Skip to content

gouniverse/vaultstore

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

77 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Vault Store

Tests Status Go Report Card PkgGoDev

Vault - a secure value storage (data-at-rest) implementation for Go.

Scope

VaultStore is specifically designed as a data store component for securely storing and retrieving secrets. It is not an API or a complete secrets management system. Features such as user management, access control, and API endpoints are intentionally beyond the scope of this project.

VaultStore is meant to be integrated into your application as a library, providing the data storage layer for your secrets management needs. The application using VaultStore is responsible for implementing any additional layers such as API endpoints, user management, or access control if needed.

Documentation

Features

  • Secure storage of sensitive data
  • Token-based access to secrets
  • Password protection for stored values
  • Flexible query interface for retrieving records
  • Soft delete functionality for data recovery
  • Support for multiple database backends

License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0). You can find a copy of the license at https://www.gnu.org/licenses/agpl-3.0.en.html

For commercial use, please use my contact page to obtain a commercial license.

Installation

go get -u github.com/gouniverse/valuestore

Technical Details

For database schema, record structure, and other technical information, please see the Technical Reference.

Setup

vault, err := NewStore(NewStoreOptions{
	VaultTableName:     "my_vault",
	DB:                 databaseInstance,
	AutomigrateEnabled: true,
})

Usage

Here are some basic examples of using VaultStore. For comprehensive documentation, see the Usage Guide.

// Create a token
token, err := vault.TokenCreate("my_value", "my_password", 20)

// Check if a token exists
exists, err := vault.TokenExists(token)

// Read a value using a token
value, err := vault.TokenRead(token, "my_password")

// Update a token's value
err := vault.TokenUpdate(token, "new_value", "my_password")

// Hard delete a token
err := vault.TokenDelete(token)

// Soft delete a token
err := vault.TokenSoftDelete(token)

🌏 Development in the Cloud

Click any of the buttons below to start a new development environment to contribute to the codebase without having to install anything on your machine:

Open in GitHub Codespaces Open in Gitpod

Changelog

For a detailed version history and changes, please see the Changelog.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages