Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
L
laravel-adminpanel
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
laravel-adminpanel
Commits
30c98fd9
Commit
30c98fd9
authored
Mar 07, 2019
by
Viral Solani
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Change JWT configuration (WIP)
parent
b788def5
Changes
7
Expand all
Show whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
174 additions
and
258 deletions
+174
-258
.gitignore
.gitignore
+1
-0
access.log
access.log
+0
-151
AuthController.php
app/Http/Controllers/Api/V1/AuthController.php
+89
-34
Kernel.php
app/Http/Kernel.php
+9
-9
User.php
app/Models/Access/User/User.php
+23
-11
jwt.php
config/jwt.php
+49
-49
LoginTest.php
tests/Feature/Api/V1/LoginTest.php
+3
-4
No files found.
.gitignore
View file @
30c98fd9
...
...
@@ -16,6 +16,7 @@ Thumbs.db
_ide_helper.php
composer.phar
error.log
access.log
Todo.rtf
.vagrant
/.vagrant
...
...
access.log
deleted
100644 → 0
View file @
b788def5
This diff is collapsed.
Click to expand it.
app/Http/Controllers/Api/V1/AuthController.php
View file @
30c98fd9
...
...
@@ -4,7 +4,7 @@ namespace App\Http\Controllers\Api\V1;
use
App\Models\Access\User\User
;
use
Illuminate\Http\Request
;
use
JWT
Auth
;
use
Illuminate\Support\Facades\
Auth
;
use
Tymon\JWTAuth\Exceptions\JWTException
;
use
Validator
;
...
...
@@ -31,17 +31,24 @@ class AuthController extends APIController
$credentials
=
$request
->
only
([
'email'
,
'password'
]);
try
{
if
(
!
$token
=
JWTAuth
::
attempt
(
$credentials
))
{
if
(
!
$token
=
auth
(
'api'
)
->
attempt
(
$credentials
))
{
return
$this
->
throwValidation
(
trans
(
'api.messages.login.failed'
));
}
}
catch
(
JWTException
$e
)
{
return
$this
->
respondInternalError
(
$e
->
getMessage
());
}
return
$this
->
respond
([
'message'
=>
trans
(
'api.messages.login.success'
),
'token'
=>
$token
,
]);
return
$this
->
respondWithToken
(
$token
);
}
/**
* Get the authenticated User.
*
* @return \Illuminate\Http\JsonResponse
*/
public
function
me
()
{
return
response
()
->
json
(
$this
->
guard
()
->
user
());
}
/**
...
...
@@ -51,19 +58,9 @@ class AuthController extends APIController
*/
public
function
logout
()
{
try
{
$token
=
JWTAuth
::
getToken
();
$this
->
guard
()
->
logout
();
if
(
$token
)
{
JWTAuth
::
invalidate
(
$token
);
}
}
catch
(
JWTException
$e
)
{
return
$this
->
respondInternalError
(
$e
->
getMessage
());
}
return
$this
->
respond
([
'message'
=>
trans
(
'api.messages.logout.success'
),
]);
return
response
()
->
json
([
'message'
=>
'Successfully logged out'
]);
}
/**
...
...
@@ -73,21 +70,79 @@ class AuthController extends APIController
*/
public
function
refresh
()
{
$token
=
JWTAuth
::
getToken
();
if
(
!
$token
)
{
$this
->
respondUnauthorized
(
trans
(
'api.messages.refresh.token.not_provided'
));
return
$this
->
respondWithToken
(
$this
->
guard
()
->
refresh
());
}
try
{
$refreshedToken
=
JWTAuth
::
refresh
(
$token
);
}
catch
(
JWTException
$e
)
{
return
$this
->
respondInternalError
(
$e
->
getMessage
());
/**
* Get the token array structure.
*
* @param string $token
*
* @return \Illuminate\Http\JsonResponse
*/
protected
function
respondWithToken
(
$token
)
{
return
response
()
->
json
([
'access_token'
=>
$token
,
// 'token_type' => 'bearer',
// 'expires_in' => $this->guard()->factory()->getTTL() * 60
]);
}
return
$this
->
respond
([
'status'
=>
trans
(
'api.messages.refresh.status'
),
'token'
=>
$refreshedToken
,
]);
/**
* Get the guard to be used during authentication.
