haringsrob / socialment

Socialite OAuth Support for Filament

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Socialment - Socialite OAuth Support for Filament

Socialment

Latest Version on Packagist Tests Action Status Code Style Action Status PHPStan Action Status Total Downloads

About

Bring up-to-date and simple Socialite support to your Filament admin panel with this plugin. Adds OAuth buttons to your login page.

Ideal for Laravel and Filament users seeking a straightforward OAuth integration.

Warning

Socialment is currently in beta. Please report any issues you encounter.

Caution is advised if you choose to use this package in production.

Azure AD support has been the only tested provider so far.

References

This package extends Laravel Socialite. Socialite currently supports authentication via Facebook, Twitter, LinkedIn, Google, GitHub, GitLab, and Bitbucket out of the box.

Refer to the Socialite documentation for more information on how to configure your application to use these providers.

Many other providers are available via the Socialite Providers website. Refer to the documentation for each provider for information on how to configure your application to use them.

Demo

For an example usage of this package, see ChrisReedIO/Socialment-Demo.

image


Installation

You can install the package via composer:

composer require chrisreedio/socialment

Usage

Initial Setup

You can easily perform the initial setup by running the following command:

php artisan socialment:install

Additionally, edit your panel's tailwind.config.js content section to include the last line of the following:

    content: [
    "./app/Filament/**/*.php",
    "./resources/views/filament/**/*.blade.php",
    "./vendor/filament/**/*.blade.php",
    // ... Other Content Paths

    // Ensure the line below is listed!!!
    "./vendor/chrisreedio/socialment/resources/**/*.blade.php",
],

If this step is forgotten, the styling of the plugin will not be applied.

Please continue to the next sections to continue the setup process.

Panel Configuration

Include this plugin in your panel configuration:

$panel
	->plugins([
		// ... Other Plugins
        \ChrisReedIO\Socialment\SocialmentPlugin::make(),        
	])

Provider Configuration

Important

At this point, you'll need to configure your application to use the provider(s) you want to support.

Either configure the needed stock socialite providers or community maintained providers.

Refer to the Socialite documentation for more information.

This will usually involve installing a package and configuring your application's config/services.php file.

Socialment Configuration

Whether you're using the default providers or adding your own, you'll need to configure them in the socialment.php config file.

Configure the socialment.php config file to specify providers in the following format:

return [
    'providers' => [
        'azure' => [
            'icon' => 'fab-microsoft', // Font Awesome Brand Icon
            'label' => 'Azure', // Display Name on the Login Page
        ]
    ],
	// ... Other Configuration Parameters
];

Providers specified in the config file are global across all panels.

Per-Panel Provider Configuration

You may also specify providers on a per-panel basis. To do this use the ->registerProvider method on the plugin.

$panel->plugins([
    \ChrisReedIO\Socialment\SocialmentPlugin::make()
        ->registerProvider('azure', 'fab-microsoft', 'Azure Active Directory'),
]);
Sample Provider Configuration - Azure Active Directory

Important

For this configured Azure provider, the redirect URI would be https://DOMAIN/login/azure/redirect

The callback URI would be https://DOMAIN/login/azure/callback

For example, the sample provider included in the stock socialment.php config is Azure Active Directory. To start, You would refer to the documentation for the Azure Socialite Provider.

Normally, you would follow the providers documentation on the aforementioned link but to demostrate the process for Socialment, I'll include the steps here.

Per their documentation, you would install the community Azure provider via

composer require socialiteproviders/microsoft-azure

Then you would configure your config/services.php file to include the Azure provider's credentials:

'azure' => [    
  'client_id' => env('AZURE_CLIENT_ID'),
  'client_secret' => env('AZURE_CLIENT_SECRET'),
  'redirect' => env('AZURE_REDIRECT_URI'),
  'tenant' => env('AZURE_TENANT_ID'),
  'proxy' => env('PROXY')  // optionally
],

In addition, you need to add this provider's event listener to your app/Providers/EventServiceProvider.php file:

protected $listen = [
	// ... other listeners

    \SocialiteProviders\Manager\SocialiteWasCalled::class => [
        // ... other providers
        \SocialiteProviders\Azure\AzureExtendSocialite::class.'@handle',
    ],
];

Finally, don't forget to add the needed environment variables to your .env file:

AZURE_CLIENT_ID=
AZURE_CLIENT_SECRET=
AZURE_REDIRECT_URI=
AZURE_TENANT_ID=

The usage section can usually be ignored as that is the main part this package should handle for you.

