This past period I was working on some project that included building Single Page Application in Nuxt that was on one domain, and building API in Laravel that was on some other sub-domain. When the API was built, and it was time to make the front-end I was trying to make the authentication system properly and with security in mind. There are many articles out there on this subject, but I couldn't find any that was touching security of the application.
TL;DR Please don't store your tokens in LocalStorage, or any other sensitive information, as it can be accessed by any javascript code on your page and that makes you vulnerable to XSS attack.
TL;DR If you just want to see the code, here are github links
The authentication flow will be as follow:
- The user enters his username and password.
- If the credentials are valid, we are saving the refresh token in an
httponly
cookie. - The user sets the access token in the cookie, please note that this is normal cookie, which has expiration time of 5 minutes.
- After the access token has been expired, we will refresh the access token if the user has the valid refresh token set.
- Access token is refreshed, and new access token and refresh token are assigned to the user.
In this post I will give you a complete guidance on how to make securely authentication system for Single Page Applications.
Making the Laravel back-end
I assume that you have composer and laravel installed on your machine, if you don't, just follow their documentation.
Setting Laravel Passport
Create new laravel project and cd into it laravel new auth-api && cd auth-api
.
We will use Laravel Passport which provides a full OAuth2 server implementation for your Laravel application. I know that Passport might be overkill for some small to medium applications, but I think it's worth it.
Next we'll install Passport with composer composer require laravel/passport
.
Set your .env
variables for the database. For this example I'll use sqlite.
If you follow along, change the DB_CONNECTION
variable to use the sqlite in .env
like this:
...
DB_CONNECTION=sqlite
...
Make the database.sqlite
file with touch database/database.sqlite
.
Run the migrations with php artisan migrate
. The Passport migrations will create the tables your application needs to store clients and access tokens.
Next, run the php artisan passport:install
command. This command will create the encryption keys needed to generate secure access tokens. After you run this command you will see that "personal access" and "password grant" clients are created and you can see their Client ID and Client secret, we will store these in .env
file. In this post we will use only the password grant client, but we will store both of them for convenience.
...
PERSONAL_CLIENT_ID=1
PERSONAL_CLIENT_SECRET={your secret}
PASSWORD_CLIENT_ID=2
PASSWORD_CLIENT_SECRET={your secret}
...
Then we will add the "password client" id and secret to the config/services.php
so we can use them later in our code:
...
'passport' => [
'password_client_id' => env('PASSWORD_CLIENT_ID'),
'password_client_secret' => env('PASSWORD_CLIENT_SECRET'),
],
In the config/auth.php
set the api guard driver as passport
...
'guards' => [
'web' => [
'driver' => 'session',
'provider' => 'users',
],
'api' => [
'driver' => 'passport',
'provider' => 'users',
'hash' => false,
],
],
...
Next step is to add Laravel\Passport\HasApiTokens
trait to your App\User
model
<?php
namespace App;
use Laravel\Passport\HasApiTokens;
use Illuminate\Notifications\Notifiable;
use Illuminate\Foundation\Auth\User as Authenticatable;
class User extends Authenticatable
{
use Notifiable, HasApiTokens;
...
}
Don't forget to import the trait at the top.
The last step is to register passport routes. In the AuthServiceProvider
in the boot
method add this and import Laravel\Passport\Passport
at the top.
public function boot()
{
$this->registerPolicies();
Passport::routes(function ($router) {
$router->forAccessTokens();
$router->forPersonalAccessTokens();
$router->forTransientTokens();
});
}
We are only registering the routes that we need, if for some reason you want to register all passport routes, don't pass a closure, just add Passport::routes()
.
If you run php artisan route:list | grep oauth
you should see the oauth routes. It should look like this
Now this is very important, we're going to set the expiration time for the tokens. In order to properly secure our app, we'll set the access token expiration time to 5 minutes, and the refresh token expiration time to 10 days.
In the AuthServiceProvider
in boot
method we add the expirations. Now the boot
method should look like this:
public function boot()
{
$this->registerPolicies();
Passport::routes(function ($router) {
$router->forAccessTokens();
$router->forPersonalAccessTokens();
$router->forTransientTokens();
});
Passport::tokensExpireIn(now()->addMinutes(5));
Passport::refreshTokensExpireIn(now()->addDays(10));
}
That's all we have to do regarding the Passport. Next thing we are going to do, is we are going to set our API.
