A secure and extensible token manager for Laravel, designed to store, encrypt, and decrypt tokens or API keys. This is useful when you are building an application that require to store sensitive information.
You can install the package via composer:
composer require cleaniquecoders/token-vault
You can publish and run the migrations with:
php artisan vendor:publish --tag="token-vault-migrations"
php artisan migrate
You can publish the config file with:
php artisan vendor:publish --tag="token-vault-config"
Hereβs the updated Usage guide for your TokenVault
package, incorporating the Provider
enum and clarifying token types:
To allow a model (e.g. User
) to have tokens:
use CleaniqueCoders\TokenVault\Concerns\InteractsWithTokenVault;
class User extends Authenticatable
{
use InteractsWithTokenVault;
}
The package includes predefined providers for common services:
use CleaniqueCoders\TokenVault\Enums\Provider;
// Available providers:
Provider::GitHub // GitHub tokens
Provider::GitLab // GitLab tokens
Provider::Bitbucket // Bitbucket tokens
Provider::Stripe // Stripe API keys
Provider::Slack // Slack tokens
Provider::Mailgun // Mailgun API keys
Provider::AWS // AWS credentials
Provider::Sentry // Sentry tokens
Provider::Vercel // Vercel tokens
Provider::Kong // Kong Gateway tokens
The package supports various token types for different authentication methods:
use CleaniqueCoders\TokenVault\Enums\Type;
// Available token types:
Type::AccessToken // General access tokens
Type::ApiKey // API keys for services
Type::BearerToken // Bearer tokens for authorization headers
Type::RefreshToken // Tokens for refreshing access tokens
Type::PersonalAccessToken // User-generated personal tokens
Type::ServiceAccountKey // Service-to-service authentication keys
Type::WebhookSecret // Webhook verification secrets
Type::EncryptionKey // Data encryption keys
Type::CertificateKey // Private keys for certificates
Type::DatabasePassword // Database connection passwords
Type::BasicAuth // Basic authentication credentials
Type::OAuthToken // OAuth authorization tokens
use CleaniqueCoders\TokenVault\Enums\Provider;
use CleaniqueCoders\TokenVault\Enums\Type;
$user = User::find(1);
// Store a GitHub Personal Access Token
$user->tokens()->create([
'provider' => Provider::GitHub,
'type' => Type::PersonalAccessToken,
'token' => 'ghp_xxxxxxxxxxxxxxxxxxxx',
'meta' => [
'name' => 'Deployment Token',
'scopes' => ['repo', 'workflow'],
'note' => 'Used for CI/CD deployments'
],
'expires_at' => now()->addYear(),
]);
// Store a Stripe API Key
$user->tokens()->create([
'provider' => Provider::Stripe,
'type' => Type::ApiKey,
'token' => 'sk_live_xxxxxxxxxxxxxxxxxxxx',
'meta' => [
'environment' => 'live',
'permissions' => ['payments', 'customers']
],
]);
// Store an AWS Service Account Key
$user->tokens()->create([
'provider' => Provider::AWS,
'type' => Type::ServiceAccountKey,
'token' => json_encode([
'access_key_id' => 'AKIAIOSFODNN7EXAMPLE',
'secret_access_key' => 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY'
]),
'meta' => [
'region' => 'us-east-1',
'service' => 'S3'
],
]);
$token = $user->tokens()->first();
// Get the decrypted token value
$plainToken = $token->getDecryptedToken();
β οΈ Security Warning: Only decrypt tokens when absolutely necessary and never log or expose raw tokens.
$token->getMaskedToken(); // Returns: "ghp_****abcd"
Perfect for logs, audit trails, or UI displays where you need to show token identification without exposing the actual value.
use CleaniqueCoders\TokenVault\Enums\Provider;
use CleaniqueCoders\TokenVault\Enums\Type;
// Get all GitHub tokens for a user
$githubTokens = $user->tokens()
->where('provider', Provider::GitHub)
->get();
// Get a specific Stripe API key
$stripeApiKey = $user->tokens()
->where('provider', Provider::Stripe)
->where('type', Type::ApiKey)
->latest()
->first();
// Get all Personal Access Tokens
$personalTokens = $user->tokens()
->where('type', Type::PersonalAccessToken)
->get();
// Check if a token has expired
if ($token->isExpired()) {
// Handle expired token
$token->delete();
}
// Clean up all expired tokens for a user
$user->tokens()
->where('expires_at', '<', now())
->delete();
// Get tokens expiring soon (within 7 days)
$expiringSoon = $user->tokens()
->where('expires_at', '>', now())
->where('expires_at', '<=', now()->addDays(7))
->get();
// Rotate a token (create new, mark old as expired)
$oldToken = $user->tokens()
->where('provider', Provider::GitHub)
->where('type', Type::PersonalAccessToken)
->first();
// Create new token
$newToken = $user->tokens()->create([
'provider' => Provider::GitHub,
'type' => Type::PersonalAccessToken,
'token' => 'ghp_new_token_value',
'meta' => $oldToken->meta, // Copy metadata
'expires_at' => now()->addYear(),
]);
// Mark old token as expired
$oldToken->update(['expires_at' => now()]);
// Get tokens by metadata
$deploymentTokens = $user->tokens()
->whereJsonContains('meta->scopes', 'workflow')
->get();
// Get non-expired tokens for a specific provider
$activeStripeTokens = $user->tokens()
->where('provider', Provider::Stripe)
->where(function ($query) {
$query->whereNull('expires_at')
->orWhere('expires_at', '>', now());
})
->get();
// Count tokens by type
$tokenCounts = $user->tokens()
->selectRaw('type, count(*) as count')
->groupBy('type')
->pluck('count', 'type');
To use a custom encryption method:
'token-vault.encryptor' => \App\Drivers\OpenSslEncryptor::class,
And the class need to implements the \CleaniqueCoders\TokenVault\Contracts\Encryptor
interface.
composer test
Please see CHANGELOG for more information on what has changed recently.
Please see CONTRIBUTING for details.
Please review our security policy on how to report security vulnerabilities.
The MIT License (MIT). Please see License File for more information.