Sessions with MySQL
Users will use a session token linked to a session instead of the ID directly. The session ID will be the SHA-256 hash of the token. SHA-256 is a one-way hash function. This ensures that even if the database contents were leaked, the attacker won't be able retrieve valid tokens.
Declare your schema
Create a session table with a field for a text ID, user ID, and expiration.
CREATE TABLE user (
id INT PRIMARY KEY AUTO_INCREMENT,
username VARCHAR(255) NOT NULL UNIQUE
);
CREATE TABLE user_session (
id VARCHAR(255) NOT NULL PRIMARY KEY,
user_id INT NOT NULL REFERENCES user(id),
expires_at DATETIME NOT NULL
);
Install dependencies
This page uses Oslo for various operations to support a wide range of runtimes. Oslo packages are fully-typed, lightweight, and has minimal dependencies. These packages are optional and can be replaced by runtime built-ins.
npm i @oslojs/encoding @oslojs/crypto
Create your API
Here's what our API will look like. What each method does should be pretty self explanatory.
If you just need the code full code without the explanation, skip to the end of this section.
import { db } from "./db.js";
export function generateSessionToken(): string {
// TODO
}
export async function createSession(token: string, userId: number): Promise<Session> {
// TODO
}
export async function validateSessionToken(token: string): Promise<SessionValidationResult> {
// TODO
}
export async function invalidateSession(sessionId: string): Promise<void> {
// TODO
}
export type SessionValidationResult =
| { session: Session; user: User }
| { session: null; user: null };
export interface Session {
id: string;
userId: number;
expiresAt: Date;
}
export interface User {
id: number;
}
The session token should be a random string. We recommend generating at least 20 random bytes from a secure source (DO NOT USE Math.random()
) and encoding it with base32. You can use any encoding schemes, but base32 is case insensitive unlike base64 and only uses alphanumeric letters while being more compact than hex encoding.
The example uses the Web Crypto API for generating random bytes, which is available in most modern runtimes. If your runtime doesn't support it, similar runtime-specific alternatives are available. Do not use user-land RNGs.
crypto.randomBytes()
for older versions of Node.js.expo-random
for Expo.react-native-get-random-bytes
for React Native.
import { encodeBase32LowerCaseNoPadding } from "@oslojs/encoding";
// ...
export function generateSessionToken(): string {
const bytes = new Uint8Array(20);
crypto.getRandomValues(bytes);
const token = encodeBase32LowerCaseNoPadding(bytes);
return token;
}
You can use UUID v4 here but the RFC does not mandate that IDs are generated using a secure random source. Do not use libraries that are not clear on the source they use. Do not use other UUID versions as they do not offer the same entropy size as v4. Consider using
Crypto.randomUUID()
.
The session ID will be SHA-256 hash of the token. We'll set the expiration to 30 days.
import { db } from "./db.js";
import { encodeBase32LowerCaseNoPadding, encodeHexLowerCase } from "@oslojs/encoding";
import { sha256 } from "@oslojs/crypto/sha2";
// ...
export async function createSession(token: string, userId: number): Promise<Session> {
const sessionId = encodeHexLowerCase(sha256(new TextEncoder().encode(token)));
const session: Session = {
id: sessionId,
userId,
expiresAt: new Date(Date.now() + 1000 * 60 * 60 * 24 * 30)
};
await db.execute(
"INSERT INTO user_session (id, user_id, expires_at) VALUES (?, ?, ?)",
session.id,
session.userId,
session.expiresAt
);
return session;
}
Sessions are validated in 2 steps:
- Does the session exist in your database?
- Is it still within expiration?
We'll also extend the session expiration when it's close to expiration. This ensures active sessions are persisted, while inactive ones will eventually expire. We'll handle this by checking if there's less than 15 days (half of the 30 day expiration) before expiration.
For convenience, we'll return both the session and user object tied to the session ID.
import { db } from "./db.js";
import { encodeBase32LowerCaseNoPadding, encodeHexLowerCase } from "@oslojs/encoding";
import { sha256 } from "@oslojs/crypto/sha2";
// ...
export async function validateSessionToken(token: string): Promise<SessionValidationResult> {
const sessionId = encodeHexLowerCase(sha256(new TextEncoder().encode(token)));
const row = await db.queryOne(
"SELECT user_session.id, user_session.user_id, user_session.expires_at, user.id FROM user_session INNER JOIN user ON user.id = user_session.user_id WHERE id = ?",
sessionId
);
if (row === null) {
return { session: null, user: null };
}
const session: Session = {
id: row[0],
userId: row[1],
expiresAt: row[2]
};
const user: User = {
id: row[3]
};
if (Date.now() >= session.expiresAt.getTime()) {
await db.execute("DELETE FROM user_session WHERE id = ?", session.id);
return { session: null, user: null };
}
if (Date.now() >= session.expiresAt.getTime() - 1000 * 60 * 60 * 24 * 15) {
session.expiresAt = new Date(Date.now() + 1000 * 60 * 60 * 24 * 30);
await db.execute(
"UPDATE user_session SET expires_at = ? WHERE id = ?",
session.expiresAt,
session.id
);
}
return { session, user };
}
Finally, invalidate sessions by simply deleting it from the database.
import { db } from "./db.js";
// ...
export async function invalidateSession(sessionId: string): Promise<void> {
await db.execute("DELETE FROM user_session WHERE id = ?", sessionId);
}
Here's the full code:
import { db } from "./db.js";
import { encodeBase32LowerCaseNoPadding, encodeHexLowerCase } from "@oslojs/encoding";
import { sha256 } from "@oslojs/crypto/sha2";
export function generateSessionToken(): string {
const bytes = new Uint8Array(20);
crypto.getRandomValues(bytes);
const token = encodeBase32LowerCaseNoPadding(bytes);
return token;
}
export async function createSession(token: string, userId: number): Promise<Session> {
const sessionId = encodeHexLowerCase(sha256(new TextEncoder().encode(token)));
const session: Session = {
id: sessionId,
userId,
expiresAt: new Date(Date.now() + 1000 * 60 * 60 * 24 * 30)
};
await db.execute(
"INSERT INTO user_session (id, user_id, expires_at) VALUES (?, ?, ?)",
session.id,
session.userId,
session.expiresAt
);
return session;
}
export async function validateSessionToken(token: string): Promise<SessionValidationResult> {
const sessionId = encodeHexLowerCase(sha256(new TextEncoder().encode(token)));
const row = await db.queryOne(
"SELECT user_session.id, user_session.user_id, user_session.expires_at, user.id FROM user_session INNER JOIN user ON user.id = user_session.user_id WHERE id = ?",
sessionId
);
if (row === null) {
return { session: null, user: null };
}
const session: Session = {
id: row[0],
userId: row[1],
expiresAt: row[2]
};
const user: User = {
id: row[3]
};
if (Date.now() >= session.expiresAt.getTime()) {
await db.execute("DELETE FROM user_session WHERE id = ?", session.id);
return { session: null, user: null };
}
if (Date.now() >= session.expiresAt.getTime() - 1000 * 60 * 60 * 24 * 15) {
session.expiresAt = new Date(Date.now() + 1000 * 60 * 60 * 24 * 30);
await db.execute(
"UPDATE user_session SET expires_at = ? WHERE id = ?",
session.expiresAt,
session.id
);
}
return { session, user };
}
export async function invalidateSession(sessionId: string): Promise<void> {
await db.execute("DELETE FROM user_session WHERE id = ?", sessionId);
}
export type SessionValidationResult =
| { session: Session; user: User }
| { session: null; user: null };
export interface Session {
id: string;
userId: number;
expiresAt: Date;
}
export interface User {
id: number;
}
Using your API
When a user signs in, generate a session token with generateSessionToken()
and create a session linked to it with createSession()
. The token is provided to the user client.
import { generateSessionToken, createSession } from "./session.js";
const token = generateSessionToken();
const session = createSession(token, userId);
setSessionTokenCookie(token);
Validate a user-provided token with validateSessionToken()
.
import { validateSessionToken } from "./session.js";
const token = cookies.get("session");
if (token !== null) {
const { session, user } = validateSessionToken(token);
}
To learn how to store the token on the client, see the Session cookies page.