Setting CORS
In order to access our API from our front-end that is on different domain, we need to set CORS middleware.
Run php artisan make:middleware Cors
.
Then in app/Http/Middleware/Cors.php
change the handle
method like this
public function handle($request, Closure $next)
{
$allowedOrigins = [
'http://localhost:3000',
];
$requestOrigin = $request->headers->get('origin');
if (in_array($requestOrigin, $allowedOrigins)) {
return $next($request)
->header('Access-Control-Allow-Origin', $requestOrigin)
->header('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE')
->header('Access-Control-Allow-Credentials', 'true')
->header('Access-Control-Allow-Headers', 'Content-Type, Authorization');
}
return $next($request);
}
Here we are checking if the request origin is in the array of the allowed origins, if it is, we are setting the proper headers.
Now we just need to register this middleware. In app/Http/Kernel.php
add the middleware
...
protected $middleware = [
\App\Http\Middleware\TrustProxies::class,
\App\Http\Middleware\CheckForMaintenanceMode::class,
\Illuminate\Foundation\Http\Middleware\ValidatePostSize::class,
\App\Http\Middleware\TrimStrings::class,
\Illuminate\Foundation\Http\Middleware\ConvertEmptyStringsToNull::class,
\App\Http\Middleware\Cors::class,
];
...
That's it, pretty simple.
Making the API
In the routes/api.php
file we are going to register the routes that we are going to use. Delete everything there, and add this:
<?php
Route::middleware('guest')->group(function () {
Route::post('register', 'AuthController@register')->name('register');
Route::post('login', 'AuthController@login')->name('login');
Route::post('refresh-token', 'AuthController@refreshToken')->name('refreshToken');
});
Route::middleware('auth:api')->group(function () {
Route::post('logout', 'AuthController@logout')->name('logout');
});
We need to create the AuthController
run php artisan make:controller AuthController
.
In the App\Http\Controllers\AuthController
we will add the methods that we need. It should look like this:
<?php
namespace App\Http\Controllers;
class AuthController extends Controller
{
public function register()
{
}
public function login()
{
}
public function refreshTo()
{
}
public function logout()
{
}
}
In order for this to work we need to make a proxy that will make request to our own API. It might seems confusing at first but once we're done it will make perfect sense.
We'll make new folder in the app directory called Utilities. In the app/Utilities
make new php file ProxyRequest.php
<?php
namespace App\Utilities;
class ProxyRequest
{
}
Now we need to inject the App\Utilities\ProxyRequest
in the constructor of the App\Http\Controllers\AuthController
<?php
namespace App\Http\Controllers;
use App\Utilities\ProxyRequest;
class AuthController extends Controller
{
protected $proxy;
public function __construct(ProxyRequest $proxy)
{
$this->proxy = $proxy;
}
...
In the App\Utilities\ProxyRequest
we will add some methods for granting token and for refreshing the token. Add the following and then I'll explain what each method does
<?php
namespace App\Utilities;
class ProxyRequest
{
public function grantPasswordToken(string $email, string $password)
{
$params = [
'grant_type' => 'password',
'username' => $email,
'password' => $password,
];
return $this->makePostRequest($params);
}
public function refreshAccessToken()
{
$refreshToken = request()->cookie('refresh_token');
abort_unless($refreshToken, 403, 'Your refresh token is expired.');
$params = [
'grant_type' => 'refresh_token',
'refresh_token' => $refreshToken,
];
return $this->makePostRequest($params);
}
protected function makePostRequest(array $params)
{
$params = array_merge([
'client_id' => config('services.passport.password_client_id'),
'client_secret' => config('services.passport.password_client_secret'),
'scope' => '*',
], $params);
$proxy = \Request::create('oauth/token', 'post', $params);
$resp = json_decode(app()->handle($proxy)->getContent());
$this->setHttpOnlyCookie($resp->refresh_token);
return $resp;
}
protected function setHttpOnlyCookie(string $refreshToken)
{
cookie()->queue(
'refresh_token',
$refreshToken,
14400, // 10 days
null,
null,
false,
true // httponly
);
}
}
ProxyRequest
methods:
-
grantPasswordToken
- not much happens in this method, we are just setting the parameters needed for Passport "password grant" and make POST request. -
refreshAccessToken
- we are checking if the request contains refresh_token if it does we are setting the parameters for refreshing the token and make POST request, if the refresh_token does not exist we abort with 403 status. -
makePostRequest
- this is the key method of this class.- We are setting client_id and client_secret from the config, and we are merging additional parameters that are passed as argument
- Then we are making internal POST request to the Passport routes with the needed parameters
- We are json decoding the response
- Set the
httponly
cookie with refresh_token - Return the response
-
setHttpOnlyCookie
- set thehttponly
cookie with refresh_token in the response.
