A spec compliant, secure by default PHP OAuth 2.0 Server
Go to file
Ian Littman 9775c0076b Look at Authorization header directly for HTTP Basic auth check
Should allow for better compatibility with server implementations that aren't sitting on top of a standard SAPI (e.g. persistent web servers building a PSR-7 compatible request from a socket-received message).

One catch here is that I've seen Apache hijack the HTTP Authorization header in the past, though that would probably impact the other aspects of the server just as much as it would this, so I think that risk is manageable.

Added tests to cover all paths through the new code, so the AbstractGrant type still has 100% coverage :)

Did notice that, as of the latest versions of PHPUnit, the mock creation method is deprecated. Maybe that needs to be updated? Haven't checked to see whether the replacements are PHPUnit 4.8 compatible though, so maybe they need to stay in order to test on older PHP versions?
2016-06-21 21:08:38 -05:00
examples Updated examples. Fixes #589 2016-06-02 09:35:27 +01:00
src Look at Authorization header directly for HTTP Basic auth check 2016-06-21 21:08:38 -05:00
tests Look at Authorization header directly for HTTP Basic auth check 2016-06-21 21:08:38 -05:00
.gitattributes Updated .gitignore / .gitattributes files 2016-02-12 17:51:28 +00:00
.gitignore Updated .gitignore / .gitattributes files 2016-02-12 17:51:28 +00:00
.scrutinizer.yml Updated .scrutenizer.yml 2016-04-18 12:23:13 +01:00
.styleci.yml Create .styleci.yml 2016-02-19 23:08:32 +00:00
.travis.yml Merge branch 'V5-WIP' 2016-04-17 13:21:22 +01:00
CHANGELOG.md First commit of update changelog 2016-05-10 08:10:50 +01:00
composer.json Added indigophp/hash-compat to suggest and require dev for PHP 5.5 support 2016-05-06 15:23:57 +01:00
CONDUCT.md Added code of conduct 2016-01-13 00:46:18 +00:00
CONTRIBUTING.md Update CONTRIBUTING.md 2013-12-06 10:50:22 +00:00
LICENSE Rename license file 2015-12-03 14:30:37 +01:00
phpunit.xml.dist Ignore TemplateRenderer method 2016-03-10 17:45:31 +00:00
README.md Updated commercial support statement 2016-05-10 13:23:56 +01:00

PHP OAuth 2.0 Server

Latest Version Software License Build Status Coverage Status Quality Score Total Downloads

league/oauth2-server is a a standards compliant implementation of an OAuth 2.0 authorization server written in PHP which makes working with OAuth 2.0 trivial. You can easily configure an OAuth 2.0 server to protect your API with access tokens, or allow clients to request new access tokens and refresh them.

It supports out of the box the following grants:

  • Authorization code grant
  • Implicit grant
  • Client credentials grant
  • Resource owner password credentials grant
  • Refresh grant

The following RFCs are implemented:

This library was created by Alex Bilbie. Find him on Twitter at @alexbilbie.

Requirements

The following versions of PHP are supported:

  • PHP 5.5 (>=5.5.9)
  • PHP 5.6
  • PHP 7.0
  • HHVM

The openssl extension is also required.

Documentation

The library documentation can be found at https://oauth2.thephpleague.com. You can contribute to the documentation in the gh-pages branch.

Changelog

See the project releases page

Contributing

Please see CONTRIBUTING.md and CONDUCT.md for details.

Support

Bugs and feature request are tracked on GitHub.

If you have any questions about OAuth please open a ticket here; please don't email the address below.

Commercial Support

If you would like help implementing this library into your existing platform, or would be interested in OAuth advice or training for you and your team please get in touch with Glynde Labs.

Security

If you discover any security related issues, please email hello@alexbilbie.com instead of using the issue tracker.

License

This package is released under the MIT License. See the bundled LICENSE file for details.

Credits

This code is principally developed and maintained by Alex Bilbie.

Special thanks to all of these awesome contributors

The initial code was developed as part of the Linkey project which was funded by JISC under the Access and Identity Management programme.