Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add networkless path for isAuthenticated #183

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

sujayakar
Copy link

Following Clerk's lead, add an optional environment variable that lets developers configure Next to not require hitting Convex for validating its token.

Verification is a little more permissive than https://github.com/get-convex/convex-backend/blob/main/crates/authentication/src/lib.rs#L188 but I think it's okay to not check that the issuer and audience match. We can add both of these checks via another environment variable if needed.

Question: Should I add this verification to the methods like convexAuthNextjsToken that pull out the token from cookies? I think it's fine to only check when we're making a decision (i.e. isAuthenticated) but I'm curious what y'all think.

Copy link

vercel bot commented Mar 20, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Updated (UTC)
convex-auth-docs ✅ Ready (Inspect) Visit Preview Mar 20, 2025 2:51am

Copy link
Contributor

@sshader sshader left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add docs too? Otherwise seems good.

Re: skipping the check when getting to token -- it's possible that someone does something like const isAuthenticated = (await convexAuthNextJsToken()) !== null and is sad. But I think the common case will be to feed the token into a function that will throw / return nothing if the token is invalid.

// First, try using the JWKS from the environment variable to do token
// verification locally (networkless mode).
try {
const envJwks = process.env.CONVEX_AUTH_JWKS
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was going to ask if this is possible to configure via an argument in the provider or middleware, but I think the answer is "no" since these get wrapped in things that are imported directly.

const envJwks = process.env.CONVEX_AUTH_JWKS
if (envJwks) {
const jwkSet = createLocalJWKSet(JSON.parse(envJwks))
const verifiedToken = await jwtVerify(token, jwkSet);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we put this + the JSON.parse in a try/catch (idk if jwtVerify can throw, but JSON.parse definitely can)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also I forget whether we should be checking the expiration time of this token here? I believe previously this would return false for expired tokens

return !!verifiedToken.payload.sub;
}
} catch (error: any) {
console.error("Error verifying token", error);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
console.error("Error verifying token", error);
console.error("Error verifying token using process.env.CONVEX_AUTH_JWKS", error);

(we could also say something like "make sure this matches the value set in your Convex JWKS environment variable")

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants