Enum diem_secure_storage::Storage
source · pub enum Storage {
GitHubStorage(GitHubStorage),
VaultStorage(VaultStorage),
InMemoryStorage(InMemoryStorage),
NamespacedStorage(Namespaced<Box<Storage>>),
OnDiskStorage(OnDiskStorage),
}
Expand description
This is the Diem interface into secure storage. Any storage engine implementing this trait should support both key/value operations (e.g., get, set and create) and cryptographic key operations (e.g., generate_key, sign and rotate_key). This is a hack that allows us to convert from SecureBackend into a useable T: Storage. This boilerplate can be 100% generated by a proc macro.
Variants§
GitHubStorage(GitHubStorage)
VaultStorage(VaultStorage)
InMemoryStorage(InMemoryStorage)
NamespacedStorage(Namespaced<Box<Storage>>)
OnDiskStorage(OnDiskStorage)
Trait Implementations§
source§impl CryptoStorage for Box<Storage>
impl CryptoStorage for Box<Storage>
source§fn create_key(&mut self, name: &str) -> Result<Ed25519PublicKey, Error>
fn create_key(&mut self, name: &str) -> Result<Ed25519PublicKey, Error>
source§fn export_private_key(&self, name: &str) -> Result<Ed25519PrivateKey, Error>
fn export_private_key(&self, name: &str) -> Result<Ed25519PrivateKey, Error>
source§fn import_private_key(
&mut self,
name: &str,
key: Ed25519PrivateKey
) -> Result<(), Error>
fn import_private_key( &mut self, name: &str, key: Ed25519PrivateKey ) -> Result<(), Error>
source§fn export_private_key_for_version(
&self,
name: &str,
version: Ed25519PublicKey
) -> Result<Ed25519PrivateKey, Error>
fn export_private_key_for_version( &self, name: &str, version: Ed25519PublicKey ) -> Result<Ed25519PrivateKey, Error>
source§fn get_public_key(&self, name: &str) -> Result<PublicKeyResponse, Error>
fn get_public_key(&self, name: &str) -> Result<PublicKeyResponse, Error>
source§fn get_public_key_previous_version(
&self,
name: &str
) -> Result<Ed25519PublicKey, Error>
fn get_public_key_previous_version( &self, name: &str ) -> Result<Ed25519PublicKey, Error>
source§fn rotate_key(&mut self, name: &str) -> Result<Ed25519PublicKey, Error>
fn rotate_key(&mut self, name: &str) -> Result<Ed25519PublicKey, Error>
source§fn sign<T: CryptoHash + Serialize>(
&self,
name: &str,
message: &T
) -> Result<Ed25519Signature, Error>
fn sign<T: CryptoHash + Serialize>( &self, name: &str, message: &T ) -> Result<Ed25519Signature, Error>
source§fn sign_using_version<T: CryptoHash + Serialize>(
&self,
name: &str,
version: Ed25519PublicKey,
message: &T
) -> Result<Ed25519Signature, Error>
fn sign_using_version<T: CryptoHash + Serialize>( &self, name: &str, version: Ed25519PublicKey, message: &T ) -> Result<Ed25519Signature, Error>
source§impl CryptoStorage for Storage
impl CryptoStorage for Storage
source§fn create_key(
&mut self,
__enum_dispatch_arg_0: &str
) -> Result<Ed25519PublicKey, Error>
fn create_key( &mut self, __enum_dispatch_arg_0: &str ) -> Result<Ed25519PublicKey, Error>
Securely generates a new named Ed25519 private key. The behavior for calling this interface multiple times with the same name is implementation specific.
source§fn export_private_key(
&self,
__enum_dispatch_arg_0: &str
) -> Result<Ed25519PrivateKey, Error>
fn export_private_key( &self, __enum_dispatch_arg_0: &str ) -> Result<Ed25519PrivateKey, Error>
Returns the Ed25519 private key stored at ‘name’.
source§fn import_private_key(
&mut self,
__enum_dispatch_arg_0: &str,
__enum_dispatch_arg_1: Ed25519PrivateKey
) -> Result<(), Error>
fn import_private_key( &mut self, __enum_dispatch_arg_0: &str, __enum_dispatch_arg_1: Ed25519PrivateKey ) -> Result<(), Error>
An optional API that allows importing private keys and storing them at the provided name. This is not intended to be used in production and the API may throw unimplemented if not used correctly. As this is purely a testing API, there is no defined behavior for importing a key for a given name if that name already exists. It only exists to allow Diem to be run in test environments where a set of deterministic keys must be generated.
source§fn export_private_key_for_version(
&self,
__enum_dispatch_arg_0: &str,
__enum_dispatch_arg_1: Ed25519PublicKey
) -> Result<Ed25519PrivateKey, Error>
fn export_private_key_for_version( &self, __enum_dispatch_arg_0: &str, __enum_dispatch_arg_1: Ed25519PublicKey ) -> Result<Ed25519PrivateKey, Error>
Returns the Ed25519 private key stored at ‘name’ and identified by ‘version’, which is the corresponding public key. This may fail even if the ‘named’ key exists but the version is not present.
source§fn get_public_key(
&self,
__enum_dispatch_arg_0: &str
) -> Result<PublicKeyResponse, Error>
fn get_public_key( &self, __enum_dispatch_arg_0: &str ) -> Result<PublicKeyResponse, Error>
Returns the Ed25519 public key stored at ‘name’.
source§fn get_public_key_previous_version(
&self,
__enum_dispatch_arg_0: &str
) -> Result<Ed25519PublicKey, Error>
fn get_public_key_previous_version( &self, __enum_dispatch_arg_0: &str ) -> Result<Ed25519PublicKey, Error>
Returns the previous version of the Ed25519 public key stored at ‘name’. For the most recent version, see ‘get_public_key(..)’ above.
source§fn rotate_key(
&mut self,
__enum_dispatch_arg_0: &str
) -> Result<Ed25519PublicKey, Error>
fn rotate_key( &mut self, __enum_dispatch_arg_0: &str ) -> Result<Ed25519PublicKey, Error>
Rotates an Ed25519 private key. Future calls without version to this ‘named’ key will return the rotated key instance. The previous key is retained and can be accessed via the version. At most two versions are expected to be retained.
source§fn sign<T: CryptoHash + Serialize>(
&self,
__enum_dispatch_arg_0: &str,
__enum_dispatch_arg_1: &T
) -> Result<Ed25519Signature, Error>
fn sign<T: CryptoHash + Serialize>( &self, __enum_dispatch_arg_0: &str, __enum_dispatch_arg_1: &T ) -> Result<Ed25519Signature, Error>
Signs the provided securely-hashable struct, using the ‘named’ private key.
source§fn sign_using_version<T: CryptoHash + Serialize>(
&self,
__enum_dispatch_arg_0: &str,
__enum_dispatch_arg_1: Ed25519PublicKey,
__enum_dispatch_arg_2: &T
) -> Result<Ed25519Signature, Error>
fn sign_using_version<T: CryptoHash + Serialize>( &self, __enum_dispatch_arg_0: &str, __enum_dispatch_arg_1: Ed25519PublicKey, __enum_dispatch_arg_2: &T ) -> Result<Ed25519Signature, Error>
Signs the provided securely-hashable struct, using the ‘named’ and ‘versioned’ private key. This may fail even if the ‘named’ key exists but the version is not present.
source§impl From<GitHubStorage> for Storage
impl From<GitHubStorage> for Storage
source§fn from(v: GitHubStorage) -> Storage
fn from(v: GitHubStorage) -> Storage
source§impl From<InMemoryStorage> for Storage
impl From<InMemoryStorage> for Storage
source§fn from(v: InMemoryStorage) -> Storage
fn from(v: InMemoryStorage) -> Storage
source§impl From<OnDiskStorage> for Storage
impl From<OnDiskStorage> for Storage
source§fn from(v: OnDiskStorage) -> Storage
fn from(v: OnDiskStorage) -> Storage
source§impl From<VaultStorage> for Storage
impl From<VaultStorage> for Storage
source§fn from(v: VaultStorage) -> Storage
fn from(v: VaultStorage) -> Storage
source§impl KVStorage for Box<Storage>
impl KVStorage for Box<Storage>
source§fn available(&self) -> Result<(), Error>
fn available(&self) -> Result<(), Error>
source§fn get<T: DeserializeOwned>(&self, key: &str) -> Result<GetResponse<T>, Error>
fn get<T: DeserializeOwned>(&self, key: &str) -> Result<GetResponse<T>, Error>
source§impl KVStorage for Storage
impl KVStorage for Storage
source§fn available(&self) -> Result<(), Error>
fn available(&self) -> Result<(), Error>
Returns an error if the backend service is not online and available.
source§fn get<T: DeserializeOwned>(
&self,
__enum_dispatch_arg_0: &str
) -> Result<GetResponse<T>, Error>
fn get<T: DeserializeOwned>( &self, __enum_dispatch_arg_0: &str ) -> Result<GetResponse<T>, Error>
Retrieves a value from storage and fails if the backend is unavailable or the process has invalid permissions.