2
1
mirror of https://github.com/Thream/socketio-jwt.git synced 2024-07-21 09:38:31 +02:00
Authenticate socket.io incoming connections with JWTs. https://www.npmjs.com/package/@thream/socketio-jwt
Go to file
2021-09-21 16:44:45 +02:00
.github build(deps): bump codecov/codecov-action from 2.0.2 to 2.0.3 (#197) 2021-08-27 13:06:27 +02:00
.husky chore: add semantic-release 2021-07-23 23:15:52 +02:00
src build(deps-dev): bump typescript from 4.3.5 to 4.4.2 (#201) 2021-08-27 17:18:31 +02:00
.commitlintrc.json chore: general improvements of config files 2021-02-14 19:28:15 +01:00
.editorconfig chore: initial commit 2020-12-27 17:25:44 +01:00
.gitignore chore: improve config files 2021-03-08 14:33:53 +01:00
.markdownlint.json chore: general improvements of config files 2021-02-14 19:28:15 +01:00
.npmrc chore: improve config files 2021-03-08 14:33:53 +01:00
.releaserc.json chore: add semantic-release 2021-07-23 23:15:52 +02:00
CODE_OF_CONDUCT.md chore: add semantic-release 2021-07-23 23:15:52 +02:00
CONTRIBUTING.md chore: add semantic-release 2021-07-23 23:15:52 +02:00
jest.config.json build(deps-dev): bump typescript from 4.3.5 to 4.4.2 (#201) 2021-08-27 17:18:31 +02:00
LICENSE chore: initial commit 2020-12-27 17:25:44 +01:00
package-lock.json build(deps-dev): bump axios from 0.21.1 to 0.21.4 (#209) 2021-09-21 16:44:45 +02:00
package.json build(deps-dev): bump axios from 0.21.1 to 0.21.4 (#209) 2021-09-21 16:44:45 +02:00
README.md chore: add semantic-release 2021-07-23 23:15:52 +02:00
tsconfig.json build(deps): bump jest from 26.6.3 to 27.0.6 2021-07-23 23:00:25 +02:00

Thream/socketio-jwt

Authenticate socket.io incoming connections with JWTs.

Licence MIT Contributor Covenant Dependabot badge
codecov
Conventional Commits semantic-release npm version

📜 About

Authenticate socket.io incoming connections with JWTs.

Compatible with socket.io >= 3.0.0.

This repository was originally forked from auth0-socketio-jwt & it is not intended to take any credit but to improve the code from now on.

💾 Install

npm install --save @thream/socketio-jwt

⚙️ Usage

Server side

import { Server } from 'socket.io'
import { authorize } from '@thream/socketio-jwt'

const io = new Server(9000)
io.use(
  authorize({
    secret: 'your secret or public key'
  })
)

io.on('connection', async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  const clients = await io.sockets.allSockets()
  if (clients != null) {
    for (const clientId of clients) {
      const client = io.sockets.sockets.get(clientId)
      client?.emit('messages', { message: 'Success!' })
      // we can access the jwt payload of each connected client
      console.log(client?.decodedToken)
    }
  }
})

Server side with jwks-rsa (example)

import jwksClient from 'jwks-rsa'
import { Server } from 'socket.io'
import { authorize } from '@thream/socketio-jwt'

const client = jwksClient({
  jwksUri: 'https://sandrino.auth0.com/.well-known/jwks.json'
})

const io = new Server(9000)
io.use(
  authorize({
    secret: async (decodedToken) => {
      const key = await client.getSigningKeyAsync(decodedToken.header.kid)
      return key.getPublicKey()
    }
  })
)

io.on('connection', async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  // You can do the same things of the previous example there...
})

Server side with onAuthentication (example)

import { Server } from 'socket.io'
import { authorize } from '@thream/socketio-jwt'

const io = new Server(9000)
io.use(
  authorize({
    secret: 'your secret or public key',
    onAuthentication: async decodedToken => {
      // return the object that you want to add to the user property
      // or throw an error if the token is unauthorized
    }
  })
)

io.on('connection', async (socket) => {
  // jwt payload of the connected client
  console.log(socket.decodedToken)
  // You can do the same things of the previous example there...
  // user object returned in onAuthentication
  console.log(socket.user)
})

authorize options

  • secret is a string containing the secret for HMAC algorithms, or a function that should fetch the secret or public key as shown in the example with jwks-rsa.
  • algorithms (default: HS256)
  • onAuthentication is a function that will be called with the decodedToken as a parameter after the token is authenticated. Return a value to add to the user property in the socket object.

Client side

import { io } from 'socket.io-client'

// Require Bearer Token
const socket = io('http://localhost:9000', {
  auth: { token: `Bearer ${yourJWT}` }
})

// Handling token expiration
socket.on('connect_error', (error) => {
  if (error.data.type === 'UnauthorizedError') {
    console.log('User token has expired')
  }
})

// Listening to events
socket.on('messages', (data) => {
  console.log(data)
})

💡 Contributing

Anyone can help to improve the project, submit a Feature Request, a bug report or even correct a simple spelling mistake.

The steps to contribute can be found in the CONTRIBUTING.md file.

📄 License

MIT