Create Vault
Description:
Create a new encrypted EOS keys vault.
A vault contains encrypted private keys, and with 'eosc', can be used to
securely sign transactions.
You can create a passphrase protected vault with:
eosc vault create --keys=2
This uses the default --vault-type=passphrase
You can create a Google Cloud Platform KMS-wrapped vault with:
eosc vault create --keys=2 --vault-type=kms-gcp --kms-gcp-keypath projects/.../locations/.../keyRings/.../cryptoKeys/name
You can then use this vault for the different eosc operations.
Usage:
eosc vault create [flags]
Flags:
-c, --comment string Comment field in the vault's json file.
-i, --import Whether to import keys instead of creating them. This takes precedence over --keys, and private keys will be inputted on the command line.
-k, --keys int Number of keypairs to create
-t, --vault-type string Vault type. One of: passphrase, kms-gcp (default "passphrase")