Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
svelte-kit-sessions
Advanced tools
Svelte Kit Sessions is a module for easy and efficient session management in SvelteKit.
$ npm i svelte-kit-sessions
$ yarn add svelte-kit-sessions
$ pnpm add svelte-kit-sessions
// src/hooks.server.ts
import type { Handle } from '@sveltejs/kit';
import { sveltekitSessionHandle } from 'svelte-kit-sessions';
export const handle: Handle = sveltekitSessionHandle({ secret: 'secret' });
or if you want to use it with your own handle, you can use sequence.
// src/hooks.server.ts
import type { Handle } from '@sveltejs/kit';
import { sequence } from '@sveltejs/kit/hooks';
import { sveltekitSessionHandle } from 'svelte-kit-sessions';
const yourOwnHandle: Handle = async ({ event, resolve }) => {
// `event.locals.session` is available
// your code here
const result = await resolve(event);
return result;
};
export const handle: Handle = sequence(sveltekitSessionHandle({ secret: 'secret' }), yourOwnHandle);
After the above implementation, you can use the following in Actions and API routes.
// src/routes/login/+page.server.ts
import type { ServerLoad, Actions } from '@sveltejs/kit';
import db from '$lib/server/db.ts';
export const load: ServerLoad = async ({ locals }) => {
const { session } = locals; // you can access `locals.session`
const user = await db.getUserFromId(session.data.userId);
return { user };
};
export const actions: Actions = {
login: async ({ request, locals }) => {
const { session } = locals; // you can access `locals.session`
const data = await request.formData();
const email = data.get('email');
const password = data.get('password');
const user = await db.getUser(email, password);
await session.setData({ userId: user.id, name: user.name }); // set data to session
await session.save(); // session saveand session create(session data is stored and set-cookie)
return { success: true };
},
...
};
// src/routes/api/todo/+server.ts
import { json, type RequestEvent, type RequestHandler } from '@sveltejs/kit';
import db from '$lib/server/db.ts';
interface TodoBody {
title: string;
memo: string;
}
export const POST: RequestHandler = async (event: RequestEvent) => {
const { session } = locals; // you can access `locals.session`
const { title, memo } = (await event.request.json()) as TodoBody;
const todoId = await db.createTodo({ title, memo, userId: session.data.userId });
return json({ id: todoId }, { status: 200 });
};
You can use declaration merging to define types as follows.
// src/hooks.server.ts
declare module 'svelte-kit-sessions' {
interface SessionData {
userId: string;
name: string;
}
}
// src/hooks.server.js
import { sveltekitSessionHandle } from 'svelte-kit-sessions';
export const handle = sveltekitSessionHandle({ secret: 'secret' });
or if you want to use it with your own handle, you can use sequence.
// src/hooks.server.js
import { sequence } from '@sveltejs/kit/hooks';
import { sveltekitSessionHandle } from 'svelte-kit-sessions';
const yourOwnHandle = async ({ event, resolve }) => {
// `event.locals.session` is available
// your code here
const result = await resolve(event);
return result;
};
export const handle = sequence(sveltekitSessionHandle({ secret: 'secret' }), yourOwnHandle);
import { sveltekitSessionHandle } from 'svelte-kit-sessions';
sveltekitSessionHandle(options);
Create a server hooks handle with the given options
. This allows access to event.locals.session
in hooks handles, Actions and API route.
Note Session data is not saved in the cookie itself, just the session ID. Session data is stored server-side.
Warning The default server-side session storage, MemoryStore
, is purposely
not designed for a production environment. It will leak memory under most
conditions, does not scale past a single process, and is meant for debugging and
developing.
For a list of stores, see Compatible Session Stores.
A summary of the event.locals.session
class methods is as follows.
Name | Arguments | Return | Description |
---|---|---|---|
setData | 1. data (SessionData) | Promise<void> | Set data in the session. |
save | nothing | Promise<void> | Save the session (save session to store) and set cookie. |
regenerate | nothing | Promise<void> | Regenerate the session simply invoke the method. |
destroy | nothing | Promise<void> | Destroy the session. |
Set data in the session.
Note If saveUninitialized
is true
, the session is saved without calling save()
.
Conversely, if saveUninitialized
is false
, call save()
to explicitly save the session.
SessionData
.Promise<void>
Save the session (save session to store) and set cookie.
nothing
Promise<void>
Regenerate the session simply invoke the method. Once complete, a new Session and Session
instance will be initialized.
nothing
Promise<void>
Destroy the session.
nothing
Promise<void>
A summary of the event.locals.session
class fields is as follows.
Name | Type | Description |
---|---|---|
id | string | Session ID. |
cookieName | string | Session cookie name. The value of options.name . |
cookie | CookieSerializeOptions & { path: string } | Session cookie options. The value of options.cookie . |
data | SessionData | Session data. Data stored in the session can be referenced from this property. |
store | Store | Session store instance. If you want to manipulate the store directly, you can use this store property. |
A summary of the options
is as follows.
Name | Type | required/optional | Description |
---|---|---|---|
name | string | optional | The name of the session ID cookie to set in the response. The default value is 'connect.sid'. |
cookie | CookieSerializeOptions | optional | Cookie settings object. See link for details. |
rolling | boolean | optional | Force the session identifier cookie to be set on every response. The default value is false . If cookie.maxAge is not set, this option is ignored. |
store | Store | optional | The session store instance. The default value is new MemoryStore instance. |
secret | string | required | This is the secret used to sign the session cookie. |
saveUninitialized | boolean | optional | Forces a session that is "uninitialized" to be saved to the store. A session is uninitialized when it is new but not modified. The default value is false . |
The name of the session ID cookie to set in the response (and read from in the request). The default value is 'connect.sid'.
Note If you have multiple apps running on the same hostname (this is just the name, i.e. localhost
or 127.0.0.1
; different schemes and ports do not name a different hostname), then you need to separate the session cookies from each other. The simplest method is to simply set different names per app.
Cookie settings object. Exactly the same options that can be specified in cookie.serialize
of the cookie npm package.
Note The default value of the cookie matches the behavior of SvelteKit. For more details, please check https://kit.svelte.dev/docs/types#public-types-cookies. However, for the cookie.path
, it is implemented so that /
is set on the Svelte Kit Sessions side.
The following are options that can be set in this object.
Specifies the value for the [Domain
Set-Cookie
attribute][rfc-6265-5.2.3]. By default, no domain is set, and most clients will consider the cookie to apply to only the current domain.
Specifies a function that will be used to encode a cookie's value. Since value of a cookie has a limited character set (and must be a simple string), this function can be used to encode a value into a string suited for a cookie's value.
The default function is the global encodeURIComponent
, which will encode a JavaScript string into UTF-8 byte sequences and then URL-encode any that fall outside of the cookie range.
Specifies the Date
object to be the value for the [Expires
Set-Cookie
attribute][rfc-6265-5.2.1]. By default, no expiration is set, and most clients will consider this a "non-persistent cookie" and will delete it on a condition like exiting a web browser application.
Note the [cookie storage model specification][rfc-6265-5.3] states that if both expires
and maxAge
are set, then maxAge
takes precedence, but it is possible not all clients by obey this, so if both are set, they should point to the same date and time.
Specifies the boolean
value for the [HttpOnly
Set-Cookie
attribute][rfc-6265-5.2.6]. When truthy, the HttpOnly
attribute is set, otherwise it is not. By default, the HttpOnly
attribute is not set.
Note be careful when setting this to true
, as compliant clients will not allow client-side JavaScript to see the cookie in document.cookie
.
Specifies the number
(in seconds) to be the value for the [Max-Age
Set-Cookie
attribute][rfc-6265-5.2.2]. The given number will be converted to an integer by rounding down. By default, no maximum age is set.
Note the [cookie storage model specification][rfc-6265-5.3] states that if both expires
and maxAge
are set, then maxAge
takes precedence, but it is possible not all clients by obey this, so if both are set, they should point to the same date and time.
Specifies the boolean
value for the Partitioned
Set-Cookie
attribute. When truthy, the Partitioned
attribute is set, otherwise it is not. By default, the Partitioned
attribute is not set.
Note This is an attribute that has not yet been fully standardized, and may change in the future. This also means many clients may ignore this attribute until they understand it.
More information about can be found in the proposal.
Specifies the value for the [Path
Set-Cookie
attribute][rfc-6265-5.2.4]. By default, the path is considered the ["default path"][rfc-6265-5.1.4].
Specifies the string
to be the value for the [Priority
Set-Cookie
attribute][rfc-west-cookie-priority-00-4.1].
'low'
will set the Priority
attribute to Low
.'medium'
will set the Priority
attribute to Medium
, the default priority when not set.'high'
will set the Priority
attribute to High
.More information about the different priority levels can be found in [the specification][rfc-west-cookie-priority-00-4.1].
Note This is an attribute that has not yet been fully standardized, and may change in the future. This also means many clients may ignore this attribute until they understand it.
