NestJS Integration Guide
Integrating SuperTokens into a NestJS backend is a bit different than the quick setup guide shows. We will add a few things:
- A module to house all authorization-related code
- A service to initialize the SDK
- A middleware to add the authorization endpoints
- A global error handler to pass SuperTokens related errors to the SDK
- A guard to protect your API endpoints
- A parameter decorator to access the session in your code
We will cover each of these in the following few sections. Then, you can do the rest of the customizations by following the "Auth Flow Customizations" section.
Please look here to see how to get started with your NestJS backend.
Installing SuperTokens
npm i -s supertokens-node
Adding a new module
You can scaffold a module using the nest CLI by running this in the root folder of the application:
nest g module auth
The result should be a new auth
folder with auth.module.ts
in it.
Add config type and injection token
Create a config.interface.ts
in the auth
folder. We will put the type and injection token for the SuperTokens configuration here.
import { AppInfo } from 'supertokens-node/types';
export const ConfigInjectionToken = 'ConfigInjectionToken';
export type AuthModuleConfig = {
appInfo: AppInfo;
connectionURI: string;
apiKey?: string;
}
Configure the Auth module
In auth.module.ts
, add the following authorization-related code:
import { Module } from '@nestjs/common';
import { SupertokensService } from './supertokens/supertokens.service';
import { MiddlewareConsumer, NestModule, DynamicModule } from '@nestjs/common';
import { AuthMiddleware } from './auth.middleware';
import { ConfigInjectionToken, AuthModuleConfig } from './config.interface';
@Module({
providers: [],
exports: [],
controllers: [],
})
export class AuthModule implements NestModule {
configure(consumer: MiddlewareConsumer) {
consumer.apply(AuthMiddleware).forRoutes('*');
}
static forRoot({
connectionURI,
apiKey,
appInfo,
}: AuthModuleConfig): DynamicModule {
return {
providers: [
{
useValue: {
appInfo,
connectionURI,
apiKey,
},
provide: ConfigInjectionToken,
},
SupertokensService,
],
exports: [],
imports: [],
module: AuthModule,
};
}
}
In the provided code sample, we convert AuthModule
to a dynamic module so we can configure parts of the SuperTokens setup within the App module. This approach allows for centralized configuration, which can be particularly beneficial when managing settings such as using distinct connection URIs for different environments, such as testing or production.
The middleware is registered using the configure
method in the AuthModule
class.
Adding the module to the application
App Info
Adjust these values based on the application that you are trying to configure. To learn more about what each field means check the references page.Update the app
module to use the dynamic module returned by the forRoot
method of the AuthModule
instead of directly importing the class itself.
// ...
import { Module } from '@nestjs/common';
import { AuthModule } from './auth/auth.module';
@Module({
imports: [
AuthModule.forRoot({
connectionURI: "<CORE_API_ENDPOINT>",
apiKey: "<YOUR_API_KEY>",
appInfo: {
appName: "<YOUR_APP_NAME>",
apiDomain: "<YOUR_API_DOMAIN>",
websiteDomain: "<YOUR_WEBSITE_DOMAIN>",
apiBasePath: "/auth",
websiteBasePath: "/auth"
},
}),
],
controllers: [/* ... */],
providers: [/* ... */],
})
export class AppModule {}
Adding a service
Run the following Nest CLI command from the root to scaffold a service:
nest g service supertokens auth
In the newly created supertokens.service.ts
file, initialize the SDK so that you can access the injected services in event handlers:
import { Inject, Injectable } from '@nestjs/common';
import supertokens from "supertokens-node";
import Session from 'supertokens-node/recipe/session';
import EmailPassword from 'supertokens-node/recipe/emailpassword';
import { ConfigInjectionToken, AuthModuleConfig } from "../config.interface";
@Injectable()
export class SupertokensService {
constructor(@Inject(ConfigInjectionToken) private config: AuthModuleConfig) {
supertokens.init({
appInfo: config.appInfo,
supertokens: {
connectionURI: config.connectionURI,
apiKey: config.apiKey,
},
recipeList: [
EmailPassword.init(),
Session.init(),
],
});
}
}
Exposing SuperTokens APIs using its middleware
The middleware file
Scaffold the middleware by running nest g middleware auth
in the application's root folder.
The result should be in the auth module, called auth.middleware.ts
.
Next, edit the file to use the middleware from SuperTokens:
import { Injectable, NestMiddleware } from '@nestjs/common';
import { middleware } from 'supertokens-node/framework/express';
@Injectable()
export class AuthMiddleware implements NestMiddleware {
supertokensMiddleware: any;
constructor() {
this.supertokensMiddleware = middleware();
}
use(req: Request, res: any, next: () => void) {
return this.supertokensMiddleware(req, res, next);
}
}
Update CORS settings
Enable and update your CORS settings in main.ts
:
import { NestFactory } from '@nestjs/core';
import supertokens from 'supertokens-node';
import { AppModule } from './app.module';
async function bootstrap() {
const app = await NestFactory.create(AppModule);
app.enableCors({
origin: ['<YOUR_WEBSITE_DOMAIN>'],
allowedHeaders: ['content-type', ...supertokens.getAllCORSHeaders()],
credentials: true,
});
await app.listen(3000);
}
bootstrap()
Add the SuperTokens error handler
We will add the SuperTokens error handler through a NestJS exception filter.
