| Crates.io | rvault |
| lib.rs | rvault |
| version | 0.1.3 |
| created_at | 2025-10-03 07:23:18.04766+00 |
| updated_at | 2025-10-03 09:34:01.45657+00 |
| description | A local-first, multi-tenant password manager with cloud sync capabilities |
| homepage | https://vault.dev |
| repository | https://github.com/Akshay2642005/Vault |
| max_upload_size | |
| id | 1866294 |
| size | 274,556 |
A local-first, multi-tenant password manager with cloud synchronization capabilities. Built with Rust for maximum security and performance.
# Install via script (recommended)
curl -sSL https://releases.vault.dev/install.sh | sh
# Or build from source
git clone https://github.com/vault/vault.git
cd vault
cargo build --release
# Initialize vault for your organization
vault init --tenant acme-corp --admin alice@acme.com
# Login to your tenant
vault login --tenant acme-corp
# Store a secret
vault put github-token --namespace development
# Enter secret value: [hidden input]
# Retrieve a secret
vault get github-token --namespace development
# List all secrets in a namespace
vault list --namespace development
# Sync with cloud (optional)
vault sync push
vault/
├── src/ # Rust CLI source code
├── test.code/ # Integration tests and examples
├── website/ # React marketing website
└── docs/ # Documentation
# Run unit tests
cargo test
# Run integration tests
cd test.code
./scripts/run-tests.sh
# Test multi-host sync
./scripts/simulate-sync.sh
# Debug build
cargo build
# Release build
cargo build --release
# Cross-platform builds
cargo install cross
cross build --target x86_64-pc-windows-gnu
cross build --target x86_64-apple-darwin
Create ~/.config/vault/config.toml:
storage_path = "~/.vault/vault.db"
tenant_id = "my-org"
[cloud_sync]
backend = "S3"
region = "us-east-1"
bucket = "my-vault-bucket"
# Optional KMS integration
# kms_key_id = "arn:aws:kms:us-east-1:123456789012:key/..."
vault init - Initialize new vaultvault login - Authenticate to tenantvault put <key> - Store secretvault get <key> - Retrieve secretvault list - List secretsvault delete <key> - Delete secretvault sync push - Upload encrypted secrets to cloudvault sync pull - Download and merge secrets from cloudvault sync status - Show sync statusvault roles add - Add user to tenantvault audit tail - View audit logsvault export - Export encrypted backupvault import - Import from backupMIT License - see LICENSE for details.
Report security vulnerabilities to security@vault.dev (PGP key available).