MondoKit GCP Google Auth

Utilities extending on Google Auth Library, such as middleware to validate Google JWT.

Installation

npm install @mondokit/gcp-google-auth

Components

requiresGoogleJwt Middleware

Middleware to require a valid Google JWT token, for your endpoints.

Note: @mondokit libs all require ESM. If your project still uses CommonJS, then you can continue using our previous incarnation, gae-js, until you can make the upgrade.

Find the source code at gcp-google-auth on GitHub.

An example can be found in the Example Pub/Sub JWT.

This middleware will always verify:

  • An Authorization header is present with a Bearer <token> value
  • The <token> component is a valid token according to Google Auth Library
  • The following claims:
    • email_verified is true
    • iss is "https://accounts.google.com"

Simplest usage

// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt());

// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));

It is recommended that you also verify the email matches the identity you expect of the signer (e.g. a service account email).

// Apply middleware however you normally would
app.use("/pubsub", requiresGoogleJwt({
   email: "your-service-account@your-project.iam.gserviceaccount.com"
}));

// Now any matching routes will be protected
app.post("/pubsub/start-job", (req, res) => res.send("OK"));
app.post("/pubsub/poll-status", (req, res) => res.send("OK"));

Note: The email property also supports an array of values if your endpoints should be one of a set of allowed emails.

If you care about the audience property you can also specify this property as a single value or an array.

By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment to false.

requiresIapJwt Middleware

Middleware to require a valid Google Identity Aware Proxy (IAP) signed header.

This middleware will verify:

  • A header value for x-goog-iap-jwt-assertion is present
  • The value is a valid, signed header as outlined here: https://cloud.google.com/iap/docs/samples/iap-validate-jwt#iap_validate_jwt-nodejs

Simplest usage:

// Apply middleware however you normally would
app.use("/protected", requiresIapJwt({
   audience: "projects/1234/apps/my-protected-app" // replace with your app's audience
}));

// Now any matching routes will be protected
app.post("/protected/start-job", (req, res) => res.send("OK"));
app.post("/protected/poll-status", (req, res) => res.send("OK"));

By default, this middleware will be disabled if run in an environment outside of GCP (local testing, for example). If you would like to override this behaviour, you can set disableForNonGcpEnvironment to false.