Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
jwt-mongo-sms
Advanced tools
If you're wondering how to implement authentication with JSON web tokens, Mongo DB, Twilio SMS, and (optionally) GraphQL, you're in the right place!
npm install jwt-mongo-sms
or
yarn add jwt-mongo-sms
(Before doing anything with this package, you'll need a Mongo database and a Twilio account with a phone number to use for SMS.)
Create an instance of JwtMongoSms
:
import JwtMongoSms from 'jwt-mongo-sms';
const {
JWT_SECRET,
MONGODB_URI,
TWILIO_ACCOUNT_SID,
TWILIO_AUTH_TOKEN,
TWILIO_SMS_PHONE_NUMBER,
} = process.env;
const jwtMongoSms = new JwtMongoSms({
jwtSecret: JWT_SECRET,
mongoUri: MONGODB_URI,
twilio: {
accountSid: TWILIO_ACCOUNT_SID,
authToken: TWILIO_AUTH_TOKEN,
phoneNumber: TWILIO_SMS_PHONE_NUMBER,
},
});
export default jwtMongoSms;
Set up REST endpoints to send and verify authentication code (for GraphQL, see Examples below):
import bodyParser from 'body-parser';
import express from 'express';
import jwtMongoSms from './jwtMongoSms'; // from wherever you instantiated JwtMongoSms
const app = express();
// Parses request body as object
app.use(bodyParser.urlencoded());
// Sample route that sends authentication code via SMS
app.post('/send-auth-code', (request, response) => {
const { phoneNumber } = request.body;
jwtMongoSms.sendAuthCode(phoneNumber);
response.end();
});
// Sample route that verifies authentication code (on success, returns a JSON web token and user data)
app.post('/verify-auth-code', async (request, response) => {
const { phoneNumber, authCode } = request.body;
const { authToken, user } = await jwtMongoSms.verifyAuthCode({ phoneNumber, authCode });
response.json({ authToken, user });
});
// Authenticates each server request by checking for a JSON web token in the "Authorization" header
app.use(jwtMongoSms.getAuthMiddleware());
// Sample authenticated route
app.get('/profile', (request, response) => {
if (request.user) {
res.status(200).send('Authenticated!');
} else {
res.status(401).send('Unauthorized!');
}
});
Once an authentication code is verified, the client will receive a JSON web token. To make authenticated requests, you will need to store this token on the client (using localStorage
, cookies, or any other preferred method) and send it via the request Authorization
header. If your JSON web token were abc123
, for instance, the header value would be JWT abc123
. (For more details, see the GraphQL example below.)
Finally, with the middleware in place, you can check request.user
in any subsequent server request to determine which user (if any) has been authenticated!
There are three required fields when instantiating a JwtMongoSms
object: jwtSecret
, mongoUri
, and twilio
. Configuring the rest is optional.
Field | Default Value | Description |
---|---|---|
jwtSecret | JSON web token secret | |
mongoUri | Mongo URI (e.g., mongodb://localhost/my-db ) | |
twilio | {} | Twilio credentials (accountSid , authToken ) and phoneNumber used to send SMS text |
setSmsMessage | (authCode => `Your authentication code is ${authCode}`) | Used to set the message for SMS authentication |
usersCollectionName | users | Name of the Mongo collection used to store user data |
authCollectionName | users | Name of the Mongo collection used to store auth data |
requestKey | user | Key your authenticated user will be assigned to on each server request |
authCodeLength | 4 | Length of authentication code |
authCodeTimeoutSeconds | 600 | Number of seconds it takes for a authentication code to expire |
decodeUserId | (userId => ObjectId.createFromHexString(userId)) | Determines the format of _id for the auth middleware user query. If your user ids are stored as strings instead of ObjectIds (e.g., Meteor), you should replace this with (userId) => userId) |
The following are methods from the JwtMongoSms
class you can use (from an instantiated object):
getAuthMiddleware() : express.Handler[]
sendAuthCode(phoneNumber: string) : Promise<boolean>
phoneNumber
with new authCode
and authCodeCreatedAt
. NOTE: By default userCollectionName
and authCollectionName
are both set to users
. That means if you don't override these settings, this method will insert a user document for you (if it doesn't already exist). To avoid this behavior, be sure to create the user document beforehand.verifyAuthCode({ phoneNumber: string, authCode: string }) : Promise<{ user: Object, authToken: string }>
user
document and a generated authToken
are returned.createAuthIndex(fieldOrSpec: string = 'phoneNumber', IndexOptions: object = { unique: true }): Promise<string>
createUsersIndex(fieldOrSpec: string = 'phoneNumber', IndexOptions: object = { unique: true }): Promise<string>
phoneNumber
for faster lookup and data integrity. See the MongoDB documentation for more info on fieldOrSpec
and options
.If you experience bugs, try upgrading to the latest version and checking the changelog. You can also post an issue on GitHub!
[2.3.3] - 2017-10-23
babel-plugin-transform-runtime
FAQs
Authentication using JSON web tokens, Mongo DB, and Twilio SMS
The npm package jwt-mongo-sms receives a total of 5 weekly downloads. As such, jwt-mongo-sms popularity was classified as not popular.
We found that jwt-mongo-sms demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.