No description
  • Shell 58.1%
  • C# 11%
  • Java 10%
  • Go 6.5%
  • Python 5.1%
  • Other 9.3%
Find a file
oss-core-libraries-dashboard[bot] c3092d44bd
[COMPLIANCE] Update Copyright and License Headers (#5)
Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
2026-02-20 15:30:51 +05:30
dotnet [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
go [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
java [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
python [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
ruby [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
setup-vault [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
.gitignore Devex/docker (#2) 2022-06-17 15:23:58 -07:00
LICENSE [COMPLIANCE] Update Copyright and License Headers (#5) 2026-02-20 15:30:51 +05:30
README.md Devex/docker (#2) 2022-06-17 15:23:58 -07:00

Vault Developer Experience Usability Study

A collection of resources to complete a scenario based around incorporating Vault into a sample application.

Resources In This Repository

A starting point has been created in five languages:

  • C# - Found in dotnet/
  • Golang - Found in go/
  • Java - Found in java/
  • Python - Found in python/
  • Ruby - Found in ruby/

Scenario

Your companys engineering team is looking into ways to increase the security of your apps and infrastructure. Youve heard Vault is a great solution for secret management and would like to give it a try to see if it would be a good fit for your needs. To build a POC, you plan to integrate a test script with Vault. Your simple test aims to replace a hardcoded value with one retrieved from Vault.

Key Information

Each language will operate off the same key information to access Vault; at minimum you'll need to know Vault's address, a way to authenticate your application and the path where the secret is stored.

More Information

Vault's documentation is a great place to start!

Local Docker Vault Details

We've provided a containerized Vault server that includes everything needed to do this exercise.

Creating the bootstrapped Vault image and running it:

cd setup-vault
docker build -t explore-vault . # build the image and tag it "explore-vault"
docker run --rm -p 8200:8200 explore-vault # expose port 8200 and run container

The above will yeild a Vault server with the following attributes:

Value
Vault Address http://localhost:8200
Secret Engine KV-v2
Secret Mount Point secret
Secret Path firstsecret
Secret Key sample_secret
Read-Only Token demo-read-only
AppRole ID approle-demo-readonly
AppRole Secret ID -- shown on startup --

More information in the Setting Up Vault readme.

Enjoy!