security: # https://symfony.com/doc/current/security.html#registering-the-user-hashing-passwords password_hashers: Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: 'auto' # https://symfony.com/doc/current/security.html#loading-the-user-the-user-provider providers: app_user_provider: id: Basango\IdentityAndAccess\Infrastructure\Framework\Symfony\Security\SecurityUserProvider firewalls: dev: pattern: ^/(_(profiler|wdt)|css|images|js)/ security: login: pattern: ^/api/login stateless: true json_login: check_path: /api/login_check success_handler: lexik_jwt_authentication.handler.authentication_success failure_handler: lexik_jwt_authentication.handler.authentication_failure user_checker: Basango\IdentityAndAccess\Infrastructure\Framework\Symfony\Security\UserChecker api: pattern: ^/api stateless: true entry_point: jwt jwt: ~ refresh_jwt: check_path: /api/token/refresh logout: path: api_token_invalidate user_checker: Basango\IdentityAndAccess\Infrastructure\Framework\Symfony\Security\UserChecker main: lazy: true provider: app_user_provider user_checker: Basango\IdentityAndAccess\Infrastructure\Framework\Symfony\Security\UserChecker # Easy way to control access for large sections of your site # Note: Only the *first* access control that matches will be used access_control: - { path: ^/api/register, roles: PUBLIC_ACCESS } - { path: ^/api/login, roles: PUBLIC_ACCESS } - { path: ^/api/token/refresh, roles: PUBLIC_ACCESS } - { path: ^/api/password/(request|reset), roles: PUBLIC_ACCESS } - { path: ^/api/account/(unlock|confirm), roles: PUBLIC_ACCESS } - { path: ^/api/aggregator/articles, roles: PUBLIC_ACCESS } - { path: ^/api, roles: IS_AUTHENTICATED_FULLY } when@test: security: password_hashers: # By default, password hashers are resource intensive and take time. This is # important to generate secure password hashes. In tests however, secure hashes # are not important, waste resources and increase test times. The following # reduces the work factor to the lowest possible values. Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: algorithm: auto cost: 4 # Lowest possible value for bcrypt time_cost: 3 # Lowest possible value for argon memory_cost: 10 # Lowest possible value for argon