Workbox plugin for firebase auth
This is a simple plugin for workbox strategies which adds an Authorization: Bearer
header with the return value from firebase.User.getIdToken(true)
to the Request if a firebase User is authenticated (i.e. firebase.auth.Auth.onAuthStateChanged()
returns a firebase.User
).
CAUTION: Be aware that request authorization happens before the response is passed to the caching strategy.
Please plan accordingly (e.g. a cache first strategy might serve authorized content to non authorized users).
Usage
Module
Use the module if you are building your service worker using a bundler.
-
Add the dependency:
npm i workbox-firebase-auth // or yarn add workbox-firebase-auth -
Import the initialization helper and use it to initialize firebase in the service worker.
Import the plugin and use it for your strategies.Example:
;;;// `firebase` is now available in worker scopefirebasefirebase;
CDN
If you are using workbox-sw to import workbox, you can use the unpkg CDN to import the plugin.
It will then be available under the global variable WorkboxFirebaseAuth
.
Example:
WorkboxFirebaseAuth // `firebase` is now available in worker scopefirebasefirebase workboxrouting
initializeFirebase
options
If your service worker is hosted firebase hosting, associated with the firebase app you use to authorize users, you don't have to specify any options (the helper will load the firebase SDK from reserved URLs).
Otherwise the config
parameter is REQUIRED.
config
Type: object
Required: If your service worker is NOT hosted on firebase hosting or if you use a different app to authorize users.
The firebase config object from the app that you use to authorize your users.
version
Type: string
(Firebase version)
Default: 7.19.1
This option can be used to specify the firebase version to use.
services
Type: string[]
Default: []
This option can be use to load additional firebase services.
Available services are: (see: Reserved URLs)
'auth'
(always included)'analytics'
'firestore'
'functions'
'messaging'
'storage'
'performance'
'database'
'config'
Plugin
options
awaitResponse
Type: boolean
Default: false
If true the plugin will await the fetch to go through and check if the response has a 401 status before attaching the authorization and resending the request.
Note: Please make sure your server responds to unauthorized requests with a 401 status code, so that the plugin can correctly identify authorization failures.
constraints
This key can be used to specify additional constraints on top of the route matcher.
constraints.types
Type: string | string[]
Default: ['*']
This can be used to authorize only requests that accept certain types of responses (e.g. application/json
)
Note: This simply matches the entries from the
Accept
request header against the passed array/string.
Group matching is supported (e.g.text/*
will matchtext/html
,text/plain
andtext/csv
)
constraints.https
Type: boolean
Default: false
Only allow requests to secure origins (https://
or localhost
) to be authorized.
constraints.sameOrigin
Type: boolean
Default: true
Only allow requests to the same origin as the service worker to be authorized.
constraints.ignorePaths
Type: (string | RegExp)[]
Default: []
Paths to ignore when authorizing requests.
Note: Checks against the pathname of the request (e.g.
/api/some-resource
)
If the argument is astring
a request will be ignored if the pathname starts with thatstring
.
If the argument is aRegExp
a request will be ignored if the pathname matches theRegExp
.