*
* @return \Illuminate\Contracts\Auth\Guard
*/
public
function
guard
()
{
return
Auth
::
guard
(
'api'
);
}
/*
* Log the user out (Invalidate the token).
*
* @return \Illuminate\Http\JsonResponse
*/
// public function logout()
// {
// try {
// $token = JWTAuth::getToken();
// if ($token) {
// JWTAuth::invalidate($token);
// }
// } catch (JWTException $e) {
// return $this->respondInternalError($e->getMessage());
// }
// return $this->respond([
// 'message' => trans('api.messages.logout.success'),
// ]);
// }
/*
* Refresh a token.
*
* @return \Illuminate\Http\JsonResponse
*/
// public function refresh()
// {
// $token = JWTAuth::getToken();
// if (!$token) {
// $this->respondUnauthorized(trans('api.messages.refresh.token.not_provided'));
// }
// try {
// $refreshedToken = JWTAuth::refresh($token);
// } catch (JWTException $e) {
// return $this->respondInternalError($e->getMessage());
// }
// return $this->respond([
// 'status' => trans('api.messages.refresh.status'),
// 'token' => $refreshedToken,
// ]);
// }
}
app/Http/Kernel.php
View file @
30c98fd9
...
...
@@ -76,7 +76,7 @@ class Kernel extends HttpKernel
*/
'access.routeNeedsRole'
=>
\App\Http\Middleware\RouteNeedsRole
::
class
,
'access.routeNeedsPermission'
=>
\App\Http\Middleware\RouteNeedsPermission
::
class
,
'jwt.auth'
=>
GetUserFromToken
::
class
,
'jwt.refresh'
=>
RefreshToken
::
class
,
//
'jwt.auth' => GetUserFromToken::class,
//
'jwt.refresh' => RefreshToken::class,
];
}
app/Models/Access/User/User.php
View file @
30c98fd9
...
...
@@ -78,6 +78,18 @@ class User extends Authenticatable implements JWTSubject
return
$this
->
getKey
();
}
/**
* Set password attribute.
*
* @param [string] $password
*/
public
function
setPasswordAttribute
(
$password
)
{
if
(
!
empty
(
$password
))
{
$this
->
attributes
[
'password'
]
=
bcrypt
(
$password
);
}
}
/**
* Return a key value array, containing any custom claims to be added to the JWT.
*
...
...
config/jwt.php
View file @
30c98fd9
...
...
@@ -9,8 +9,9 @@
* file that was distributed with this source code.
*/
return
[
use
Tymon\JWTAuth\Claims
;
return
[
/*
|--------------------------------------------------------------------------
| JWT Authentication Secret
...
...
@@ -45,7 +46,6 @@ return [
*/
'keys'
=>
[
/*
|--------------------------------------------------------------------------
| Public Key
...
...
@@ -82,7 +82,6 @@ return [
*/
'passphrase'
=>
env
(
'JWT_PASSPHRASE'
),
],
/*
...
...
@@ -91,7 +90,7 @@ return [
|--------------------------------------------------------------------------
|
| Specify the length of time (in minutes) that the token will be valid for.
| Defaults to
1 hour
.
| Defaults to
30 minutes
.
|
| You can also set this to null, to yield a never expiring token.
| Some people may want this behaviour for e.g. a mobile app.
...
...
@@ -100,26 +99,21 @@ return [
|
*/
'ttl'
=>
env
(
'JWT_TTL'
,
6
0
),
'ttl'
=>
env
(
'JWT_TTL'
,
3
0
),
/*
|--------------------------------------------------------------------------
|
Refresh time to live
|
Max refresh period
|--------------------------------------------------------------------------
|
| Specify the length of time (in minutes) that the token can be refreshed
| within. I.E. The user can refresh their token within a 2 week window of
| the original token being created until they must re-authenticate.
| Defaults to 2 weeks.
| Specify the length of time (in minutes) that the token will be
| refreshable for.
|
| You can also set this to null, to yield an infinite refresh time.
| Some may want this instead of never expiring tokens for e.g. a mobile app.
| This is not particularly recommended, so make sure you have appropriate
| systems in place to revoke the token if necessary.
| Defaults to null, which will allow tokens to be refreshable forever.
|
*/
'
refresh_ttl'
=>
env
(
'JWT_REFRESH_TTL'
,
20160
),
'
max_refresh_period'
=>
env
(
'JWT_MAX_REFRESH_PERIOD'
),
/*
|--------------------------------------------------------------------------
...
