magentron / laravel-password-exposed-validation-rule
Laravel validation rule that checks if a password has been exposed in a data breach (forked from dilneiss/laravel-password-exposed-validation-rule)
3.2
2025-01-22 17:11 UTC
Requires
- php: ^7.1||^8.0||8.1||8.2
- illuminate/contracts: ^5.1||^6.0||^7.0||^8.0||^9.0||^10.0||^11.0
- magentron/password_exposed: ^3.2.2
- symfony/cache: ^6.4
Requires (Dev)
- php-coveralls/php-coveralls: ^2.0
- phpunit/phpunit: ^9
- vimeo/psalm: ^4
README
(forked from dilneiss/laravel-password-exposed-validation-rule)
🔒 Laravel Password Exposed Validation Rule
This package provides a Laravel validation rule that checks if a password has been exposed in a data breach. It uses the haveibeenpwned.com passwords API via the magentron/password_exposed
library.
Installation
To install, just run the following Composer command.
composer require magentron/laravel-password-exposed-validation-rule
Please note that this package requires Laravel 5.1 or above.
Usage
The following code snippet shows an example of how to use the password exposed validation rule.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', new PasswordExposed()], ]);
If you wish, you can also set a custom validation message, as shown below.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', (new PasswordExposed())->setMessage('This password is not secure.')], ]);