Note

It is in the plans to improve the handling of the sign in process to align more with Socialstream in allowing you to specify an action class or closure to handle the sign in process.

This will allow for customized handling on a per provider, per application basis.

This package also uses the Blade Font Awesome package by Owen Voke.

Search for brand icons on the Font Awesome Website.

Visibility Override

By default, the plugin displays the configured providers at the bottom of the login form. You can additionally override the visibility of the plugin by passing a boolean or closure to the visible method:

$panel->plugins([
    \ChrisReedIO\Socialment\SocialmentPlugin::make()
        ->visible(fn () => false)
]);

Extras

You may publish and customize the views using

php artisan vendor:publish --tag="socialment-views"

Login Callbacks

You may configure pre/post login hooks/callbacks by adding code similar to the following to the boot method of a service provider:

use ChrisReedIO\Socialment\Models\ConnectedAccount;

public function boot(): void
{
    // Post Login Hook
	Socialment::preLogin(function (ConnectedAccount $connectedAccount) {
		// Handle custom pre login logic here.
	});
	// Multiple hooks can be added
	Socialment::preLogin(function (ConnectedAccount $connectedAccount) {
		// Handle additional custom pre login logic here if you need.
	});

    // Post Login Hook
	Socialment::postLogin(function (ConnectedAccount $connectedAccount) {
		// Handle custom post login logic here.
		Log::info('User logged in with ' . $connectedAccount->provider . ' account', [
			'connectedAccount' => $connectedAccount,
		]);
	});
}

The user relation can be accessed via $connectedAccount->user.

The ConnectedAccount is passed instead of the User so that you can easily know which social account was used for the login.

Login Route for failed logins

If a login fails or encounters a InvalidStateException, the user will be redirected to the configured loginRoute route.

This defaults to filament.admin.auth.login but can be overriden on the plugin declaration in your panel provider configuration:

$panel->plugins([
    \ChrisReedIO\Socialment\SocialmentPlugin::make()
        ->loginRoute('filament.staff.auth.login')
]);

You may also use a closure here to dynamically set the route:

$panel->plugins([
    \ChrisReedIO\Socialment\SocialmentPlugin::make()
        ->loginRoute(fn () => SomeFunctionToGetTheRouteName())
]);

Config

This is the contents of the published config file:

return [
	'view' => [
		// Set the text above the provider list
        'prompt' => 'Or Login Via',
		// Or change out the view completely with your own
		'providers-list' => 'socialment::providers-list',
	],
	'routes' => [
		'home' => 'filament.admin.pages.dashboard',
	],
	'models' => [
		// If you want to use a custom user model, you can specify it here.
		'user' => \App\Models\User::class,
	],
	'providers' => [
        'azure' => [
        	'icon' => 'fab-microsoft',
        	'label' => 'Azure Active Directory',
        ]
	],
];

Frontend SPA Authentication

Caution

This feature is still in development and thus highly experimental. Expect breaking changes and bugs. Use at your own risk.

Setup

A new guard, spa is added to your config/auth.php file.

In the future, this will be configurable but for now, you must use the spa guard.

    'guards' => [
        // ... Other Guards
        'spa' => [
            'driver' => 'session',
            'provider' => 'users',
        ],
    ],

You may configure the spa guard to use a different provider if you wish.

You'll need to create a new spa routes file in your routes directory.

