DivineOmega / laravel-password-exposed-validation-rule by DivineOmega

Laravel validation rule that checks if a password has been exposed in a data breach
608,306
87
8
Package Data
Maintainer Username: DivineOmega
Maintainer Contact: jordan@hall05.co.uk (Jordan Hall)
Package Create Date: 2018-04-26
Package Last Update: 2023-01-31
Home Page:
Language: PHP
License: LGPL-3.0-only
Last Refreshed: 2024-04-26 03:03:03
Package Statistics
Total Downloads: 608,306
Monthly Downloads: 5,747
Daily Downloads: 283
Total Stars: 87
Total Watchers: 8
Total Forks: 26
Total Open Issues: 3

🔒 Laravel Password Exposed Validation Rule

This package provides a Laravel validation rule that checks if a password has been exposed in a data breach. It uses the haveibeenpwned.com passwords API via the divineomega/password_exposed library.

Installation

To install, just run the following Composer command.

composer require divineomega/laravel-password-exposed-validation-rule

Please note that this package requires Laravel 5.1 or above.

Usage

The following code snippet shows an example of how to use the password exposed validation rule.

use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed;

$request->validate([
    'password' => ['required', new PasswordExposed()],
]);

If you wish, you can also set a custom validation message, as shown below.

use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed;

$request->validate([
    'password' => ['required', (new PasswordExposed())->setMessage('This password is not secure.')],
]);