rcerljenko / laravel-jwt
Simple JWT Auth for Laravel PHP Framework
Installs: 15 181
Dependents: 0
Suggesters: 0
Security: 0
Stars: 37
Watchers: 4
Forks: 7
Open Issues: 0
Requires
- php: ^8.0
- firebase/php-jwt: ^6.1
- illuminate/auth: ^9.0
- illuminate/contracts: ^9.0
- illuminate/support: ^9.0
Requires (Dev)
README
Simple JWT Auth for Laravel PHP Framework using Firebase JWT under the hood.
Installation
Standard Composer package installation:
composer require rcerljenko/laravel-jwt -v
Usage
- Publish the config file. This will create a
config/jwt.php
file for basic configuration options.
php artisan vendor:publish --provider="RCerljenko\LaravelJwt\LaravelJwtServiceProvider" --tag="config"
- Add a new auth guard to your auth config file using a
jwt
driver.
// config/auth.php 'guards' => [ 'web' => [ 'driver' => 'session', 'provider' => 'users', ], 'api' => [ 'driver' => 'jwt', 'provider' => 'users', ], ],
- Protect your API routes using this new guard.
// routes/api.php use Illuminate\Support\Facades\Route; Route::middleware('auth:api')->group(function () { // JWT protected routes });
- Use provided
HasJwt
trait from this package on your Auth model (eg. User).
namespace App\Models; use RCerljenko\LaravelJwt\Traits\HasJwt; use Illuminate\Notifications\Notifiable; use Illuminate\Foundation\Auth\User as Authenticatable; class User extends Authenticatable { use Notifiable, HasJwt; }
You now have access to token()
method on your User model, eg:
$user = User::findOrFail(1); $user->token();
You should probably return this token via Login Controller or User Resource.
Configuration
This package provides simple configuration via config/jwt.php
file after you publish the config. Let's go over each configuration option.
secret-key
- Secret key to use when encoding / decoding tokens. It should be a random string. Remember, if you change this key all active JWT tokens will be invalidated.hash-algo
- Hashing algorithm. List of supported ones are in the config file. You probably don't need to change this.expiration
- Default token expiration time in minutes. You can set it tonull
and the tokens will never expire.claims
- Default claims that will be applied to all tokens (besides the required ones needed for decoding and validation).
This was global configuration for all tokens. Besides that, library provides a local per-model configuration via HasJwt
trait helper methods.
getJwtId()
- It should return the model unique key used to retrieve that model from database. It defaults to model primary key.getJwtValidFromTime()
- It should returnnull
(default) or a Carbon instance. You can use that if you want to create tokens which are not active right away.getJwtValidUntilTime()
- It should returnnull
or a Carbon instance. This sets the JWT expiration time which, by default, uses theexpiration
option from the config file.getJwtCustomClaims()
- Should return a key/value array of extra custom claims that you want to be a part of your token. By default it's an empty array.
You can also use configuration directly on the token()
method which then overrides all other configurations, eg:
$user->token([ 'id' => $user->email, 'valid_from' => now()->addHour(), 'valid_until' => now()->addDay(), 'claims' => [ 'extra1' => 'foo', 'extra2' => 'bar' ] ]);
You don't need to override all configuration options, just the ones that you wish to change.
Request
Token is extracted from the request in one of three ways:
- From
Authorization: Bearer {token}
header (most common). - From URL query param
token
. - From request payload using
token
field name. - From cookie using
token
key.