This is a lightweight package which allow you to manage a session in a stateless communication (REST/API) when the API domain and main web application domain are different.
E.g.
- API hosted under:
api.foo.com
- WEB hosted under:
tenant1.com
,tenant2.com
etc.
In that case you cannot set cookie for different main domains
See why you cannot set cookie under different domain.
You can install the package via composer:
composer require binarcode/laravel-stateless-session
-
Trigger session, make a GET request to:
/api/csrf-header
. This will return a header with the session key and an optional header with CSRF tokenXSRF-TOKEN
. The header name could be configured in:stateless.header
-
Use this header session key/value for every request you want to take care of the session.
-
If you want to benefit of the CSRF protection of your requests, you should add the follow middlewares to your routes:
use Binarcode\LaravelStatelessSession\Http\Middleware\StatelessStartSession;
use Binarcode\LaravelStatelessSession\Http\Middleware\StatelessVerifyCsrfToken;
->middleware([
StatelessStartSession::class,
StatelessVerifyCsrfToken::class,
]);
You can create a middleware group in your Http\Kernel with these 2 routes as:
protected $middlewareGroups = [
// ...
'stateless.csrf' => [
StatelessStartSession::class,
StatelessVerifyCsrfToken::class,
],
// ...
]
Now the server will return 419 (Page expired code).
Unless you send back a request header named: X-CSRF-TOKEN
with the value received by the first GET request in the XSRF-TOKEN
header.
Done.
-
At this point you have CSRF protection.
-
And you can play with
SessionManager
and use thesession()
helper to store/get information (e.g. flash sessions).
The lifetime and other options could be set as before in the session
file.
The VerifyHeaderCsrfToken
and StartStatelessSession
middlewares will inject into headers the session key.
The session key name could be configured in the:
stateless.header => env('STATELESS_HEADER', 'X-STATELESS-HEADER')
Danger: The key name separators should use -
not _
according with this.
You can customize the middleware for the csrf-header
route. In some cases you may need some custom cors middleware for example:
stateless.middleware => [
\Barryvdh\Cors\HandleCors::class,
]
Let's say you want to allow visitors to submit a newsletter form. You want also to protect your API with CSRF.
You can setup a GoogleRecaptcha for that, but that's so annoying.
Solution:
Vue newsletter page:
// Newsletter.vue
{
async created() {
const response = await axios.get(`${host}/api/csrf-header`);
this.csrfToken = response.headers['XSRF-TOKEN'];
this.sessionKey = response.headers['LARAVEL-SESSION'];
},
methods: {
async subscribe() {
await axios.post(`${host}/api/newsletter`, {email: '[email protected]'}, {
headers: {
'LARAVEL-SESSION': this.sessionKey,
'X-CSRF-TOKEN': this.csrfToken
}
});
}
}
}
api.php
Route::post('api/subscribe', function (Request $request) {
// at this point the CSRF token is verified
Subscribers::createFromEmail($request->get('email'));
return response('', 201)->json();
})->middleware([
StartStatelessSession::class,
VerifyHeaderCsrfToken::class,
]);
composer test
Please see CHANGELOG for more information what has changed recently.
Please see CONTRIBUTING for details.
Since the Session Key and X-CSRF-TOKEN could be read by the JavaScript code, that means it's less secure than a usual http-only Cookie. But since we have different domains for the API and WEB, we don't have a way to setup a cookie. You can think of this as of the Bearer token. The security impact is exactly the same.
If you discover any security related issues, please email [email protected] instead of using the issue tracker.
The MIT License (MIT). Please see License File for more information.