rcerljenko / laravel-paseto
Simple PASETO Auth for Laravel PHP Framework
Installs: 1 646
Dependents: 0
Suggesters: 0
Security: 0
Stars: 20
Watchers: 2
Forks: 2
Open Issues: 0
Requires
- php: ^8.1
- illuminate/auth: ^9.0|^10.0|^11.0
- illuminate/contracts: ^9.0|^10.0|^11.0
- illuminate/support: ^9.0|^10.0|^11.0
- paragonie/paseto: ^3.0
Requires (Dev)
- friendsofphp/php-cs-fixer: ^3.57
README
Simple PASETO Auth for Laravel PHP Framework using paragonie/paseto under the hood.
Installation
Standard Composer package installation:
composer require rcerljenko/laravel-paseto -v
Usage
- Publish the config file. This will create a
config/paseto.php
file for basic configuration options.
php artisan vendor:publish --provider="RCerljenko\LaravelPaseto\LaravelPasetoServiceProvider" --tag="config"
- Add a new auth guard to your auth config file using a
paseto
driver.
// config/auth.php 'guards' => [ 'web' => [ 'driver' => 'session', 'provider' => 'users', ], 'api' => [ 'driver' => 'paseto', 'provider' => 'users', ], ],
- Protect your API routes using this new guard.
// routes/api.php use Illuminate\Support\Facades\Route; Route::middleware('auth:api')->group(function () { // PASETO protected routes });
- Use provided
HasPaseto
trait from this package on your Auth model (eg. User).
namespace App\Models; use Illuminate\Notifications\Notifiable; use RCerljenko\LaravelPaseto\Traits\HasPaseto; use Illuminate\Foundation\Auth\User as Authenticatable; class User extends Authenticatable { use Notifiable, HasPaseto; }
You now have access to token()
method on your User model, eg:
$user = User::findOrFail(1); $user->token();
You should probably return this token via Login Controller or User Resource.
Configuration
This package provides simple configuration via config/paseto.php
file after you publish the config. Let's go over each configuration option.
secret-key
- Secret key to use when encoding / decoding tokens. It has to be a 32 byte long random string. Remember, if you change this key all active PASETO tokens will be invalidated.expiration
- Default token expiration time in minutes. You can set it tonull
and the tokens will never expire.issuer
- Token issuer claim.audience
- Token audience claim.claims
- Default claims that will be applied to all tokens (besides the required ones needed for decoding and validation).
This was global configuration for all tokens. Besides that, library provides a local per-model configuration via HasPaseto
trait helper methods.
getJwtId()
- It should return the model unique key used to retrieve that model from database. It defaults to model primary key.getJwtValidFromTime()
- It should returnnull
(default) or a Carbon instance. You can use that if you want to create tokens which are not active right away.getJwtValidUntilTime()
- It should returnnull
or a Carbon instance. This sets the JWT expiration time which, by default, uses theexpiration
option from the config file.getJwtCustomClaims()
- Should return a key/value array of extra custom claims that you want to be a part of your token. By default it's an empty array.
You can also use configuration directly on the token()
method which then overrides all other configurations, eg:
$user->token([ 'id' => $user->email, 'valid_from' => now()->addHour(), 'valid_until' => now()->addDay(), 'claims' => [ 'extra1' => 'foo', 'extra2' => 'bar' ] ]);
You don't need to override all configuration options, just the ones that you wish to change.
Request
Token is extracted from the request in one of three ways:
- From
Authorization: Bearer {token}
header (most common). - From URL query param
token
. - From request payload using
token
field name.