Exception filter
You can scaffold the exception filter using the CLI by running: nest g filter auth
. This will result in a new auth.filter.ts
file next to auth.module.ts
. Edit this file to add the error handler:
import { ExceptionFilter, Catch, ArgumentsHost } from '@nestjs/common';
import { Request, Response, NextFunction, ErrorRequestHandler } from 'express';
import { errorHandler } from 'supertokens-node/framework/express';
import { Error as STError } from 'supertokens-node';
@Catch(STError)
export class SupertokensExceptionFilter implements ExceptionFilter {
handler: ErrorRequestHandler;
constructor() {
this.handler = errorHandler();
}
catch(exception: Error, host: ArgumentsHost) {
const ctx = host.switchToHttp();
const resp = ctx.getResponse<Response>();
this.handler(
exception,
ctx.getRequest<Request>(),
resp,
ctx.getNext<NextFunction>(),
);
}
}
Registering the filter
We need to add this filter as a global exception filter. You can do this in main.ts
, right after the updated CORS settings.
import { NestFactory } from '@nestjs/core';
import { AppModule } from './app.module';
import supertokens from 'supertokens-node';
import { SupertokensExceptionFilter } from './auth/auth.filter';
async function bootstrap() {
const app = await NestFactory.create(AppModule);
app.enableCors({
origin: ['<YOUR_WEBSITE_DOMAIN>'],
allowedHeaders: ['content-type', ...supertokens.getAllCORSHeaders()],
credentials: true,
});
app.useGlobalFilters(new SupertokensExceptionFilter());
await app.listen(3000);
}
bootstrap();
Add a session verification guard
CAUTION
This guide only applies to scenarios which involve SuperTokens Session Access Tokens.
If you are implementing either, Unified Login or Microservice Authentication, features that make use of OAuth2 Access Tokens, please check the separate page that shows you how to verify those types of tokens.
Now that the library is set up, you can add a guard to protect your API. You can scaffold this by running: nest g guard auth
.
In the newly created auth.guard.ts
file, implement session verification:
import { CanActivate, ExecutionContext, Injectable } from '@nestjs/common';
import { getSession, VerifySessionOptions } from 'supertokens-node/recipe/session';
@Injectable()
export class AuthGuard implements CanActivate {
constructor(private readonly getSessionOptions?: VerifySessionOptions) {}
public async canActivate(context: ExecutionContext): Promise<boolean> {
const ctx = context.switchToHttp();
const req = ctx.getRequest();
const resp = ctx.getResponse();
// If the session doesn't exist and {sessionRequired: true} is passed to the AuthGuard constructor (default is true),
// getSession will throw an error, that will be handled by the exception filter, returning a 401 response.
// To avoid an error when the session doesn't exist, pass {sessionRequired: false} to the AuthGuard constructor.
// In this case, req.session will be undefined if the session doesn't exist.
const session = await getSession(req, resp, this.getSessionOptions);
req.session = session;
return true;
}
}
Add a parameter decorator
Now you can add a parameter decorator to access the already verified session in your APIs. You can generate an empty decorator by running nest g decorator session auth
. Edit session.decorator.ts
to return the session attached to the request:
import { createParamDecorator, ExecutionContext } from '@nestjs/common';
export const Session = createParamDecorator(
(data: unknown, ctx: ExecutionContext) => {
const request = ctx.switchToHttp().getRequest();
return request.session;
},
);
Combine the decorator and the guard to authenticate users
You can add a protected method into a controller (e.g., app.controller.ts
) that receives the verified session as a parameter. For example:
import { Controller, Get, UseGuards } from '@nestjs/common';
// ...
import { SessionContainer } from "supertokens-node/recipe/session";
import { AuthGuard } from './auth/auth.guard';
import { Session } from './auth/session/session.decorator';
// ...
@Controller()
export class AppController {
// ...
// Test endpoint for session verification; not part of the Supertokens setup.
@Get('/test')
@UseGuards(new AuthGuard())
getSessionInfo(
@Session() session: SessionContainer,
): Record<string, unknown> {
return {
sessionHandle: session.getHandle(),
userId: session.getUserId(),
accessTokenPayload: session.getAccessTokenPayload(),
};
}
}
You should look at the "Session Management" section to see how you can use the session object.
Setup the SuperTokens core
Are you using https://try.supertokens.com
as the connection URI in the init function?
You need to now setup an instance of the SuperTokens core for your app (that your backend should connect to). You have two options:
- Managed service
- Self hosted with your own database (With Docker or Without Docker)