Specifies the boolean
or string
to be the value for the [SameSite
Set-Cookie
attribute][rfc-6265bis-09-5.4.7].
true
will set the SameSite
attribute to Strict
for strict same site enforcement.false
will not set the SameSite
attribute.'lax'
will set the SameSite
attribute to Lax
for lax same site enforcement.'none'
will set the SameSite
attribute to None
for an explicit cross-site cookie.'strict'
will set the SameSite
attribute to Strict
for strict same site enforcement.More information about the different enforcement levels can be found in [the specification][rfc-6265bis-09-5.4.7].
Note This is an attribute that has not yet been fully standardized, and may change in the future. This also means many clients may ignore this attribute until they understand it.
Specifies the boolean
value for the [Secure
Set-Cookie
attribute][rfc-6265-5.2.5]. When truthy, the Secure
attribute is set, otherwise it is not. By default, the Secure
attribute is not set.
note be careful when setting this to true
, as compliant clients will not send the cookie back to the server in the future if the browser does not have an HTTPS connection.
Force the session identifier cookie to be set on every response. The expiration is reset to the original maxAge
, resetting the expiration countdown. The default value is false
. If cookie.maxAge
is not set, this option is ignored.
With this enabled, the session identifier cookie will expire in maxAge
since the last response was sent instead of in maxAge
since the session was last modified by the server.
This is typically used in conjuction with short, non-session-length maxAge
values to provide a quick timeout of the session data
with reduced potential of it occurring during on going server interactions.
Note When this option is set to true
but the saveUninitialized
option is set to false
, the cookie will not be set on a response with an uninitialized session.
This option only modifies the behavior when an existing session was loaded for the request.
The session store instance. The default value is new MemoryStore
instance.
Note See the chapter Session Store Implementation for more information on the store.
This is the secret used to sign the session cookie. The secret itself should be not easily parsed by a human and would best be a random set of characters.
Best practices may include:
Using a secret that cannot be guessed will reduce the ability to hijack a session to only guessing the session ID.
Changing the secret value will invalidate all existing sessions.
Forces a session that is "uninitialized" to be saved to the store. A session is uninitialized when it is new but not modified. The default value is false
.
Choosing false
is useful for implementing login sessions, reducing server storage usage, or complying with laws that require permission before setting a cookie. Choosing false
will also help with race conditions where a client makes multiple parallel requests without a session.
Every session store must be implement specific methods.
method | Arguments | Description |
---|---|---|
get | 1. id (string) : session ID | Returns JSON data stored in the store. |
set | 1. id (string) : session ID 2. storeData (SessionStoreData) : JSON data to be stored in the store 3. ttl (number) : ttl milliseconds calculated from cookie options expires, maxAge(if neither is set, the ttl value passed will be Infinity) | Stores JSON data in the store. |
destroy | 1. id (string) : session ID | Deletes a session from the store. |
touch | 1. id (string) : session ID 2. ttl (number) : ttl milliseconds calculated from cookie options expires, maxAge(if neither is set, the ttl value passed will be Infinity) | Update expiration with ttl. |
/**
* Session store interface.
* When implementing a custom store, implement it so that it has the following methods.
*
* MemoryStore would be helpful.
* @see MemoryStore
*/
interface Store {
/**
* Returns JSON data stored in the store.
* @param id The session ID
* @returns JSON data stored in the store
*/
get(id: string): Promise<SessionStoreData | null>;
/**
* Stores JSON data in the store.
* @param id The session ID
* @param storeData JSON data to store
* @param ttl Time to live in milliseconds. This ttl is calculated with a priority of maxAge > expires,
* which is useful for store implementation. If no maxAge and expires, ttl is *Infinity*.
* But can also be calculated independently in the store by referring to the `storeData.cookie`.
*
* @returns Promise fulfilled with undefined
*/
set(id: string, storeData: SessionStoreData, ttl: number): Promise<void>;
/**
* Deletes a session from the store.
* @param id The session ID
* @returns Promise fulfilled with undefined
*/
destroy(id: string): Promise<void>;
/**
* Update expiration with ttl.
* @param id The session ID
* @param ttl Time to live in milliseconds.
* @returns Promise fulfilled with undefined
*/
touch(id: string, ttl: number): Promise<void>;
}
For an example implementation view the MemoryStore.
Currently under development and no stores available at this time. You can implement your own store by referring to the chapter Session Store Implementation.
We're open to all community contributions! If you'd like to contribute in any way, please first read our Contributing Guide.
FAQs
User-friendly session management module for SvelteKit. Effortlessly integrate efficient session handling into your projects. Session is stored in the store (ex. Redis, Cloudflare KV, etc.), not in a cookie.
The npm package svelte-kit-sessions receives a total of 255 weekly downloads. As such, svelte-kit-sessions popularity was classified as not popular.
We found that svelte-kit-sessions demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.