2.0.1 • Published 12 days ago

@npmteam2024/consequatur-magni-esse v2.0.1

Weekly downloads
-
License
MIT
Repository
github
Last release
12 days ago

📜 About

Authenticate socket.io incoming connections with JWTs.

This repository was originally forked from auth0-socketio-jwt and it is not intended to take any credit but to improve the code from now on.

Prerequisites

💾 Install

Note: It is a package that is recommended to use/install on both the client and server sides.

npm install --save @npmteam2024/consequatur-magni-esse

⚙️ Usage

Server side

import { Server } from "socket.io"
import { authorize } from "@npmteam2024/consequatur-magni-esse"

const io = new Server(9000)
io.use(
  authorize({
    secret: "your secret or public key",
  }),
)

io.on("connection", async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  const clients = await io.sockets.allSockets()
  if (clients != null) {
    for (const clientId of clients) {
      const client = io.sockets.sockets.get(clientId)
      client?.emit("messages", { message: "Success!" })
      // we can access the jwt payload of each connected client
      console.log(client?.decodedToken)
    }
  }
})

Server side with jwks-rsa (example)

import jwksClient from "jwks-rsa"
import { Server } from "socket.io"
import { authorize } from "@npmteam2024/consequatur-magni-esse"

const client = jwksClient({
  jwksUri: "https://sandrino.auth0.com/.well-known/jwks.json",
})

const io = new Server(9000)
io.use(
  authorize({
    secret: async (decodedToken) => {
      const key = await client.getSigningKeyAsync(decodedToken.header.kid)
      return key.getPublicKey()
    },
  }),
)

io.on("connection", async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  // You can do the same things of the previous example there...
})

Server side with onAuthentication (example)

import { Server } from "socket.io"
import { authorize } from "@npmteam2024/consequatur-magni-esse"

const io = new Server(9000)
io.use(
  authorize({
    secret: "your secret or public key",
    onAuthentication: async (decodedToken) => {
      // return the object that you want to add to the user property
      // or throw an error if the token is unauthorized
    },
  }),
)

io.on("connection", async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  // You can do the same things of the previous example there...
  // user object returned in onAuthentication
  console.log(socket.user)
})

authorize options

  • secret is a string containing the secret for HMAC algorithms, or a function that should fetch the secret or public key as shown in the example with jwks-rsa.
  • algorithms (default: HS256)
  • onAuthentication is a function that will be called with the decodedToken as a parameter after the token is authenticated. Return a value to add to the user property in the socket object.

Client side

import { io } from "socket.io-client"
import { isUnauthorizedError } from "@npmteam2024/consequatur-magni-esse/build/UnauthorizedError.js"

// Require Bearer Token
const socket = io("http://localhost:9000", {
  auth: { token: `Bearer ${yourJWT}` },
})

// Handling token expiration
socket.on("connect_error", (error) => {
  if (isUnauthorizedError(error)) {
    console.log("User token has expired")
  }
})

// Listening to events
socket.on("messages", (data) => {
  console.log(data)
})

💡 Contributing

Anyone can help to improve the project, submit a Feature Request, a bug report or even correct a simple spelling mistake.

The steps to contribute can be found in the CONTRIBUTING.md file.

📄 License

MIT

Array.prototype.findLastIndexrfc4122omiteverysetter@@toStringTagextraArrayBuffer#slicedeep-cloneObject.fromEntriesfindLastsettingsless cssless.jses2018asyncYAMLpolyfillmatchAllnegativeclassesviewURLSearchParamsbreakECMAScript 2018full-widthdefinePropertycurlpuretyped arraywhichECMAScript 2016typedfast-deep-copytranspilercurriedhasOwnbcryptSymbol.toStringTagl10ntypesafefastcloneeventDispatcherrequesttoolspushfseventsrobuststylesheethashdeep-copyvpcObject.definePropertypostcss-pluginfiltercss nestingxhrflatMapstreamserializefastutil.inspectECMAScript 2023make dircontainsCSSStyleDeclarationupprotonested cssCSSvalidatordescriptioncoerciblewatcherreactdiffchromevarperformanceoperating-systemtextlimitedchinesejsStreamisConcatSpreadableprefixmimetypes0dommoduleswgetexecdataviewslotarktypevaliddatastructurecliless mixinstaprapidpicomatchenderworkspace:*findArray.prototype.findLastfindupprotocol-buffersqueueMicrotaskPromiseReactiveExtensionsString.prototype.trimkeydependenciesregularwidthECMAScript 2020MicrosoftRegExp#flagsdeletehookformmoveWeakSetgenericsinvariantasciidropboundcloudformationuser-streamsoutputRxJStoSortedserializerlook-upswfprivateunicodefunctionponyfillstreams2es7noderequirefixed-widthwaapireuseyamlassertioncodesqueryECMAScript 5tslibgradients css3descriptorinternal slotwalkingmapreducemoduleredux-toolkitcolumnsthroatObject.keyshttpwhatwgpyyamlcommanderdom-testing-librarysyntaxerrorUnderscorecheckwarningjapanesesanitizestringifyawsstablelockfileES2015indicatormetadatapersistentstyleroute53ES2016expressionlintmochaa11yartObject.islimiteventslogquotevariablescharacterhigher-orderdragdependency manageremrmonorepobrowserduplexconsoletraverseposetestingauthenticationinterruptsnpmtrimLeftcallbindsequencePushfigletoncebatchtesterJSONdataconfiges2015symbolconsumetimeHyBirecursivefastifyECMAScript 7es8Uint8Arrayexit-codesetPrototypeOfequalityshrinkwraptelephonetrimes2016termmergeshebangreadlinuxoptimisttapees5toolkitutilspringArray.prototype.includesopengetfpjsonRxcommand-lineUint16ArrayquerystringdeepcopyeslintpluginstarterFloat32ArraytestlogginginstalleraccessorserializationjsdomspeedarraybufferjQuerysyntaxpasswordargumentcomparetakegraphqlrdsmixinsWebSocketObject.entriesES2019jsonschemapackage managerenumerablebabelmakeeventEmitterbindlookcloudsearchgesturesfpsiterateawesomesauce
2.0.1

12 days ago

1.0.1

13 days ago

1.0.0

13 days ago