Tutorials
Session in production
Sessions work out of the box for developing, but they need a bit of extra work to be ready for production.
Secret
The first thing to change is adding a session secret as an environment variable in .env
for your machine:
SECRET=your-random-string-here
This will be used to secure the cookies as well as for other plugins that need a secret. Make it unique, long and random. Then don't forget to add a different one for the production server and other stages in your deploy pipeline if any. Also, exclude the .env
file from Git as explained here.
Storage
By default sessions work in-memory with server so they are not ready for production:
// Simple visit counter for the main page
const counter = get('/', ctx => {
ctx.session.views = (ctx.session.views || 0) + 1;
return { views: ctx.session.views };
});
/* test */
await run(counter).alive(async api => {
let res = await api.get('/');
expect(res.body.views).toBe(1);
res = await api.get('/');
expect(res.body.views).toBe(2);
res = await api.get('/');
expect(res.body.views).toBe(3);
});
This works great for testing; for quick demos and for short sessions, but all session data will die when the server is restarted since they are stored in the RAM.
To make them persistent we recommend using a compatible session store. We bundle Redis for Node.js by default, so you just have to install it (*nix systems have it easily available). For example, on Ubuntu:
sudo apt install redis-server
Then edit your .env
to include REDIS_URL
:
SECRET=your-random-string-here
REDIS_URL=redis://:password@hostname:port/db_number
Note: for Heroku this variable is created automatically when adding the appropriate add-on. For other hosting companies please consult their documentation.
Otherwise add your preferred store to the session through the options:
const server = require('server');
// Your own file for the config:
const store = require('./session-store.js');
server({ session: { store } }, [
// Routes here
]);
Alternatives
Why not just use cookie-session? Here is an explanation of the alternative, but it boils down to:
- They are more insecure, since all the session data (including sensitive data) is passed forward and backward from the browser to the server in each request.
- If the session data is large then that means adding an unnecessary load to both the server and the browser.
Keep reading
Subscribe to our Mailchimp list to receive more tutorials when released:
Get Great Tutorials