<?php

use App\Http\Controllers\AuthController;
use Illuminate\Support\Facades\Route;
use Laravel\Sanctum\Http\Controllers\CsrfCookieController;

// Custom SPA specific route for getting a CSRF cookie
Route::get('sanctum/csrf-cookie', [CsrfCookieController::class, 'show'])->name('csrf-cookie');
// Local Account Login from the SPA
Route::post('login', [AuthController::class, 'login'])->name('login');

// Routes that require authentication go in here
Route::middleware(['spa.auth'])->group(function () {
    // Logs out the currently authenticated SPA User (local or social)
    Route::post('logout', [AuthController::class, 'logout'])->name('logout');
    // Returns information about the currently logged-in user, 401 if not logged in
    Route::get('me', [AuthController::class, 'me'])->name('me');
});

A few notes about the above code.

If you're SPA is minimal you may not need most (if any) of the above routes.

The routes targeting the AuthController are only for 'local user' (non-social) authentication.

Middleware

The spa.auth middleware is provided by this package and will ensure that the user is authenticated via the spa guard.

Speaking of Middleware, if using the spa/csrf-cookie and spa/login routes above, you'll need to modify your VerifyCsrfToken middleware to exclude these routes.

    protected $except = [
        'spa/sanctum/csrf-cookie',
        'spa/login',
    ];

Ensure that in your app/Http/Kernel.php you add the spa middleware group to the $middlewareGroups array:

    protected $middlewareGroups = [
        // ... Usually api and web middleware groups are here
        'spa' => [
            \App\Http\Middleware\EncryptCookies::class,
            \Illuminate\Cookie\Middleware\AddQueuedCookiesToResponse::class,
            \Illuminate\Session\Middleware\StartSession::class,
            \Illuminate\View\Middleware\ShareErrorsFromSession::class,
            \App\Http\Middleware\VerifyCsrfToken::class,
            \Illuminate\Routing\Middleware\SubstituteBindings::class,
        ],
    ];

One more thing while you're in the app/Http/Kernel.php file. You'll need to add the spa.auth middleware alias to the $middlewareAliases array:

    protected $middlewareAliases = [
        // ... Other Aliases
        'spa.auth' => \ChrisReedIO\Socialment\Http\Middleware\SpaAuthentication::class,
    ];

Now open your RouteServiceProvider and add the following to the routes in the boot method:

    public function boot(): void
    {
        $this->routes(function () {
            // ... Other Route Files
            Route::middleware('spa')
                ->prefix('spa')
                ->as('spa.')
                ->group(base_path('routes/spa.php'));        
        });
    }

This will be configurable in the future but for now, you must use the spa prefix.

Configuration Changes

You'll need to add the new guard to your app's config/auth.php file:

    'guards' => [
        // ... Other Guards
        'spa' => [
            'driver' => 'session',
            'provider' => 'users',
        ],
    ],

Next is the config/cors.php file. You'll need to add the following to the paths array:

    'paths' => [
        // ... Other Paths
        'spa/*',
    ],

The allowed_origins has been configured for testing but this may not actually need to be set. I'll update this section once final testing is complete.

Also ensure that the supports_credentials is set to true:

    'supports_credentials' => true,

For the final config file change, open sanctum.php and ensure that the guard array includes the spa guard:

    'guard' => [
        // ... Other Guards
        'spa',
    ],

Environment Variables

We need to set a few ENV variables to ensure that the SPA authentication works properly.

SANCTUM_STATEFUL_DOMAINS="https://frontend.localhost:3000,https://backend.localhost"
SESSION_DOMAIN=".localhost"
SESSION_SECURE_COOKIE=true
SPA_URL="https://frontend.localhost:3000"

The SESSION_DOMAIN should be the shared domain between your SPA and your backend. It should begin with a period.

The SPA_URL is the URL of your SPA application.

Note

Ths SPA functionality is a work in progress and is subject to change.

This documentation section will be updated as the feature is finalized.

Testing

Note

Tests have yet to be written for this package. They are on my TODO list. I'm also open to PRs.

composer test

Changelog

Please see CHANGELOG for more information on what has changed recently.

Contributing

Please see CONTRIBUTING for details.

Security Vulnerabilities

Please review our security policy on how to report security vulnerabilities.

Credits

License

The MIT License (MIT). Please see License File for more information.

About

Socialite OAuth Support for Filament

License:MIT License


Languages

Language:PHP 92.8%Language:Blade 5.6%Language:JavaScript 1.4%Language:CSS 0.2%