You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/tutorials/polykey-cli/README.md
+30-6Lines changed: 30 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,15 @@ import DocCardList from '@theme/DocCardList';
2
2
3
3
# Polykey CLI
4
4
5
-
The Command Line Interface (CLI) of Polykey is the first and primary user-interface (UI) to the Polykey system. The CLI is intended for developers and system administrators.
5
+
The Polykey Command Line Interface (CLI) is the primary userinterface for the Polykey system, tailored for developers and system administrators. It was conceived from the necessity of managing secrets efficiently during software development and deployment workflows.
6
6
7
-
This is because the idea of Polykey came from our experience dealing with secrets as software engineers during the development and deployment workflow.
7
+
## Overview
8
8
9
-
New features will always arrive in the CLI first, for testing and integration, before being ported to the other UIs.
9
+
The Polykey CLI is the first and primary interface to the Polykey system. It is intended for developers and system administrators who require an advanced tool for managing secrets efficiently. New features are introduced in the CLI first, serving as a testing and integration ground before being ported to other user interfaces. This approach ensures that the features are reliable and refined for professional use.
10
10
11
11
We designed the CLI user-experience (UX) to be suitable for a human operator, but also to be easily scripted and integrated into other tools.
12
12
13
-
The tutorial here should be followed in-order, and the goal is to make use of Polykey to manage secrets for a simple application from development to deployment.
13
+
The tutorial here should be followed inorder, and the goal is to make use of Polykey to manage secrets for a simple application from development to deployment.
14
14
15
15
The CLI is open-source and available on GitHub: [Polykey CLI](https://github.com/MatrixAI/Polykey-CLI).
16
16
@@ -23,10 +23,34 @@ We automatically build and test the CLI on the following platforms:
23
23
- Windows x64
24
24
- Docker
25
25
26
-
:::warning
26
+
:::note
27
+
Polykey is currently in beta. Its interface is at various levels of stability. So bear with us as we perfect its design. You can contribute by discussing with us on [Discord](https://discord.gg/h3UShM8WUN) or creating issue tickets in the [Polykey-CLI repo on GitHub](https://github.com/MatrixAI/Polykey-CLI).
28
+
:::
29
+
30
+
## Getting Started
27
31
28
-
Polykey is currently in beta. Its interface is at various levels of stability. So bear with us as we perfect its design.
32
+
To begin managing & sharing secrets effectively with Polykey, follow the tutorials in the sequence outlined below:
29
33
34
+
:::tip
35
+
You may also reference the following [demo video](https://vimeo.com/884649667) for the getting started tutorial but you will first need to complete the installation instructions for Polykey-CLI.
30
36
:::
31
37
38
+
1.**[Installation](/docs/tutorials/polykey-cli/installation)**: Set up Polykey CLI on your preferred platform.
39
+
2.**[Bootstrap Keypair](/docs/tutorials/polykey-cli/bootstrapping)**: Initialize your node and connect to the Polykey network.
40
+
3.**[Managing Vaults](/docs/tutorials/polykey-cli/managing-vaults)**: Create and manage secure vaults for effective secrets storage.
41
+
4.**[Managing Secrets](/docs/tutorials/polykey-cli/managing-secrets)**: Explore comprehensive methods for handling and organizing secrets within vaults.
42
+
5.**[Claiming Digital Identities](/docs/tutorials/polykey-cli/claiming-digital-identities)**: Authenticate and establish your identity across the Polykey network.
43
+
6.**[Discovering Other User's Identities](/docs/tutorials/polykey-cli/discovering-other-users)**: Locate and verify identities of other users to manage access.
44
+
7.**[Sharing Vaults](/docs/tutorials/polykey-cli/sharing-vaults)**: Share vaults securely with trusted peers.
45
+
46
+
These initial tutorials will guide new users through the basic functionalities of setting up Polykey, starting their node (similar to creating a Web3 wallet connected to a P2P network), creating virtual encrypted vaults, and managing secret files within these vaults. This foundation prepares users for more advanced network functionalities, such as identity claims, discovery of other users' nodes, and secure sharing of secrets and vaults through end-to-end encryption.
47
+
48
+
After mastering these basics, you'll be ready to explore intermediate use-cases such as:
49
+
50
+
- Managing multiple local nodes
51
+
- Linking multiple nodes to a single identity
52
+
- Using Polykey's `env` command to inject secrets into your development environment
53
+
54
+
These topics will be covered in more detail in the next section of our documentation, providing you with the tools to leverage Polykey's full potential in more complex operational environments.
0 commit comments