New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

gate-guard

Package Overview
Dependencies
Maintainers
1
Versions
5
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

gate-guard

A configurable lightweight ExpressJs middleware for jsonwebtoken to validate tokens sent as cookies instead of headers.

latest
Source
npmnpm
Version
2.0.5
Version published
Maintainers
1
Created
Source

gate-guard logo

gate-guard

Lightweight and configurable ExpressJS middleware to decode and verify jsonwebtoken JWTs that are sent via cookies.

Let the gate-guard protect your resources by deciding what calls make it through or not.

Installation

Requires Node 8 or later

npm i --save gate-guard
# or 
yarn add gate-guard

Minimum Setup

This example will protect all routes listed after the middleware behind the jwt verification.

import gateGuard from 'gate-guard';

// jwtSecret must match the secret used to sign the jwt 
app.use(gateGuard({ jwtSecret: 'shh' }))

// Routes here

Configurations

OptionDefault ValueRequiredDescription
jwtSecretundefinedYesThe secret/cert that was used to sign/encode the JWT
whitelist[]OptionalAllow certain endpoints or endpoint groups to bypass jwt checking. Example registration, login, forgot password. Simply calls next() if req.path is whitelisted. Supports globbing patterns via picomatch.
missingTokenErrorStatus401OptionalHTTP status returned when the key for the jwt is missing from cookies.
missingTokenErrorMessage'Missing token.'OptionalMessage to show when there is no cookie containing the JWT present at all.
verifyTokenErrorStatus403OptionalHTTP status returned when the provided JWT failed to verify.
verifyTokenErrorMessage'Invalid jwt.'OptionalHTTP Message returned when the provided JWT failed to verify.
cookieName'token'OptionalThe key where the JWT can be found within the req.cookies object.
jwtVerifyOptions{}OptionalPass-through for native configs of the jwt.verify method

Examples

Basic whitelist usage

app.use(gateGuard({
  jwtSecret,
  whitelist: [
    '/api/registration/verify',
    '/api/registration/create/account',
    '/api/registration/create/profile',
  ]
}));

Whitelist multiple routes with globs

Supports globbing via the picomatch library

// The same example above can be written as
app.use(gateGuard({
  jwtSecret,
  whitelist: ['/api/registration/**']
}));

// All common glob patterns supported
app.use(gateGuard({
  jwtSecret,
  whitelist: [
    '/api/*/create/account',
    '/api/**/profile/*',
  ]
}));

// Note on matching
app.use(gateGuard({
  jwtSecret,
  // This will whitelist any sub-routes of /api/registration/
  // But the base route /api/registration itself will not be whitelisted
  whitelist: ['/api/registration/**']
}));

Keywords

express

FAQs

Package last updated on 25 Oct 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts