leadout / jwt
Simple JWT authentication for Laravel.
Installs: 2 495
Dependents: 0
Suggesters: 0
Security: 0
Stars: 0
Watchers: 2
Forks: 0
Open Issues: 0
Requires
- php: ^8.2
- firebase/php-jwt: ^6.0
- illuminate/auth: ^11.0
- illuminate/cache: ^11.0
- illuminate/http: ^11.0
- illuminate/support: ^11.0
- nesbot/carbon: ^2.0
Requires (Dev)
- laravel/pint: ^1.13
- phpunit/phpunit: ^10.4
README
A lightweight JWT guard for Laravel.
Installation
Install the package through composer:
composer require leadout/jwt
The package will automatically register the authentication guard.
Configuration
Configuring the package takes place solely through the guard configuration in Laravel's native auth.php
configuration file.
The following example shows all the configuration that can be passed to the guard:
<?php return [ // ... 'guards' => [ 'my-guard' => [ 'driver' => 'jwt', 'provider' => 'users', 'key' => 'secret-key', 'public_key' => 'path_to_public_key_file', 'private_key' => 'path_to_private_key_file', 'ttl' => 60, 'claims' => [ 'key' => 'value' ] ] ] // ... ];
The provider
should be defined in the providers
array in the authentication configuration file.
The key
is used for encoding and decoding the tokens and should be kept secret.
If not using a single key
for both encoding and decoding, the public_key
and private_key
should point to the public and private keys that are used for encoding and decoding the tokens.
The ttl
value is the time-to-live for the token in minutes. This field can be omitted from the config. If omitted, the default time-to-live for tokens is set to 60 minutes.
Additional claims that should be added to all tokens issued through the guard should be added to the claims
configuration. This configuration key can be omitted.
Usage
Since the guard is purely configured through Laravel's native auth configuration, it is recommended only instantiating it through the auth manager:
$guard = auth()->guard('my-guard');
Attempting to authenticate a user
It is possible to authenticate a user given the credentials for that user. If a user cannot be authenticated with the credentials, null
is returned.
$token = auth()->guard('my-guard')->attempt(['email' => 'john@example.com', 'password' => 'hidden']]);
The attempt
method mimics the way that the native SessionGuard
attempts to authenticate users by firing the same events:
Illuminate\Auth\Events\Attempting
when starting an attempt to authenticate.Illuminate\Auth\Events\Failed
if the attempt fails.Illuminate\Auth\Events\Validated
if the attempt succeeds.
Issuing a token
$token = auth()->guard('my-guard')->issue(User::first());
When a token has been issued, it should be returned to the user. The user should then pass the token to the application as a bearer token in the Authorization header like so:
Authorization: Bearer ey...
Refreshing the token in the request
$token = auth()->guard('my-guard')->refresh();
The refreshed token will have all the claims from the original token and a fresh time-to-live.
Invalidating the token in the request
auth()->guard('my-guard')->invalidate();
When the token has been invalidated, all subsequent requests with the same token will fail.
Adding claims from the user
In addition to adding custom claims through the guard configuration, it is possible to add claims to the token from the user itself.
Simply add a getClaims()
method to the user model and return an array of claims:
<?php
use Illuminate\Foundation\Auth\User as Authenticatable;
class User extends Authenticatable
{
public function getClaims() : array
{
return [
'key' => 'value'
];
}
}