rcerljenko / laravel-jwt
Simple JWT Auth for Laravel PHP Framework
Installs: 15 189
Dependents: 0
Suggesters: 0
Security: 0
Stars: 38
Watchers: 3
Forks: 7
Open Issues: 0
pkg:composer/rcerljenko/laravel-jwt
Requires
- php: ^8.0
- firebase/php-jwt: ^6.1
- illuminate/auth: ^9.0
- illuminate/contracts: ^9.0
- illuminate/support: ^9.0
Requires (Dev)
README
Simple JWT Auth for Laravel PHP Framework using Firebase JWT under the hood.
Installation
Standard Composer package installation:
composer require rcerljenko/laravel-jwt -v
Usage
- Publish the config file. This will create a
config/jwt.phpfile for basic configuration options.
php artisan vendor:publish --provider="RCerljenko\LaravelJwt\LaravelJwtServiceProvider" --tag="config"
- Add a new auth guard to your auth config file using a
jwtdriver.
// config/auth.php 'guards' => [ 'web' => [ 'driver' => 'session', 'provider' => 'users', ], 'api' => [ 'driver' => 'jwt', 'provider' => 'users', ], ],
- Protect your API routes using this new guard.
// routes/api.php use Illuminate\Support\Facades\Route; Route::middleware('auth:api')->group(function () { // JWT protected routes });
- Use provided
HasJwttrait from this package on your Auth model (eg. User).
namespace App\Models; use RCerljenko\LaravelJwt\Traits\HasJwt; use Illuminate\Notifications\Notifiable; use Illuminate\Foundation\Auth\User as Authenticatable; class User extends Authenticatable { use Notifiable, HasJwt; }
You now have access to token() method on your User model, eg:
$user = User::findOrFail(1); $user->token();
You should probably return this token via Login Controller or User Resource.
Configuration
This package provides simple configuration via config/jwt.php file after you publish the config. Let's go over each configuration option.
secret-key- Secret key to use when encoding / decoding tokens. It should be a random string. Remember, if you change this key all active JWT tokens will be invalidated.hash-algo- Hashing algorithm. List of supported ones are in the config file. You probably don't need to change this.expiration- Default token expiration time in minutes. You can set it tonulland the tokens will never expire.claims- Default claims that will be applied to all tokens (besides the required ones needed for decoding and validation).
This was global configuration for all tokens. Besides that, library provides a local per-model configuration via HasJwt trait helper methods.
getJwtId()- It should return the model unique key used to retrieve that model from database. It defaults to model primary key.getJwtValidFromTime()- It should returnnull(default) or a Carbon instance. You can use that if you want to create tokens which are not active right away.getJwtValidUntilTime()- It should returnnullor a Carbon instance. This sets the JWT expiration time which, by default, uses theexpirationoption from the config file.getJwtCustomClaims()- Should return a key/value array of extra custom claims that you want to be a part of your token. By default it's an empty array.
You can also use configuration directly on the token() method which then overrides all other configurations, eg:
$user->token([ 'id' => $user->email, 'valid_from' => now()->addHour(), 'valid_until' => now()->addDay(), 'claims' => [ 'extra1' => 'foo', 'extra2' => 'bar' ] ]);
You don't need to override all configuration options, just the ones that you wish to change.
Request
Token is extracted from the request in one of three ways:
- From
Authorization: Bearer {token}header (most common). - From URL query param
token. - From request payload using
tokenfield name. - From cookie using
tokenkey.