secure-jws-session

Secure json web signature sessions with Redis

Downloads
39
Stars
4
Committers
2

Simple JWS Session handler

Generate token with HS256 (HMAC with SHA-256) symmetric algorithm
Store token in redis to double check if token is generated by our machine
Before you start to use this package you need to install Redis on your server or local machine

How to use:

npm install secure-jws-session --save

const Session = require('secure-jws-session')

const config = {
  secret: '@2e£$1#1&$23_-!', // secret key (String)
  serverHost: 'www.mdslab.org', // server hostname (String)
  time: 1 // Set time expiration in minutes (Int)
}

const auth = new Session(config)
Generate a new token passing the user ID and the user type
const token = await auth.createToken(1, 'user')
Store the new session token in redis

const session = {
  user: 1,
  token,
  exp: new Date().getTime() + 1,
  type: 'user'
}

await auth.insert(session)

const result = await auth.check(token)
Decode an existing token and check if is valid and generated by our machine:
const decoded = await auth.decodeToken(token)

Using the session handler as middleware in Koa

Attach the session handler over the Koa context

app.context.auth = auth

Create a Middleware

module.exports = function(){

  return async function(ctx, next){

    if(!ctx.request.body.token)
      return ctx.body = { isLogged : false, token: false , message: 'You must provide a token for this route' }

    let status = await ctx.auth.check(ctx.request.body.token)

    if(!status.isLogged)
      return ctx.body = { isLogged : false, token: false , message: 'You are not logged in please do the log-in again' }

    await next()
  }

}

Now you can use it in your route file

const router = require('koa-router')()
const body = require('koa-body')()
const auth = require('./authMiddleware')

router.post('/admin', body, auth(), yourProtectedFunction)

Author

Davide Polano