In order to queue the cookies for the response we need to add middleware. In app/Http/Kernel.php
add \Illuminate\Cookie\Middleware\AddQueuedCookiesToResponse::class
like this
...
protected $middleware = [
\App\Http\Middleware\CheckForMaintenanceMode::class,
\Illuminate\Foundation\Http\Middleware\ValidatePostSize::class,
\App\Http\Middleware\TrimStrings::class,
\Illuminate\Foundation\Http\Middleware\ConvertEmptyStringsToNull::class,
\App\Http\Middleware\TrustProxies::class,
\App\Http\Middleware\Cors::class,
\Illuminate\Cookie\Middleware\AddQueuedCookiesToResponse::class,
];
...
Now to make the App\Http\Controllers\AuthController
methods. Don't forget to import the App\User
.
In the register
method, add this
...
public function register()
{
$this->validate(request(), [
'name' => 'required',
'email' => 'required|email',
'password' => 'required',
]);
$user = User::create([
'name' => request('name'),
'email' => request('email'),
'password' => bcrypt(request('password')),
]);
$resp = $this->proxy->grantPasswordToken(
$user->email,
request('password')
);
return response([
'token' => $resp->access_token,
'expiresIn' => $resp->expires_in,
'message' => 'Your account has been created',
], 201);
}
...
In the login
method, add this
...
public function login()
{
$user = User::where('email', request('email'))->first();
abort_unless($user, 404, 'This combination does not exists.');
abort_unless(
\Hash::check(request('password'), $user->password),
403,
'This combination does not exists.'
);
$resp = $this->proxy
->grantPasswordToken(request('email'), request('password'));
return response([
'token' => $resp->access_token,
'expiresIn' => $resp->expires_in,
'message' => 'You have been logged in',
], 200);
}
...
The refreshToken
method
...
public function refreshToken()
{
$resp = $this->proxy->refreshAccessToken();
return response([
'token' => $resp->access_token,
'expiresIn' => $resp->expires_in,
'message' => 'Token has been refreshed.',
], 200);
}
...
The logout
method
...
public function logout()
{
$token = request()->user()->token();
$token->delete();
// remove the httponly cookie
cookie()->queue(cookie()->forget('refresh_token'));
return response([
'message' => 'You have been successfully logged out',
], 200);
}
...
Ok, that's everything we have to do in our back-end. I think that the methods in the AuthController
are self explanatory.
Making the Nuxt front-end
Nuxt is, as stated in the official documentation, a progressive framework based on Vue.js to create modern web applications. It is based on Vue.js official libraries (vue, vue-router and vuex) and powerful development tools (webpack, Babel and PostCSS). Nuxt goal is to make web development powerful and performant with a great developer experience in mind.
To create nuxt project run npx create-nuxt-app auth-spa-frontend
. If you don't have npm
install it first.
It will ask you some questions like project name, description, package manager, etc. Enter and choose whatever you like. Just make sure that custom server framework is set to none and you add axios
nuxt module. Note that I will be using bootstrap-vue.
We will also install additional package js-cookie
, run npm install js-cookie
.
I won't bother you with structuring the front-end and how the things should look like. The front-end will be pretty simple but functional.
In the nuxt.config.js
set the axios baseUrl
export default {
...
axios: {
baseURL: 'http://auth-api.web/api/',
credentials: true, // this says that in the request the httponly cookie should be sent
},
...
}
Next we will activate the vue state management library vuex
. In order to do that we only need to make new js file in store folder.
If you are not familiar how vuex
works, I would suggest to read the documentation, it's pretty straightforward.
Add index.js
file in the store folder, and add the following
import cookies from 'js-cookie';
export const state = () => ({
token: null,
});
export const mutations = {
SET_TOKEN(state, token) {
state.token = token;
},
REMOVE_TOKEN(state) {
state.token = null;
}
};
export const actions = {
setToken({commit}, {token, expiresIn}) {
this.$axios.setToken(token, 'Bearer');
const expiryTime = new Date(new Date().getTime() + expiresIn * 1000);
cookies.set('x-access-token', token, {expires: expiryTime});
commit('SET_TOKEN', token);
},
async refreshToken({dispatch}) {
const {token, expiresIn} = await this.$axios.$post('refresh-token');
dispatch('setToken', {token, expiresIn});
},
logout({commit}) {
this.$axios.setToken(false);
cookies.remove('x-access-token');
commit('REMOVE_TOKEN');
}
};
I will explain the actions one by one:
-
setToken
- it sets the token in axios, in the cookie and calls theSET_TOKEN
commit -
refreshToken
- it send POST request to the API to refresh the token and dispatchessetToken
action -
logout
- it removes the token form axios, cookie and from the state
In the pages folder, add these vue files: register.vue
, login.vue
, secret.vue
.
Then in the pages/register.vue
add this
<template>
<div class="container">
<b-form @submit.prevent="register">
<b-form-group
id="input-group-1"
label="Email address:"
label-for="input-1"
>
<b-form-input
id="input-1"
v-model="form.email"
type="email"
required
placeholder="Enter email"
></b-form-input>
</b-form-group>
<b-form-group id="input-group-2" label="Your Name:" label-for="input-2">
<b-form-input
id="input-2"
v-model="form.name"
required
placeholder="Enter name"
></b-form-input>
</b-form-group>
<b-form-group id="input-group-3" label="Password:" label-for="input-3">
<b-form-input
id="input-3"
type="password"
v-model="form.password"
required
placeholder="Enter password"
></b-form-input>
</b-form-group>
<b-button type="submit" variant="primary">Submit</b-button>
</b-form>
</div>
</template>
<script>
export default {
data() {
return {
form: {
email: '',
name: '',
},
}
},
methods: {
register() {
this.$axios.$post('register', this.form)
.then(({token, expiresIn}) => {
this.$store.dispatch('setToken', {token, expiresIn});
this.$router.push({name: 'secret'});
})
.catch(errors => {
console.dir(errors);
});
},
}
}
</script>
pages/login.vue
is pretty similar to register, we just need to make some slight changes
<template>
<div class="container">
<b-form @submit.prevent="login">
<b-form-group
id="input-group-1"
label="Email address:"
label-for="input-1"
>
<b-form-input
id="input-1"
v-model="form.email"
type="email"
required
placeholder="Enter email"
></b-form-input>
</b-form-group>
<b-form-group id="input-group-3" label="Password:" label-for="input-3">
<b-form-input
id="input-3"
type="password"
v-model="form.password"
required
placeholder="Enter password"
></b-form-input>
</b-form-group>
<b-button type="submit" variant="primary">Submit</b-button>
</b-form>
</div>
</template>
<script>
export default {
data() {
return {
form: {
email: '',
name: '',
},
}
},
methods: {
login() {
this.$axios.$post('login', this.form)
.then(({token, expiresIn}) => {
this.$store.dispatch('setToken', {token, expiresIn});
this.$router.push({name: 'secret'});
})
.catch(errors => {
console.dir(errors);
});
},
}
}
</script>
In the pages/secret.vue
add this
<template>
<h2>THIS IS SOME SECRET PAGE</h2>
</template>
<script>
export default {
middleware: 'auth',
}
</script>
We must make route middleware for auth, in the middleware folder add new auth.js
file, and add this
export default function ({ store, redirect }) {
if (! store.state.token) {
return redirect('/');
}
}
Now we will make the navbar. Change layouts/deafult.vue
like this
<template>
<div>
<div>
<b-navbar toggleable="lg" type="dark" variant="info">
<b-navbar-brand href="#">NavBar</b-navbar-brand>
<b-navbar-toggle target="nav-collapse"></b-navbar-toggle>
<b-collapse id="nav-collapse" is-nav>
<b-navbar-nav class="ml-auto" v-if="isLoggedIn">
<b-nav-item :to="{name: 'secret'}">Secret Page</b-nav-item>
<b-nav-item href="#" right @click="logout">Logout</b-nav-item>
</b-navbar-nav>
<b-navbar-nav class="ml-auto" v-else>
<b-nav-item :to="{name: 'login'}">Login</b-nav-item>
</b-navbar-nav>
</b-collapse>
</b-navbar>
</div>
<nuxt />
</div>
</template>
<script>
export default {
computed: {
isLoggedIn() {
return this.$store.state.token;
}
},
methods: {
logout() {
this.$axios.$post('logout')
.then(resp => {
this.$store.dispatch('logout');
this.$router.push('/');
})
.catch(errors => {
console.dir(errors);
});
}
}
}
</script>
...
And in order for the access token to be refreshed, we will add another middleware that will be applied to every route. To do this, in nuxt.config.js
add this
export default {
...
router: {
middleware: 'refreshToken',
},
...
}
And create that middleware. In the middleware folder add new file refreshToken.js
and add this
import cookies from 'js-cookie';
export default function ({ store, redirect }) {
const token = cookies.get('x-access-token');
if (! token) {
store.dispatch('refreshToken')
.catch(errors => {
console.dir(errors);
store.dispatch('logout');
});
}
}
Here we check if the user has token in the cookies, if he doesn't, we will try to refresh his token, and assign him a new access token.
And that's it. Now we have authentication system that's secure, because even if someone is able to steal the access token of some user, he won't have much time to do anything with it.
This was a long post, but I hope that the concepts are clear and concise. If you have any questions or if you think that something can be improved, please comment below.
Top comments (85)
Hey,
For some reason I keep getting
message: "Your refresh token is expired."
I suspect that here:
const {token, expiresIn} = await this.$axios.$post('refresh-token');
I am not sending a request with a
refresh_token
cookie attached? Can you please explain how refresh_token should be being passed here?When your
access_token
has expired (because it's short-lived), we are sending aPOST
request to therefresh-token
route, which calls therefreshToken
method in the Controller. There we are checking if thehttponly
cookie is passed with the request, if it is, then we are getting a newaccess_token
and newrefresh_token
.Hi @stefan
I am also encountering this problem. I tested on Postman and I can see the
refresh_token
into the cookie so I can get it throughrequest()->cookie('cookie')
i.imgur.com/YxbCYde.png
But on my browser, the
refresh_token
cookie is not existing. I already addedAddQueuedCookiesToResponse
in Kernel.php and tried to except the cookie inEncryptCookies
but still,refresh_token
is not existing.i.imgur.com/WsGiaYi.png
Did I miss anything? THanks in advance.
As the
refresh_token
is set to beHttpOnly
cookie, you can't access it or see it in the browser cookies. Therefresh_token
is used only to renew theaccess_token
when it expires.Yeah, this is clear, but for some reason, the cookie is not being passed from nuxt in the first place in the
await this.$axios.$post('refresh-token');
. Can this be because my front-end and back-end are on different domains? And how to overcome this?dump(request()->cookie())
returns an empty array on Cors.php middleware on /api/refresh-token requestWill your guide work in case my laravel api is
site.test
and my nuxt is running onlocalhost:3000
for e.g.? Because I coming to the conclusion that top-level domains must be the same for this to work?No, your apps can be on different domains, and this would still work. I can't know for sure what went wrong in your case. Maybe the
httponly
cookie isn't set in the first place, or you're sending the request without the cookie. Until I see the errors or some code, I can't know what's wrong.Was there a solution to this issue? I'm currently having the exact error when refresh token is called.
Update:
I ran this in the login after grantPasswordToken function:
Log::notice(cookie('refresh_token'));
and here is the response:
refresh_token=deleted; expires=Mon, 28-Oct-2019 22:11:22 GMT; Max-Age=0; path=/; httponly
This is a very usefull tutorial. I have implemented this in our prototype project but one of my colleague is complaining when the page is refreshed the user is being signed out so he implemented saving the token in the local storage. Am I right that the implementation is SPA so page reload is not needed but how did you circumvent when users try to refresh the page?
Thanks for this tutorial!
Never save the token in the local storage, if you do, you are exposing your app to potential attacks. If you are using Nuxt.js, you should simply make plugin and put this
As stated in the Nuxt.js docs for the plugin:
If you are using some other JS library, check their doocumentation and see how can you run some function before instantiating the root app.
Hi, this is a really great tutorial, any chance you would go into this part in a bit more detail, with refreshing the token in window.onNuxtReady()? I did a version which checks if x-access-token is set similar to the middleware, and then does router push to '/', but it's quite choppy and not sure how secure. Would be a nice addition to the post. Thanks!!!
I'm not sure if that requires whole new post, but maybe I'll do part 2 in addition to this post. Basically what you need to do is this:
window.onNuxtReady()
check if user is set in the vuex AND there isn't x-access-token in the cookiesI'd love to see how you apply it on code - having the same issues right now more or less. I want the user to stay logged on refresh.
