auth-nodejs-cloudbase

tencentcloudbase/skills · updated Apr 8, 2026

$npx skills add https://github.com/tencentcloudbase/skills --skill auth-nodejs-cloudbase
0 commentsdiscussion
summary

Server-side identity and user lookup for CloudBase Node.js backends and cloud functions.

  • Retrieve caller identity ( uid , customUserId , openId ) in cloud functions using getUserInfo() for authorization and personalization decisions.
  • Query CloudBase user profiles by uid or login identifier (phone, email, username, custom ID) using getEndUserInfo() and queryUserInfo() .
  • Issue custom login tickets from Node backends to bridge existing user systems into CloudBase without requiring separ
skill.md

Activation Contract

Use this first when

  • Node.js code in cloud functions or backend services must read caller identity, look up users, or issue custom login tickets.
  • The backend responsibility is auth / identity, not provider setup or frontend login UI.

Read before writing code if

  • The task mentions @cloudbase/node-sdk, server-side auth, custom login tickets, or "who is calling".
  • The request mixes frontend login with backend identity logic; split the flow and route client-side work elsewhere.

Then also read

  • Provider setup / publishable key -> ../auth-tool/SKILL.md
  • Web login UI that consumes custom tickets -> ../auth-web/SKILL.md
  • Raw HTTP auth client -> ../http-api/SKILL.md

Do NOT use for

  • Provider enable/disable or login console configuration.
  • Frontend login / sign-up UI.
  • Mini program native auth.

Common mistakes / gotchas

  • Using this skill as the entry point for every auth request.
  • Mixing provider-management work with Node-side identity code.
  • Reaching for raw HTTP examples when Node SDK already covers the job.

When to use this skill

Use this skill whenever the task involves server-side authentication or identity in a CloudBase project, and the code is running in Node.js, for example:

  • CloudBase 云函数 (Node runtime) that needs to know who is calling
  • Node services that use CloudBase Node SDK to look up user information
  • Backends that issue custom login tickets for Web / mobile clients
  • Admin or ops tools that need to inspect CloudBase end-user profiles

Do NOT use this skill for:

  • Frontend Web login / sign-up flows using @cloudbase/js-sdk (handle those with the auth-web skill, not this Node skill).
  • Direct HTTP auth API integrations (this skill does not describe raw HTTP endpoints; use the http-api skill instead).
  • Database or storage operations that do not involve identity (use database/storage docs or skills).

When the user request mixes frontend and backend concerns (e.g. "build a web login page and a Node API that knows the user"), treat them separately:

  • Use Web-side auth docs/skills for client login and UX.
  • Use this Node Auth skill for how the backend sees and uses the authenticated user.

How to use this skill (for a coding agent)

When you load this skill to work on a task:

  1. Clarify the runtime and responsibility

    Ask the user:

    • Where does this Node code run?
      • CloudBase 云函数
      • Long‑running Node service using CloudBase
    • What do they need from auth?
      • Just the caller identity for authorization?
      • Look up arbitrary users by UID / login identifier?
      • Bridge their own user system into CloudBase via custom login?
  2. Confirm CloudBase environment and SDK

    • Ask for:
      • env – CloudBase environment ID
    • Install the latest @cloudbase/node-sdk from npm if it is not already available.
    • Always initialize the SDK using this pattern (values can change, shape must not):
    import tcb from "@cloudbase/node-sdk";
    
    const app = tcb.init({ env: "your-env-id" });
    const auth = app.auth();
    
  3. Pick the relevant scenario from this file

    • For caller identity inside a function, use the getUserInfo scenarios.
    • For full user profile or admin lookup, use the getEndUserInfo and queryUserInfo scenarios.
    • For client systems that already have their own users, use the custom login ticket scenarios built on createTicket.
    • For logging / security, use the getClientIP scenario.
  4. Follow Node SDK API shapes exactly

    • Treat all auth.* methods and parameter shapes in this file as canonical.
    • You may change variable names and framework (e.g. Express vs 云函数 handler), but do not change SDK method names or parameter fields.
    • If you see a method in older code that is not listed here or in the Node SDK docs mirror, treat it as suspect and avoid using it.
  5. If you are unsure about an API

    • Consult the official CloudBase Auth Node SDK documentation.
    • Only use methods and shapes that appear in the official documentation.
    • If you cannot find an API you want:
      • Prefer composing flows from the documented methods, or
      • Explain that this skill only covers Node SDK auth, and suggest using the relevant CloudBase Web or HTTP auth documentation for client-side or raw-HTTP flows.

Node auth architecture – how Node fits into CloudBase Auth

CloudBase Auth v2 separates where users log in from where backend code runs:

  • Users log in through the supported auth methods (anonymous, username/password, SMS, email, WeChat, custom login, etc.) using client SDKs or HTTP interfaces, as described in the official CloudBase Auth overview documentation.
  • Once logged in, CloudBase attaches the user identity and tokens to the environment.
  • Node code then reads that identity using the Node SDK, or bridges external identities into CloudBase using custom login.

In practice, Node code usually does one or more of:

  1. Identify the current caller

    • In 云函数, use auth.getUserInfo() to read uid, openId, and customUserId.
    • Use this identity for authorization decisions, logging, and personalisation.
  2. Look up other users

    • Use auth.getEndUserInfo(uid) when you know the CloudBase uid.
    • Use auth.queryUserInfo({ platform, platformId, uid? }) when you only have login identifiers such as phone, email, username, or a custom ID.
  3. Issue custom login tickets

    • When you already have your own user system, your Node backend can call auth.createTicket(customUserId, options) and return the ticket to a trusted client.
    • The client (typically Web) then uses this ticket with the Web SDK to log the user into CloudBase without forcing them to sign up again.
  4. Log client IP for security

    • In 云函数, auth.getClientIP() returns the caller IP, which you can use for audit logs, anomaly detection, or access control.

