Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
jwt-mongo-sms
Advanced tools
If you're wondering how to implement authentication with JSON web tokens, Mongo DB, Twilio SMS, and (optionally) GraphQL, you're in the right place!
npm install jwt-mongo-sms
or
yarn add jwt-mongo-sms
Create an instance of JwtMongoSms
:
import JwtMongoSms from 'jwt-mongo-sms';
const {
JWT_SECRET,
MONGODB_URI,
TWILIO_ACCOUNT_SID,
TWILIO_AUTH_TOKEN,
TWILIO_SMS_PHONE_NUMBER,
} = process.env;
const jwtMongoSms = new JwtMongoSms({
jwtSecret: JWT_SECRET,
mongoUri: MONGODB_URI,
twilio: {
accountSid: TWILIO_ACCOUNT_SID,
authToken: TWILIO_AUTH_TOKEN,
phoneNumber: TWILIO_SMS_PHONE_NUMBER,
},
});
export default jwtMongoSms;
Add the middleware to your server:
import express from 'express';
import jwtMongoSms from './jwtMongoSms';
const server = express();
server.use(jwtMongoSms.getMiddleware());
With the middleware you can check request.user
in each request to determine which user (if any) has been authenticated!
Sample login resolvers:
const sendLoginCode = async (obj, { phoneNumber }) => {
await jwtMongoSms.sendLoginCode(phoneNumber);
return true;
};
const verifyLoginCode = async (obj, { phoneNumber, loginCode }) => {
const { user, authToken } = await jwtMongoSms.verifyLoginCode({ phoneNumber, loginCode });
return { user, authToken };
};
Setting context for resolvers that require authentication:
server.use('/graphql', bodyParser.json(), graphqlExpress((request) => ({
schema,
context: {
user: request.user, // Configure this key with "requestKey" (defaults to "user")
},
})));
Sample query resolver with authentication:
const guardedResolver = (obj, args, { user }) => {
if (!user) { // If empty, the user was not authenticated
throw new GraphQLError('Unauthorized');
}
return SensitiveUserData.findOne({ userId: user._id });
};
There are three required fields when instantiating a JwtMongoSms
object: jwtSecret
, mongoUri
, and twilio
. Configuring the rest is optional.
Field | Default Value | Description |
---|---|---|
jwtSecret | JSON web token secret | |
mongoUri | Mongo URI (e.g., mongodb://localhost/my-db ) | |
twilio | {} | Twilio credentials (accountSid , authToken ) and phoneNumber used to send SMS text |
setSmsMessage | (code => `Your login code is ${code}`) | Function used to set the SMS message for login |
usersCollectionName | users | Name of the Mongo collection used to store user data |
authCollectionName | users | Name of the Mongo collection used to store auth data |
requestKey | user | Key your authenticated user will be assigned to on each server request |
loginCodeLength | 4 | Length of login code |
loginCodeTimeoutSeconds | 600 | Number of seconds it takes for a login code to expire |
There are three methods from the JwtMongoSms
class you should use:
getMiddleware() : express.Handler[]
sendLoginCode(phoneNumber: string) : Promise<void>
phoneNumber
with new loginCode
and loginCreatedAt
. By default JwtMongoSms
uses the same collection for user data as it does for auth data. That means this method will create your user document for you if it doesn't already exist. To avoid this behavior, be sure to create your user document beforehand.verifyLoginCode({ phoneNumber: string, loginCode: string }) : Promise<{ user: Object, authToken: string }>
user
document and a generated authToken
are returned.FAQs
Authentication using JSON web tokens, Mongo DB, and Twilio SMS
The npm package jwt-mongo-sms receives a total of 5 weekly downloads. As such, jwt-mongo-sms popularity was classified as not popular.
We found that jwt-mongo-sms demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.