I am also got the similar error, get logout everytime i do a refresh, any option ?
Once a user has logged in, you should put
user_id
in the cookies. Then make a plugin that will check if the user exists andx-access-token
does not exist, if these conditions are true, then you should dispatch an action to refresh the token.This doesn't seem to work for me, does this work for anyone else? It STILL signs me out every time I refresh the page. very annoying
Hi! Thanks for the article! One thing to note though -- will refreshing part work in universal mode (SSR) after page reload?
Let's imagine that you're authenticated and reading some page with auth middleware for 5 minutes (for access token to expire). Then you click refresh button in browser and several things will happen:
refreshToken.js
middleware will not work (because it will be fired from node.js server which has no refresh_token cookie, this cookie only available in browser) -- so you'll get "unauthenticated"asyncData
orfetch
to retrieve some data against auth middleware in laravel - you actually will not be able to do so either (also because there isn't refresh_token cookie in node.js)Actually if user visits auth page after access_token expiration then he will be logged out too. (For example if user tries to visit auth page on the next day or event after one hour)
Any way to get around these things?
Yes, I haven't covered that in this post, but I have posted a solution for this in the comments, here's a link. I think I should write a short post on this subject.
Thanks for the response!
Yes, I saw this comment, but I don't understand how it will solve the problems (okay, it may solve the first problem I described, but not the second -- which is most important).
I think if you store refresh_token in cookie -- there is no way to use
asyncData
orfetch
on api routes protected by auth middleware, because we have to do requests from node.js server for asyncData and fetch to work and we will be unauthenticated because of expired access_token and having no way to refresh it from node.I never tested it like that, but I use SSR only for SEO optimization, so if some content needs authentication, then in my case it doesn't need to be server-side rendered. But I have an idea how to get it to work, I'll try it as soon as I can.
Hmm, you're right actually... It doesn't make much sense to use asyncData() on auth pages.
But it would be nice to hear your idea about this case anyway )
Hi, I'm exactly stuck in this scenario. In this post Laravel httpOnly cookie is useless. because the author saving a cookie in frontend instead of using that httpOnly cookie. Ofcause, the author can't! Because when calling client-side HTTP request, httpOnly cookie which server sent, does not persistently save in the browser. Nuxt also cannot create httpOnly cookie even if it running on NodeJs! I have search about this issue and Nuxt authors are not capable to do that. github.com/nuxt-community/auth-mod...
This is fantastic! Thanks so much for posting. Any thoughts on modifying this because of Laravel Airlock? I assume this approach works well for SSR Nuxt (Universal) too...
Thanks. Yes, it works well, you just need to check for the cookie in the
nuxtServerInit
function. As for airlock, I haven't tried it, but I assume that same flow would be applied.Trying to work this out with SSR (Universal) flow (everything worked great for SPA). When I make the original
login
call I get back thex-access-token
, but therefresh_token
is only listed in the Response/Request headers. I can set thex-access-token
into cookie storage, but I'm not sure where therefresh_token
ends up (can't seem to access it)Once the time on the
x-access-token
expires, a page refresh or change triggers therefreshToken
call, but therefresh_token
is not set as a cookie for that call back to the server, and then I get the 403.I suppose I'm supposed to store the
refresh_token
as a cookie - but not sure how to even get it when it comes in. It seemed like SPA just kept it around...You shouldn't store the
refresh_token
anywhere, it should behttponly
cookie. As the name suggests, therefresh_token
should be used for refreshing theaccess_token
once it's expired.OK - yeah, with SSR on the
/api/refresh_token
call, I'm getting a 500 - aUndefined property: stdClass::$refresh_token
error in the ProxyRequest controller. It gets all the way tomakePostRequest
but then fails here:$this->setHttpOnlyCookie($resp->refresh_token);
With dev tools, I can see the refresh_token listed under Request Cookies, but it doesn't seem to be going up with the request (axios log doesn't list it)
Hmm, if the refresh_token is in the Request Cookies, it should work fine. Do you
json_decode
the response?Almost got this working - still Request is malformed - getting these two errors: Laravel\Passport\Exceptions\OAuthServerException
The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed.
