NestJS Fastify JWKS 验证
我正在使用Nestjs应用程序中的快速适配器,并希望添加一些逻辑进行JWKS验证,类似于 auth0网站。
// src/authz/jwt.strategy.ts
import { Injectable } from '@nestjs/common';
import { PassportStrategy } from '@nestjs/passport';
import { ExtractJwt, Strategy } from 'passport-jwt';
import { passportJwtSecret } from 'jwks-rsa';
import * as dotenv from 'dotenv';
dotenv.config();
@Injectable()
export class JwtStrategy extends PassportStrategy(Strategy) {
constructor() {
super({
secretOrKeyProvider: passportJwtSecret({
cache: true,
rateLimit: true,
jwksRequestsPerMinute: 5,
jwksUri: `${process.env.AUTH0_ISSUER_URL}.well-known/jwks.json`,
}),
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
audience: process.env.AUTH0_AUDIENCE,
issuer: `${process.env.AUTH0_ISSUER_URL}`,
algorithms: ['RS256'],
});
}
validate(payload: unknown): unknown {
return payload;
}
}
我的理解是,护照只能与Express合作,并且不会与Fastify一起使用。有人知道如何使用Fastify和Nestjs做这样的事情吗?
I am using the Fastify Adapter in my NestJS application and would like to add some logic to do JWKS validation, similar to the passport example on the Auth0 website.
// src/authz/jwt.strategy.ts
import { Injectable } from '@nestjs/common';
import { PassportStrategy } from '@nestjs/passport';
import { ExtractJwt, Strategy } from 'passport-jwt';
import { passportJwtSecret } from 'jwks-rsa';
import * as dotenv from 'dotenv';
dotenv.config();
@Injectable()
export class JwtStrategy extends PassportStrategy(Strategy) {
constructor() {
super({
secretOrKeyProvider: passportJwtSecret({
cache: true,
rateLimit: true,
jwksRequestsPerMinute: 5,
jwksUri: `${process.env.AUTH0_ISSUER_URL}.well-known/jwks.json`,
}),
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
audience: process.env.AUTH0_AUDIENCE,
issuer: `${process.env.AUTH0_ISSUER_URL}`,
algorithms: ['RS256'],
});
}
validate(payload: unknown): unknown {
return payload;
}
}
It is my understanding that Passport only works with Express and will not work with Fastify. Does anyone know how to do something like this with Fastify and NestJS ?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
我没有找到像 Passport 这样的库来使用 fastify 进行 JWKS 验证。我决定使用 jsonwebtoken 和 @types/jsonwebtoken 库。
下面是我的解决方案示例,供其他感兴趣的人使用:)
文件结构如下:
jwks 响应的模型
客户端调用 jwks 端点并处理响应
包含调用 jwks 端点并使用公钥验证 jwt 令牌的逻辑的服务。
JWT 令牌将由标头、有效负载和签名组成。
标头还应该有一个 Kid 字段,该字段将与 json Web 密钥之一的 Kid 相匹配,以便您知道使用哪个密钥来验证您的令牌。
x5c 数组包含一个证书链,该数组的第一个元素将始终包含用于获取公钥以验证令牌的证书。
注意:我必须用
\n-----BEGIN CERTIFICATE-----\n${key.x5c[0]}\n-----END CERTIFICATE--- 包装证书--
能够创建公钥,但您可能不必在实现中执行此操作。您还需要添加逻辑来验证 JWT 的声明。
我还将有效的 JWT 缓存了一段时间,以确保不需要每次都进行验证,因为这会对性能产生影响,该缓存的密钥使用身份验证令牌来确保它是唯一的。
警卫验证 JWT
包含 jwks 配置的模块
redis 缓存模块,包含 redis 缓存配置
使用 JwtAuthGuard 的控制器
包含整个应用程序配置的模块
I didn't manage to find a library like passport to do the JWKS validation with fastify. I decided to write my own validation using the jsonwebtoken and the @types/jsonwebtoken libraries.
Below is a sample of my solution for anybody else that is interested :)
File structure is as follows:
models for the jwks response
client to call the jwks endpoint and process the response
service containing logic to call jwks endpoint and verify the jwt token with the public key.
The JWT token will consist of a header, payload and a signature.
The header should also have a kid field that will match the kid of one of the json web keys, so that you know which one to verify your token with.
The x5c array contains a certificate chain and the first element of this array will always contain the certificate that you use to get the public key from to verify the token.
Note: I had to wrap the certificate in with
\n-----BEGIN CERTIFICATE-----\n${key.x5c[0]}\n-----END CERTIFICATE-----
to be able to create the public key but you may not have to do this in your implementation.You will also need to add logic to verify the claims for your JWT.
I have also cached a valid JWT for a period of time to ensure that the verification is not required each time as this would have performance implications, the key for this cache uses the auth token to ensure that it is unique.
guard to verify the JWT
module containing config for jwks
redis caching module containing config for redis cache
controller that uses the JwtAuthGuard
module containing configuration for whole app