GAE JS GOOGLE AUTH
Replaced with MondoKit: We are excited to announce the next generation of GAE JS. Our
ESM-only
set of libraries, migrated from GAE JS and rebranded as MondoKit.You can see a Migration guide from GAE JS to help you move to the new libraries. Many changes are simple search/replace.
We will continue to add minor fixes and patches to this library as required.
Find MondoKit on GitHub.
Utilities extending on Google Auth Library, such as middleware to validate Google JWT.
Installation
npm install @mondomob/gae-js-google-auth
Components
requiresGoogleJwt Middleware
Middleware to require a valid Google JWT token, for your endpoints.
An example can be found in the Example Pub/Sub JWT.
This middleware will always verify:
- An
Authorization
header is present with aBearer <token>
value - The
<token>
component is a valid token according to Google Auth Library - The following claims:
email_verified
istrue
iss
is"https://accounts.google.com"
Simplest usage
// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt());
// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));
It is recommended that you also verify the email
matches the identity you expect of the signer (e.g. a service account email).
// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt({
email: "your-service-account@your-project.iam.gserviceaccount.com"
}));
// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));
Note: The email
property also supports an array of values if your endpoints should be one of a set of allowed emails.
If you care about the audience
property you can also specify this property as a single value or an array.
By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment
to false
.
requiresIapJwt Middleware
Middleware to require a valid Google Identity Aware Proxy (IAP) signed header.
This middleware will verify:
- A header value for
x-goog-iap-jwt-assertion
is present - The value is a valid, signed header as outlined here: https://cloud.google.com/iap/docs/samples/iap-validate-jwt#iap_validate_jwt-nodejs
Simplest usage:
// Apply middleware however you normally would
app.use("/protected", requiresIapJwt({
audience: "projects/1234/apps/my-protected-app" // replace with your app's audience
}));
// Now any matching routes will be protected
app.post("/protected/start-job", (req, res) => res.send("OK"));
app.post("/protected/poll-status", (req, res) => res.send("OK"));
By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment
to false
.