dilneiss / laravel-password-exposed-validation-rule
Laravel validation rule that checks if a password has been exposed in a data breach
3.1
2024-05-29 13:01 UTC
Requires
- php: ^7.1||^8.0||8.1||8.2
- divineomega/password_exposed: ^3.2.0
- illuminate/contracts: ^5.1||^6.0||^7.0||^8.0||^9.0||^10.0||^11.0
Requires (Dev)
- php-coveralls/php-coveralls: ^2.0
- phpunit/phpunit: ^7.0||^8.0||^9.0
This package is auto-updated.
Last update: 2024-10-29 13:57:11 UTC
README
This package provides a Laravel validation rule that checks if a password has been exposed in a data breach. It uses the haveibeenpwned.com passwords API via the divineomega/password_exposed
library.
Installation
To install, just run the following Composer command.
composer require divineomega/laravel-password-exposed-validation-rule
Please note that this package requires Laravel 5.1 or above.
Usage
The following code snippet shows an example of how to use the password exposed validation rule.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', new PasswordExposed()], ]);
If you wish, you can also set a custom validation message, as shown below.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', (new PasswordExposed())->setMessage('This password is not secure.')], ]);