The scenarios later in this file turn these responsibilities into explicit, copy‑pasteable patterns.


Node Auth APIs covered by this skill

This skill covers the following auth methods on the CloudBase Node SDK. Treat these method signatures as the only supported entry points for Node auth flows when using this skill:

  • getUserInfo(): IGetUserInfoResult Returns { openId, appId, uid, customUserId } for the current caller.

  • getEndUserInfo(uid?: string, opts?: ICustomReqOpts): Promise<{ userInfo: EndUserInfo; requestId?: string }> Returns detailed CloudBase end‑user profile for a given uid or for the current caller (when uid is omitted).

  • queryUserInfo(query: IUserInfoQuery, opts?: ICustomReqOpts): Promise<{ userInfo: EndUserInfo; requestId?: string }> Finds a user by login identifier (platform + platformId) or uid.

  • getClientIP(): string Returns the caller’s IP address when running in a supported environment (e.g. 云函数).

  • createTicket(customUserId: string, options?: ICreateTicketOpts): string Creates a custom login ticket for the given customUserId that clients can exchange for a CloudBase login.

The exact field names and allowed values for EndUserInfo, IUserInfoQuery, and ICreateTicketOpts are defined by the official CloudBase Node SDK typings and documentation. When writing Node code, do not guess shapes; follow the SDK types and the examples in this file.


Scenarios – Node auth patterns

Scenario 1: Initialize Node SDK and auth in a CloudBase function

Use this when writing a CloudBase 云函数 that needs to interact with Auth:

import tcb from "@cloudbase/node-sdk";

const app = tcb.init({ env: "your-env-id" });
const auth = app.auth();

exports.main = async (event, context) => {
  // Your logic here
};

Key points:

  • Use the same env as configured for the function’s CloudBase 环境.
  • Avoid hardcoding sensitive values; prefer environment variables or function configuration.

Scenario 2: Get caller identity in a CloudBase function

Use this when you need to know who is calling your cloud function:

import tcb from "@cloudbase/node-sdk";

const app = tcb.init({ env: "your-env-id" });
const auth = app.auth();

exports.main = async (event, context) => {
  const { openId, appId, uid, customUserId } = auth.getUserInfo();

  console.log("Caller identity", { openId, appId, uid, customUserId });

  // Use uid / customUserId for authorization decisions
  // e.g. check roles, permissions, or data ownership
};

Best practices:

  • Treat uid as the canonical CloudBase user identifier.
  • Use customUserId only when you have enabled 自定义登录 and mapped your own users.
  • Never trust openId/appId alone for authorization; they are WeChat‑specific identifiers.

Scenario 3: Get full end‑user profile by UID

Use this when you know a user’s CloudBase uid (for example, from a database record) and you need detailed profile information:

import tcb from "@cloudbase/node-sdk";

const app = tcb.init({ env: "your-env-id" });
const auth = app.auth();

exports.main = async (event, context) => {
  const uid = "user-uid";

  try {
    const { userInfo } = await auth.getEndUserInfo(uid);
    console.log("User profile", userInfo);
  } catch (error) {
    console.error("Failed to get end user info", error.message);
  }
};

Best practices:

  • Call getEndUserInfo from trusted backend code only; do not expose it directly to untrusted clients.
  • Log minimal necessary data for debugging; avoid logging full profiles in production.

Scenario 4: Get full profile for the current caller

Use this when you want the current caller’s full profile without manually passing uid:

import tcb from "@cloudbase/node-sdk";

const app = tcb.init({ env: "your-env-id" });
const auth = app.auth();

exports.main = async (event, context) => {
  try {
    const { userInfo } = await auth.getEndUserInfo();
    console.log("Current caller profile", userInfo);
  } catch (error) {
    console.error("Failed to get current caller profile", error.message);
  }
};

This relies on the environment providing the caller’s identity (e.g. within a CloudBase 云函数). If called where no caller context exists, refer to the official docs and handle errors gracefully.

Scenario 5: Query user by login identifier

Discussion

Product Hunt–style comments (not star reviews)
  • No comments yet — start the thread.
general reviews

Ratings

4.728 reviews
  • Xiao Tandon· Dec 16, 2024

    Useful defaults in auth-nodejs-cloudbase — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.

  • Sofia Abebe· Nov 7, 2024

    auth-nodejs-cloudbase is among the better-maintained entries we tried; worth keeping pinned for repeat workflows.

  • Min Shah· Oct 26, 2024

    auth-nodejs-cloudbase reduced setup friction for our internal harness; good balance of opinion and flexibility.

  • Omar Verma· Sep 25, 2024

    Keeps context tight: auth-nodejs-cloudbase is the kind of skill you can hand to a new teammate without a long onboarding doc.

  • Liam Khan· Sep 9, 2024

    I recommend auth-nodejs-cloudbase for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.

  • Olivia Ghosh· Aug 28, 2024

    Solid pick for teams standardizing on skills: auth-nodejs-cloudbase is focused, and the summary matches what you get after install.

  • Chaitanya Patil· Aug 24, 2024

    auth-nodejs-cloudbase has been reliable in day-to-day use. Documentation quality is above average for community skills.

  • Omar Robinson· Aug 16, 2024

    We added auth-nodejs-cloudbase from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.

  • Piyush G· Jul 15, 2024

    Keeps context tight: auth-nodejs-cloudbase is the kind of skill you can hand to a new teammate without a long onboarding doc.

  • Olivia Robinson· Jul 7, 2024

    auth-nodejs-cloudbase fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.

showing 1-10 of 28

1 / 3