ody / auth
Authentication component for ODY framework
Requires
- php: >=8.3
- firebase/php-jwt: ^v6.1.0
- ody/container: ^0.1.0
- ody/foundation: ^0.1.0
Requires (Dev)
- mockery/mockery: ^1.4
- phpunit/phpunit: ^9.6
This package is auto-updated.
Last update: 2025-03-25 16:44:02 UTC
README
Overview
The authentication system provides a flexible JWT-based authentication solution for the Ody Framework. It supports both direct authentication (within the application) and remote authentication (via a centralized auth service), allowing applications to choose the approach that best fits their architecture.
Core Components
AuthProviderInterface
This interface defines the contract that all authentication providers must implement, ensuring consistent behavior regardless of the provider used.
interface AuthProviderInterface { public function authenticate(string $email, string $password); public function validateToken(string $token); public function refreshToken(string $refreshToken); public function getUser($id); public function revokeToken(string $token); public function getJwtKey(): string; public function generateTokens(array $user): array; }
AuthManager
The AuthManager
serves as the main entry point for authentication operations in your application. It delegates to the
configured provider for the actual implementation.
class AuthManager { public function __construct(AuthProviderInterface $provider); public function login(string $email, string $password); public function validateToken(string $token); public function refreshToken(string $refreshToken); public function logout(string $token); public function getUser($id); }
DirectAuthProvider
Handles authentication within the application, using a local user repository.
class DirectAuthProvider implements AuthProviderInterface { public function __construct($userRepository, string $jwtKey, int $tokenExpiry = 3600, int $refreshTokenExpiry = 2592000); // Implements all methods from AuthProviderInterface }
RemoteAuthProvider
Communicates with a centralized authentication service, ideal for microservice architectures.
class RemoteAuthProvider implements AuthProviderInterface { public function __construct(string $authServiceHost, int $authServicePort, string $serviceId, string $serviceSecret); // Implements all methods from AuthProviderInterface }
AuthFactory
The AuthFactory
simplifies provider creation based on configuration.
class AuthFactory { public static function createFromConfig(array $config); public static function createDirectProvider($userRepository, string $jwtKey, int $tokenExpiry = 3600, int $refreshTokenExpiry = 2592000); public static function createRemoteProvider(string $authServiceHost, int $authServicePort, string $serviceId, string $serviceSecret); }
AuthMiddleware
PSR-15 compatible middleware that protects routes by validating JWT tokens.
Authentication Flow
Login Process
- The user submits credentials (email/email and password)
AuthManager::login()
calls the provider'sauthenticate()
method- If authentication succeeds, tokens are generated using
generateTokens()
- The user object and tokens are returned to the client
Token Validation
- Client includes JWT token in the Authorization header
AuthMiddleware
extracts the token and validates it usingAuthManager::validateToken()
- If valid, the user is attached to the request and the request continues
- If invalid, an unauthorized response is returned
Token Refresh
- Client sends a refresh token to the refresh endpoint
AuthManager::refreshToken()
validates the refresh token- If valid, new access and refresh tokens are generated and returned
Logout
- Client sends the access token to the logout endpoint
AuthManager::logout()
revokes the token through the provider'srevokeToken()
method
Configuration
The auth system can be configured in config/auth.php
:
return [ 'driver' => [ 'provider' => env('AUTH_PROVIDER', 'direct'), 'jwt_key' => env('JWT_SECRET_KEY', 'your_secret_key'), 'token_expiry' => 3600, // 1 hour 'refresh_token_expiry' => 86400 * 30, // 30 days // Remote auth service config 'service_host' => env('AUTH_SERVICE_HOST', 'localhost'), 'service_port' => env('AUTH_SERVICE_PORT', 9501), 'service_id' => env('SERVICE_ID', 'api_service'), 'service_secret' => env('SERVICE_SECRET', 'service_secret') ], 'middleware' => [ 'auth' => \Ody\Auth\Middleware\AuthMiddleware::class, ], ];
User Repository Implementation
The DirectAuthProvider
requires a user repository that implements:
class UserRepository { public function findByEmail(string $email); public function findById($id); public function storeRefreshToken($userId, $token); public function validateRefreshToken($refreshToken); public function isTokenRevoked($token); }
Auth Service Provider
The Auth Service Provider integrates the authentication system with the Ody Framework:
class AuthServiceProvider extends ServiceProvider { public function register(): void { // Register auth components } public function boot(): void { // Register middleware } }
Route Protection
Routes can be protected using the auth middleware:
// Protected route Route::get('/protected', 'SomeController@method')->middleware('auth'); // Protected route group Route::group(['middleware' => ['auth']], function ($router) { $router->get('/users', 'UserController@index'); $router->get('/profile', 'UserController@profile'); });
Error Handling
The authentication system handles these error scenarios:
- Invalid credentials: Returns 401 Unauthorized
- Invalid/expired tokens: Returns 401 Unauthorized
- Missing tokens: Returns 401 Unauthorized
- Invalid refresh tokens: Returns 401 Unauthorized
Security Considerations
The authentication system implements these security best practices:
- Passwords are never returned in user objects
- JWT tokens have configurable expiration times
- Refresh tokens can be revoked
- Token validation includes signature verification
- Auth middleware protects routes from unauthorized access
Switching Between Authentication Modes
To switch between direct and remote authentication:
# .env for direct authentication
AUTH_PROVIDER=direct
JWT_SECRET_KEY=your_secret_key
# .env for remote authentication
AUTH_PROVIDER=remote
AUTH_SERVICE_HOST=auth-service
AUTH_SERVICE_PORT=9501
SERVICE_ID=web_app
SERVICE_SECRET=service_secret_key
Best Practices
- Always use HTTPS in production to protect tokens in transit
- Set appropriate token expiration times (shorter for access tokens, longer for refresh tokens)
- Implement token revocation for logout and security incidents
- Use environment variables for sensitive configuration
- Consider using a dedicated database or Redis for token storage in production
Example Implementation
// AuthController.php public function login(ServerRequestInterface $request, ResponseInterface $response) { $data = $request->getParsedBody(); $result = $this->authManager->login($data['email'], $data['password']); if (!$result) { return $response->withStatus(401)->withJson(['error' => 'Invalid credentials']); } return $response->withJson([ 'token' => $result['token'], 'refreshToken' => $result['refreshToken'], 'expiresIn' => $result['expiresIn'] ]); }