Enum diem_secure_storage::Storage [−][src]
pub enum Storage {
GitHubStorage(GitHubStorage),
VaultStorage(VaultStorage),
InMemoryStorage(InMemoryStorage),
NamespacedStorage(Namespaced<Box<Storage>>),
OnDiskStorage(OnDiskStorage),
}Expand description
This is the Diem interface into secure storage. Any storage engine implementing this trait should support both key/value operations (e.g., get, set and create) and cryptographic key operations (e.g., generate_key, sign and rotate_key). This is a hack that allows us to convert from SecureBackend into a useable T: Storage. This boilerplate can be 100% generated by a proc macro.
Variants
GitHubStorage(GitHubStorage)Tuple Fields of GitHubStorage
VaultStorage(VaultStorage)Tuple Fields of VaultStorage
0: VaultStorageInMemoryStorage(InMemoryStorage)Tuple Fields of InMemoryStorage
NamespacedStorage(Namespaced<Box<Storage>>)Tuple Fields of NamespacedStorage
0: Namespaced<Box<Storage>>OnDiskStorage(OnDiskStorage)Tuple Fields of OnDiskStorage
Trait Implementations
Securely generates a new named Ed25519 private key. The behavior for calling this interface multiple times with the same name is implementation specific.
Returns the Ed25519 private key stored at ‘name’.
An optional API that allows importing private keys and storing them at the provided name. This is not intended to be used in production and the API may throw unimplemented if not used correctly. As this is purely a testing API, there is no defined behavior for importing a key for a given name if that name already exists. It only exists to allow Diem to be run in test environments where a set of deterministic keys must be generated.
fn export_private_key_for_version(
&self,
name: &str,
version: Ed25519PublicKey
) -> Result<Ed25519PrivateKey, Error>
fn export_private_key_for_version(
&self,
name: &str,
version: Ed25519PublicKey
) -> Result<Ed25519PrivateKey, Error>
Returns the Ed25519 private key stored at ‘name’ and identified by ‘version’, which is the corresponding public key. This may fail even if the ