basewd/laravel-password-exposed-validation-rule

Laravel validation rule that checks if a password has been exposed in a data breach

Installs: 2

Dependents: 0

Suggesters: 0

Security: 0

pkg:composer/basewd/laravel-password-exposed-validation-rule

v2.6.0 2023-09-27 20:20 UTC

README

This package provides a Laravel validation rule that checks if a password has been exposed in a data breach. It uses the haveibeenpwned.com passwords API via the divineomega/password_exposed library.

Travis CI Coverage Status

<a href="https://styleci.io/repos/131214375"><img src="https://styleci.io/repos/131214375/shield?branch=master" alt="StyleCI"></a>
<a href="https://packagist.org/packages/divineomega/laravel-password-exposed-validation-rule/stats"><img src="https://img.shields.io/packagist/dt/divineomega/laravel-password-exposed-validation-rule.svg"/></a>

Installation

To install, just run the following Composer command.

composer require divineomega/laravel-password-exposed-validation-rule

Please note that this package requires Laravel 5.1 or above.

Usage

The following code snippet shows an example of how to use the password exposed validation rule.

use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed;

$request->validate([
    'password' => ['required', new PasswordExposed()],
]);

If you wish, you can also set a custom validation message, as shown below.

use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed;

$request->validate([
    'password' => ['required', (new PasswordExposed())->setMessage('This password is not secure.')],
]);