...
@@ -128,8 +122,11 @@ return [
|
| Specify the hashing algorithm that will be used to sign the token.
|
| See here: https://github.com/namshi/jose/tree/master/src/Namshi/JOSE/Signer/OpenSSL
| for possible values.
| Possible values:
|
| 'HS256', 'HS384', 'HS512',
| 'RS256', 'RS384', 'RS512',
| 'ES256', 'ES384', 'ES512'
|
*/
...
...
@@ -147,31 +144,48 @@ return [
*/
'required_claims'
=>
[
'iss'
,
'iat'
,
'exp'
,
'nbf'
,
'sub'
,
'jti'
,
Claims\Issuer
::
NAME
,
Claims\IssuedAt
::
NAME
,
Claims\Expiration
::
NAME
,
Claims\Subject
::
NAME
,
Claims\JwtId
::
NAME
,
],
/*
|--------------------------------------------------------------------------
|
Persistent Claims
|
Lock Subject
|--------------------------------------------------------------------------
|
| Specify the claim keys to be persisted when refreshing a token.
| `sub` and `iat` will automatically be persisted, in
| addition to the these claims.
| This will determine whether a `prv` claim is automatically added to
| the token. The purpose of this is to ensure that if you have multiple
| authentication models e.g. `App\User` & `App\OtherPerson`, then we
| should prevent one authentication request from impersonating another,
| if 2 tokens happen to have the same id across the 2 different models.
|
| Note: If a claim does not exist then it will be ignored.
| Under specific circumstances, you may want to disable this behaviour
| e.g. if you only have one authentication model, then you would save
| a little on token size.
|
*/
'persistent_claims'
=>
[
// 'foo',
// 'bar',
],
'lock_subject'
=>
true
,
/*
|--------------------------------------------------------------------------
| Leeway
|--------------------------------------------------------------------------
|
| This property gives the jwt timestamp claims some "leeway".
| Meaning that if you have any unavoidable slight clock skew on
| any of your servers then this will afford you some level of cushioning.
|
| This applies to the claims `iat`, `nbf` and `exp`.
|
| Specify in seconds - only if you know you need it.
|
*/
'leeway'
=>
env
(
'JWT_LEEWAY'
,
0
),
/*
|--------------------------------------------------------------------------
...
...
@@ -212,11 +226,11 @@ return [
| see https://laravel.com/docs/master/responses#cookies-and-encryption
| for details.
|
| Set it to
false if you don't
want to decrypt cookies.
| Set it to
true if you
want to decrypt cookies.
|
*/
'decrypt_cookies'
=>
tru
e
,
'decrypt_cookies'
=>
fals
e
,
/*
|--------------------------------------------------------------------------
...
...
@@ -228,7 +242,6 @@ return [
*/
'providers'
=>
[
/*
|--------------------------------------------------------------------------
| JWT Provider
...
...
@@ -238,18 +251,7 @@ return [
|
*/
'jwt'
=>
Tymon\JWTAuth\Providers\JWT\Namshi
::
class
,
/*
|--------------------------------------------------------------------------
| Authentication Provider
|--------------------------------------------------------------------------
|
| Specify the provider that is used to authenticate users.
|
*/
'auth'
=>
Tymon\JWTAuth\Providers\Auth\Illuminate
::
class
,
'jwt'
=>
Tymon\JWTAuth\Providers\JWT\Lcobucci
::
class
,
/*
|--------------------------------------------------------------------------
...
...
@@ -261,7 +263,5 @@ return [
*/
'storage'
=>
Tymon\JWTAuth\Providers\Storage\Illuminate
::
class
,
],
];
tests/Feature/Api/V1/LoginTest.php
View file @
30c98fd9
...
...
@@ -2,7 +2,6 @@
namespace
Tests\Feature\Api\V1
;
use
Illuminate\Support\Facades\Auth
;
use
Tests\TestCase
;
class
LoginTest
extends
TestCase
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment