Commit graph

14 commits

Author SHA1 Message Date
6e811c85c2
Sealing: Encryption of Secrets (#1)
This adds support for encrypting and decrypting secrets.
It implements the APIs required for unsealing.
The APIs are not complete or compliant.

Reviewed-on: #1

Squashed commit of the following:

commit d77237aefe
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Wed Apr 2 18:59:33 2025 +0200

    Refactor: Secret struct and feature-gates
    - Shamir and its dependencies behind a default feature
    - Secret has its own struct

commit 6eb02c8412
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Wed Apr 2 08:28:28 2025 +0200

    Feat (sealing): Shamir Secret Sharing scheme

commit 5de9e1d74e
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Thu Mar 27 22:13:57 2025 +0100

    Fix (sealing): Simple sealing with random nonce

commit 88ed714e22
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Thu Mar 27 17:13:48 2025 +0100

    Feat (sealing): Simple Password sealing
    Password is generated on first startup.
    The password given to the user is not same as the one used to encrypt secrets

commit 4d342e8b99
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Wed Mar 26 21:51:27 2025 +0100

    Feat (kv2): Support Sealing

commit 1accd45648
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Wed Mar 26 21:49:59 2025 +0100

    WIP feat (sealing): Implement basic sealing functionality
    Currently, the key is just stored plainly in the database

commit 7949d64649
Author: C0ffeeCode <ritters_werth@outlook.com>
Date:   Wed Mar 26 21:39:07 2025 +0100

    Chore: Rename `DatabaseDriver` to `DbPool`
    and add a custom serde serializer `serialize_reject_none` as a utility
2025-04-02 22:42:20 +02:00
491ca2fd54 WIP feat (kv2): Method implementations and test improvements 2025-03-24 10:34:38 +01:00
b5e086bd0a Fix: Use HttpError struct for error handling where a non-compliant string was returned 2024-05-10 20:32:40 +02:00
4b88966e81 feat engines: Routing to engine accepts mount_path via Extension
also changes how kv obtains the `mount_path`
2024-05-05 18:04:25 +02:00
6755e61163 feat(dev) engines: "Dynamic Routing" 2024-05-05 17:52:57 +02:00
a5d74f0454 Logic to resolve mount points 2024-05-02 13:57:01 +02:00
049e8374ab Switch from Pool<Any> to Pool<Sqlite> 2024-05-02 13:40:02 +02:00
2c355ef75d engine routing experiment 2024-05-01 20:07:14 +02:00
sam
2f570a7a9d + Update + refactor KvSecret struct
+ Update Secretmeta + default()
2024-05-01 16:52:37 +02:00
79130d39e8 Merge remote-tracking branch 'origin/dev' into dev 2024-04-28 17:02:02 +02:00
7c453b6808 Add database (no schemata yet, only axum state) 2024-04-28 16:57:08 +02:00
someone
0730d711b5 moved test request to engines.rs + extracted mountpath from request 2024-04-28 15:42:57 +02:00
sam
aae1225d2d = big refactor meeting 2024-04-28 14:27:02 +02:00
6e215a99ee REFACTOR 2024-04-28 13:54:24 +02:00
Renamed from crates/server/src/secrets.rs (Browse further)