spatie / laravel-authorize
A middleware to check authorization
Installs: 23 130
Dependents: 2
Suggesters: 1
Security: 0
Stars: 198
Watchers: 8
Forks: 20
Open Issues: 0
Requires
- php: >=5.5.0
- illuminate/contracts: ~5.1.11|~5.2.0
- laravel/framework: ~5.1.11|~5.2.0
Requires (Dev)
- orchestra/testbench: ~3.1.0|~3.2.0
- phpunit/phpunit: 4.*
- scrutinizer/ocular: ~1.1
This package is auto-updated.
Last update: 2024-10-21 18:39:51 UTC
README
A middleware to check authorization
This package provides a route middleware to protect routes from unauthorized access. It hooks into the authorization features that were introduced in Laravel 5.1.11.
Protecting a route can be done by adding middleware to it:
Route::get('/top-secret-page', [ 'middleware' => 'can:viewTopSecretPage', 'uses' => 'TopSecretController@index', ]);
Of course this middleware can also be applied to a bunch of routes:
Route::group(['prefix' => 'admin', 'middleware' => 'can:viewAdmin'], function() { //all the controllers of your admin section ... });
Furthermore the middleware can use route model binding:
Route::get('/post/{post}', [ 'middleware' => 'can:editPost,post', 'uses' => 'PostController@edit', ]);
Spatie is a webdesign agency in Antwerp, Belgium. You'll find an overview of all our open source projects on our website.
Support us
We invest a lot of resources into creating best in class open source packages. You can support us by buying one of our paid products.
We highly appreciate you sending us a postcard from your hometown, mentioning which of our package(s) you are using. You'll find our address on our contact page. We publish all received postcards on our virtual postcard wall.
Postcardware
You're free to use this package (it's MIT-licensed), but if it makes it to your production environment you are required to send us a postcard from your hometown, mentioning which of our package(s) you are using.
Our address is: Spatie, Kruikstraat 22, 2018 Antwerp, Belgium.
The best postcards will get published on the open source page on our website.
Do not use in Laravel 5.2.28 and up
Laravel 5.2.28 or higher contain the middleware this package provides out of the box. There's no need do install this package in those versions of Laravel.
Install
You can install the package via composer:
$ composer require spatie/laravel-authorize
Next, you must install the service provider:
// config/app.php 'providers' => [ ... Spatie\Authorize\AuthorizeServiceProvider::class, ];
Next, the \Spatie\Authorize\Middleware\Authorize::class
-middleware must be registered in the kernel:
//app/Http/Kernel.php protected $routeMiddleware = [ ... 'can' => \Spatie\Authorize\Middleware\Authorize::class, ];
Naming the middleware can
is just a suggestion. You can give it any name you'd like.
The authorize
-middleware includes all functionality provided by the standard auth
-middleware. So you could
also opt to replace the App\Http\Middleware\Authenticate
-middleware by Spatie\Authorize\Middleware\Authorize
:
//app/Http/Kernel.php protected $routeMiddleware = [ 'auth' => 'Spatie\Authorize\Middleware\Authorize', ... ];
You can publish the config-file with:
php artisan vendor:publish --provider="Spatie\Authorize\AuthorizeServiceProvider"
This is the contents of the published config file:
return [ /* * The path to redirect for login. */ 'login_url' => 'auth/login' ];
Usage
Checking authentication
When the middleware is used without any parameters at all, it will only allow logged in users to use the route.
If you plan on using the middleware like this I recommend that you replace the standard auth
-middleware with the one
provided by this package.
//only logged in users will be able to see this Route::get('/top-secret-page', ['middleware' => 'auth', 'uses' => 'TopSecretController@index']);
Checking authorization
The middleware accepts the name of an ability you have defined as the first parameter:
//only users with the viewTopSecretPage-ability be able to see this Route::get('/top-secret-page', [ 'middleware' => 'can:viewTopSecretPage', 'uses' => 'TopSecretController@index', ]);
Using form model binding
Image you've set up an ability like this:
//inside the boot method of AuthServiceProvider $gate->define('update-post', function ($user, $post) { return $user->id === $post->user_id; });
The middleware accepts the name of a bound model as the second parameter.
Route::get('/post/{post}', [ 'middleware' => 'can:editPost,post', 'uses' => 'PostController@edit', ]);
Behind the scene the middleware will pass the model bound that is bound to the round to
the defined update-post
-ability.
What happens with unauthorized requests?
Default behaviour
This is the default behaviour defined in the middleware.
use Symfony\Component\HttpKernel\Exception\HttpException; ... protected function handleUnauthorizedRequest($request, $ability = null, $model = null) { if ($request->ajax()) { return response('Unauthorized.', Response::HTTP_UNAUTHORIZED); } if (!$request->user()) { return redirect()->guest(config('laravel-authorize.login_url')); } throw new HttpException(Response::HTTP_UNAUTHORIZED, 'This action is unauthorized.'); }
So guests will get redirected to the default login page, logged in users will get a response
with status HTTP_UNAUTHORIZED
aka 401.
Custom behaviour
To customize the default behaviour you can easily extend the default middleware and
override the handleUnauthorizedRequest
-method. Don't forget to register your class at the kernel.
If you would like to let all unauthorized users know that you are actually a teapot you can do so.
//app/Http/Middleware/Authorize.php namespace App\Http\Middleware; use Spatie\Authorize\Middleware\Authorize as BaseAuthorize; use Symfony\Component\HttpFoundation\Response; class Authorize extends BaseAuthorize { protected function handleUnauthorizedRequest($request, $ability = null, $model = null) { return reponse('I am a teapot.', Response::HTTP_I_AM_A_TEAPOT); } }
In the kernel:
//app/Http/Kernel.php protected $routeMiddleware = [ 'can' => 'App\Http\Middleware\Authorize', ... ];
Change log
Please see CHANGELOG for more information what has changed recently.
Testing
This package contains integration tests that are powered by orchestral/testbench.
You can run all tests with:
$ composer test
Contributing
Please see CONTRIBUTING for details.
Security
If you've found a bug regarding security please mail security@spatie.be instead of using the issue tracker.
Credits
A big thank you to Joseph Silber for all the excellent feedback he gave while this package was being created.
About Spatie
Spatie is webdesign agency in Antwerp, Belgium. You'll find an overview of all our open source projects on our website.
License
The MIT License (MIT). Please see License File for more information.