: Response): void>
function jwtAuthExpress (options: JwtOptions):
(req: Request, res: Response, next: Function): voidjwks
type JwksOptions = {
/**
* allows to set custom fetch function
*/
fetcher?: typeof fetch | undefined
/**
* expiry in ms, JWKS uris are cached until this expiry timeout
*/
expiresIn?: number | undefined
/**
* jwksUri by issuer (for PS, RS, ES alg JWTs)
* allows to overwrite the default jwks_uri which usually is looked-up from
* .well-known/openid-configuration
*/
jwksByIssuer?: Record<string, string> | undefined
/**
* secret by issuer (for HS JWTs)
*/
secretsByIssuer?: Record<string, string | Uint8Array> | undefined
}
/**
* issuers: provide a list of different issuers which shall be supported
*/
function jwks(issuers: string[], options: JwksOptions): Promise<GetKeyLikeFn>license
MIT licensed
