GAE JS GOOGLE AUTH

Replaced with MondoKit: We are excited to announce the next generation of GAE JS. Our ESM-only set of libraries, migrated from GAE JS and rebranded as MondoKit.

You can see a Migration guide from GAE JS to help you move to the new libraries. Many changes are simple search/replace.

We will continue to add minor fixes and patches to this library as required.

Find MondoKit on GitHub.

Utilities extending on Google Auth Library, such as middleware to validate Google JWT.

Installation

npm install @mondomob/gae-js-google-auth

Components

requiresGoogleJwt Middleware

Middleware to require a valid Google JWT token, for your endpoints.

An example can be found in the Example Pub/Sub JWT.

This middleware will always verify:

  • An Authorization header is present with a Bearer <token> value
  • The <token> component is a valid token according to Google Auth Library
  • The following claims:
    • email_verified is true
    • iss is "https://accounts.google.com"

Simplest usage

// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt());

// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));

It is recommended that you also verify the email matches the identity you expect of the signer (e.g. a service account email).

// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt({
   email: "your-service-account@your-project.iam.gserviceaccount.com"
}));

// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));

Note: The email property also supports an array of values if your endpoints should be one of a set of allowed emails.

If you care about the audience property you can also specify this property as a single value or an array.

By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment to false.

requiresIapJwt Middleware

Middleware to require a valid Google Identity Aware Proxy (IAP) signed header.

This middleware will verify:

  • A header value for x-goog-iap-jwt-assertion is present
  • The value is a valid, signed header as outlined here: https://cloud.google.com/iap/docs/samples/iap-validate-jwt#iap_validate_jwt-nodejs

Simplest usage:

// Apply middleware however you normally would
app.use("/protected", requiresIapJwt({
   audience: "projects/1234/apps/my-protected-app" // replace with your app's audience
}));

// Now any matching routes will be protected
app.post("/protected/start-job", (req, res) => res.send("OK"));
app.post("/protected/poll-status", (req, res) => res.send("OK"));

By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment to false.