babicaja / jwt-4laravel
This is a Laravel package which provides all the means for a super easy JWT implementation
Requires
- php: ^7.3
- ext-json: *
- illuminate/support: ^5.8
Requires (Dev)
- nunomaduro/phpinsights: ^1.2
- orchestra/testbench: ^3.5
- phpunit/phpunit: ^8.1
This package is auto-updated.
Last update: 2024-10-23 02:09:27 UTC
README
This is a Laravel package which provides all the means for a super easy JWT implementation
Installation
Make sure you include this package as part of your Laravel project. You can do so by running the composer command from below.
composer require babicaja/jwt-4laravel
Getting started
First register the service provider with the artisan vendor:publish
command. This will ensure all the bindings are in place and it will copy the default configuration file to your app's config folder.
php artisan vendor:publish // Choose JWT4L\Providers\JWTServiceProvider from the list
Inspect the newly created config/jwt.php
file. For now, you can leave it as it is (don't forget to change the secret
key for production). Details about the configuration are covered in this section.
Now everything is in place and you can start using the JWT for Laravel's functionality. Easiest way to see it in actions is using the Token
Facade provided by the package, and through artisan tinker
. If you are able to see a similar output as the one below, you are all set.
php artisan tinker Psy Shell v0.9.9 (PHP 7.3.6-1+ubuntu18.04.1+deb.sury.org+1 — cli) by Justin Hileman >>> Token::create() => "eyJ0eXAiOiJKV1QiLCJhbGciOiJzaGEyNTYifQ==.eyJpYXQiOiIyMDE5LTA3LTAyVDE1OjAyOjQ5LjkzMTQwMloiLCJleHAiOiIyMDE5LTA3LTAyVDE1OjE3OjQ5LjkzMTQ2M1oifQ==.fa0f19c3a2a444d72bb58feb54227677e52c65e35f3db21b31673520ddb16c86"
Configuration
Out of the box the configuration file comes with default values which you can use as they are. You should probably change the secret
for any production code. You can set the values directly in the config/jwt.php
file or preferably by setting the appropriate .env
values.
config/jwt.php
<?php return [ 'algorithm' => env('JWT_ALG', 'sha256'), //hash_hmac_algos() 'expires' => env('JWT_EXP', 15), // minutes 'secret' => env('JWT_KEY', 'secret'), 'checks' => [ \JWT4L\Checks\Structure::class, \JWT4L\Checks\Signature::class, \JWT4L\Checks\Expired::class ] ];
-
Algorithm
This value can be any of the algorithms from PHP's
hash_hmac_algos()
. The algorithm defined here is used for signing and comparing the JWT signature. -
Expires
When creating a new Token, by default an
exp
claim is added to thePayload
section. The amount of minutes defined here will set the expire date from the moment of creation. -
Secret
This value is used in conjunction with the defined
algorithm
for signing and comparing the JWT signature. -
Checks
You should add your custom checks here or choose which one of the defaults you want to use. It's strongly recommended to use the default ones, but you are free to do as you wish.
Usage
There are a few ways to use the JWT for Laravel package:
-
Token Facade
Combines the functionality of the
\JWT4L\Token\Generator
,JWT4L\Token\Validator
and\JWT4L\Token\Parser
Token Managers. This allows the user to create, validate and parse the JWT through one interface anywhere in the application.Example of Token Facade usage
$token = Token::create() // create a JWT $payload = Token::payload($token) // retrieve the Payload section from the JWT
-
Token Managers
There are three Token Managers:
\JWT4L\Token\Generator
is responsible for JWT creationJWT4L\Token\Validator
validates the provided JWT against theChecks
\JWT4L\Token\Parser
does the parsing of JWT
All of the Token Managers are bound to Laravel's Service Container which allows you to inject them into constructors or method calls.
Example of Token Manager usage
<?php namespace App\Http\Controllers; class TokenController extends Controller { public function generate(\JWT4L\Token\Generator $generator) { return response($generator->create()); } }
-
JWTGuard
The package provides a custom Guard called
JWTGuard
. Laravel'sAuth
will be automatically extended with this Guard but you need to manually configure it in theconfig/auth.php
config/auth.php
'guards' => [ 'web' => [ 'driver' => 'session', 'provider' => 'users', ], 'api' => [ 'driver' => 'token', 'provider' => 'users', 'hash' => false, ], 'jwt' => [ 'driver' => 'jwt', 'provider' => 'users', ], ],
Now you can assign this guard to any route using the
auth:jwt
middleware.Example of a route protected by the JWTGuard
Route::middleware('auth:jwt')->post('/user', function (Request $request) { return $request->user(); });
One important note regarding the
JWTGuard
implementation. The Guard will try to extract the user identifier from thesub
(payload) claim of the provided token, so you should make sure that the logic responsible for token creation sets this claim as in the example bellow.Example of setting a custom claim
Token::withPayload(['sub'=>'user-identifier'])->create();
Checks
The package provides three JWT checks out of the box:
\JWT4L\Checks\Structure
verifies the expectedheader.payload.signature
structure\JWT4L\Checks\Signature
validates the hashed signature\JWT4L\Checks\Expired
checks has the token expired
You can define your custom check by creating a class which implements the \JWT4L\Checks\CheckContract
interface and include it in the config/jwt.php
file.
app/Checks/Friday.php
<?php namespace app\Checks; use Carbon\Carbon; use JWT4L\Checks\CheckContract; class Friday implements CheckContract { /** * Do necessary checks and throw a specific exception if conditions are not met. * * @param string $token * @return void * @throws mixed */ public function validate(string $token) { if (!Carbon::now()->isFriday()) throw new \Exception("It's not Friday"); } }
config/jwt.php
<?php return [ 'algorithm' => env('JWT_ALG', 'sha256'), //hash_hmac_algos() 'expires' => env('JWT_EXP', 15), // minutes 'secret' => env('JWT_KEY', 'secret'), 'checks' => [ \JWT4L\Checks\Structure::class, \JWT4L\Checks\Signature::class, \JWT4L\Checks\Expired::class, \App\Checks\Friday::class ] ];
Contributing
Contributors:
You are more than welcome to contribute to this project. The main goal is to keep it simple because there are more than enough libraries with advance features. To take your work into consideration please create a Pull Request along the following guidelines:
# What's the purpose of this PR?
(Insert the description of the purpose of this change here)
# Impact Analysis
(What will this possibly affect?)
# Where should the tester start?
(Hints tips or tricks regarding how to test this, things to watch out for, etc)
# Any background context you want to provide?
(e.g. was this driven from expirience )
# What are the relevant tickets?
(Is this related to a ticket/bug at the moment?)
Don't forget to write unit tests! All contributors will be listed.