News Priviw

Switch to the dark mode that's kinder on your eyes at night time.

Switch to the light mode that's kinder on your eyes at day time.

Menu

News Priviw

Menu
in

A plugin that turn hashicorp vault into blockchain wallet


GitHub PkgGoDev Go Report Card GitHub last commit GitHub go.mod Go version

This vault plugin stores a user’s mnemonic inside vault in an encrypted manner. The plugin uses this stored mnemonic to derive a private key based on an HD wallet path provided by the user and signs a raw transaction given as input using that private key. All this process happens inside the vault and the user never knows the mnemonic (unless he has provided it manually) or the private key derived. All he needs to do is give a raw transaction as input and the vault returns a signed transaction. A particular user is identified in the vault using a UUID generated when the user is initially registered in the vault.

There will be two roles communicating with vault:

  1. Admin: The one who sets up the vault.
  2. Application Server: The one who uses vault to read and update data.

The application server can communicate with a vault server using API requests/calls. Both CLI commands and API call methods have been included in this guide.

Visit this link for full documentation of dq-vault

This part of setting up vault can be done using two methods. You may follow any one of your choices.

  • Method 1:-

    Using Docker to get your vault server up and running. You can find it in this link. We have provided the required docker files in the setup folder.

  • Method 2:-

    Setting up Vault manually. The steps are given below in this README, starting from vault installation to creating your own vault server by using the CLI.

If you are already done with setting up the vault server using method 1, you may go directly to part 2 which elaborates the usage of the vault as an application server.

Vault installation

The first thing you need to do is to install vault to set-up a vault server.

  • To install Vault, find the appropriate package for your system and download it. Vault is packaged as a zip archive.

  • After downloading Vault, unzip the package. Vault runs as a single binary named vault.

  • Copy the vault binary to your PATH. In Ubuntu, PATH should be the usr/bin directory.

  • To verify the installation, type vault in your terminal. You should see help output similar to the following:

    <div class=”snippet-clipboard-content position-relative” data-snippet-clipboard-copy-content=” $ vault
    Usage: vault [args]

    Common commands:
    read Read data and retrieves secrets
    write Write data, configuration, and secrets
    delete Delete secrets and configuration
    list List data or secrets
    login Authenticate locally
    server Start a Vault server
    status Print seal and HA status
    unwrap Unwrap a wrapped secret

    Other commands:
    audit Interact with audit devices
    auth Interact with auth methods
    lease Interact with leases
    operator Perform operator-specific tasks
    path-help Retrieve API help for paths
    policy Interact with policies
    secrets Interact with secrets engines
    ssh Initiate an SSH session
    token Interact with tokens
    “>

      $ vault
      Usage: vault <command> [args]
    
      Common commands:
          read        Read data and retrieves secrets
          write       Write data, configuration, and secrets
          delete      Delete secrets and configuration
          list        List data or secrets
          login       Authenticate locally
          server      Start a Vault server
          status      Print seal and HA status
          unwrap      Unwrap a wrapped secret
    
      Other commands:
          audit          Interact with audit devices
          auth           Interact with auth methods
          lease          Interact with leases
          operator       Perform operator-specific tasks
          path-help      Retrieve API help for paths
          policy         Interact with policies
          secrets        Interact with secrets engines
          ssh            Initiate an SSH session
          token          Interact with tokens
    
  • You can find the official installation guide here

  • Get go files and Build plugin

    Assuming that you have golang installed and your GOPATH configured, get the plugin repository and run the build command in that folder:

    This will you give you a binary executable file with the name Vault.

    Now move this binary file to a directory which the vault will use as its plugin directory. The plugin directory is where the vault looks up for available plugins.

      $ mv Vault /etc/vault/plugins/vault_plugin

    The above path is just an example, you can change the etc path to your own desired path.

    License

    Copyright 2021, DeqodeLabs (https://deqode.com/)
    
    Licensed under the MIT License(the "License");
    
    

    GitHub

    https://github.com/deqode/dq-vault




    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    GIPHY App Key not set. Please check settings

    DUNIYA LYRICS – Loud | Ranjit Bawa

    SHININ’ LYRICS – TEGI PANNU

    Back to Top

    Log In

    Forgot password?

    Forgot password?

    Enter your account data and we will send you a link to reset your password.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Your password reset link appears to be invalid or expired.

    Log in

    Privacy Policy

    To use social login you have to agree with the storage and handling of your data by this website. %privacy_policy%

    Add to Collection

    No Collections

    Here you'll find all collections you've created before.