ErrorException
Undefined property: stdClass::$refresh_token
and yes - following your code above explicitly:
$proxy = \Request::create('oauth/token', 'post', $params);
$resp = json_decode(app()->handle($proxy)->getContent());
I can't help you unless I see your code :(
However, you can check the github links:
and make sure that your code matches.
Got it....Clear those old cookies people, lest you spend hours chasing your tail. (Refresh tokens are set for longer periods...)
I'm having exact same issues now. Driving me mad - cannot figure out how to resolve it - any help?
And yes, I followed the tutorial 100% same.
EDIT: FOUND THE ISSUE!
seems like the .env wasn't configured properly - make sure the following exists:
PASSWORD_CLIENT_ID=2
PASSWORD_CLIENT_SECRET={secret_created_by_passport_in_step_1}
Yes, I mention that in the post, I guess you missed that part :D
Why not using the
laravel.passport
strategy innuxt.config.js
, as documented below ?auth.nuxtjs.org/providers/laravel-...
I'm actually struggling with it : from Nuxt.js, I'm redirected to Laravel login page and then back to Nuxt.js homepage with a
code
andstate
, but I don't know how to use it to get token.I am encountering the same problem. Have you figured out the solution? I posted this on stackoverflow but no reply yet. Maybe
middleware:auth
in nuxtjs for laravel passport has a problem. Very frustrating. Sigh!stackoverflow.com/questions/634971...
It's not flexible enough for my needs...
Just a couple things I noticed while working through this:
refreshTo()
(should berefreshToken()
)nuxt.config.js
:credentials
should bewithCredentials: true
, correct?refreshTo
intorefreshToken
You is not change
refreshTo
intorefreshToken
in this tutorial ))It looks like the refresh_token part is not working, unless I missed something. I can login,
x-access-token
is there - but when it comes time to refresh - I get the403
error.I was totally wrong about the
withCredentials
key...everything kept failing till I put it back the way you had it withcredentials
instead...weird because it goes against everything else I see.THANK YOU!
Hi there, I'm running into a CORS issue that I can't seem to get around. I'm using Laravel 7.5.2. Basically anytime I try to use the register function I get: Access to XMLHttpRequest at 'myapi.test/api/register' from origin 'localhost:3000' has been blocked by CORS policy: Response to preflight request doesn't pass access control check: The value of the 'Access-Control-Allow-Credentials' header in the response is '' which must be 'true' when the request's credentials mode is 'include'. The credentials mode of requests initiated by the XMLHttpRequest is controlled by the withCredentials attribute. If I change the 'credentials' to 'withCredentials', it passes the CORS preflight, but then the token part does not appear to be working.
***FOLLOW UP: I'm still using the 'withCredentials' parameter. The issue going in that direction was in the .env using CLIENT_ID as opposed to PASSWORD_CLIENT_ID. That was mentioned before in this thread. Thanks!
This is a very useful lesson. Thank you author. I am new to frontend. Sorry for the stupid question. I have an error with CORS :
Can someone please explain in more detail what is the reason? And how is this solved?
... I using idea Ken Hall and this work for me. But i don't understand reason this problem.
And my refresh token expired on re-try to navigate to the page /secret =))
And there’s one more thing I don’t understand. For some reason, my navigation bar is not showing. What could be the reason?
I would also be interested in knowing how to adapt this code to use the new PKCE.
HEEEEY, I love this article so much. I finally could have a little of sense what AUTH is.
After a little of time spending to overcome page reload issue, I customized bit of your code.
Key issue was that I have to make my client read cookie from SSR part.
1) To get cookie from SSR, install 'cookieparser'
npm i cookieparser -S
2) @ store/index.js
const cookieparser = process.server ? require('cookieparser') : undefined
and action part,
async nuxtServerInit ({ commit, dispatch }, {req}) {
const token = cookieparser.parse(req.headers.cookie)['x-access-token']
await commit('SET_TOKEN', token);
},
3) @ middleware/refreshToken.js
if (! store.state.token) {
store.dispatch('refreshToken')
.catch(errors => {
store.dispatch('logout');
});
}else{
}
Hope this helps some people who are struggling to overcome page reload issue.
Hi, Thanks for this post. Does
cookie()->queue
work in you? I tried this but it can't retrieve the cookie. I already added AddQueuedCookiesToResponse in Kernel.php and also added the cookies in EncryptCookies.php. I think, I can't get cookie values in Laravel API. Is there anything I missed? Thanks for the helpSome comments may only be visible to logged-in visitors. Sign in to view all comments.