torugo / jwt
Simple library to handle Json Web Tokens.
1.1.0
2024-09-27 22:49 UTC
Requires
- php: ^8.1
- ext-mbstring: *
- ext-openssl: *
- torugo/util: ^1
Requires (Dev)
- phpunit/php-code-coverage: ^11
- phpunit/phpunit: ^11
README
Simple PHP library to handle Json Web Tokens (JWT).
Table of Contents
Requirements
- PHP 8+
- PHP mbstring extension installed and loaded.
- PHP openssl extension installed and loaded.
- Composer 2+
Installation via composer
composer require torugo/jwt
Supported algorithms
For now only the algorithms listed below are supported:
Algorithm | JWTALg enum | Key |
---|---|---|
HS256 | JWTAlg::HS256 |
Symmetric key |
HS384 | JWTAlg::HS384 |
Symmetric key |
HS512 | JWTAlg::HS512 |
Symmetric key |
RS256 | JWTAlg::RS256 |
Private/Public RSA keys |
RS384 | JWTAlg::RS384 |
Private/Public RSA keys |
RS512 | JWTAlg::RS512 |
Private/Public RSA keys |
Usage
Encoding
use Torugo\JWT\JWT; use Torugo\JWT\Enums\JwtAlg; $key = "example_key_Jr6QWaxb7pgerDJgL"; $payload = [ "sid" => "session_id", "uid" => "user_id", // ... more data "iat" => 1724972934, // if not present, this library adds automatically "nbf" => 1724000000, // if not present, this library adds automatically "ext" => 1724973234, // if not present, this library adds automatically ]; $jwt = JWT::encode($payload, $key, JWTAlg::HS256);
Decoding
Validating the token
The method validate
checks the token signature and the time controls.
Returns the payload content as a key=>pair
array.
Throws:
InvalidTokenException
: When the signature or structure is invalid.ExpiredTokenException
: The token signature is valid, but the token time expired.InvalidKeyException
: When the key type is invalid (not when the key is incorret).
use Torugo\JWT\JWT; use Torugo\JWT\Exceptions\ExpiredTokenException; use Torugo\JWT\Exceptions\InvalidKeyException; use Torugo\JWT\Exceptions\InvalidTokenException; $key = "example_key_Jr6QWaxb7pgerDJgL"; try { $payload = JWT::validate($jwt, $key); } catch (ExpiredTokenException $e) { // Handle exception } catch (InvalidTokenException $e) { // Handle exception } catch (InvalidKeyException $e) { // Handle exception }
Getting the token payload without validating it
Getting token payload without validation is insecure, use this method at your own risk.
$payload = JWT::decodePayload($jwt, $key);
You can use this method to refresh the token when the token expires.
Example
try { $payload = JWT::decodePayload($jwt, $key); } catch (ExpiredTokenException $e) { // When using RS256, RS384 or RS512 you must also pass the privateKey // On HS algorithms it is not needed $token = JWT::refreshToken($token, $publicKey, $privatekey); } catch (\Throwable $e) { // Handle exception }
Contribute
It is currently not open to contributions, I intend to make it available as soon as possible.
License
This library is licensed under the MIT License - see the LICENSE file for details.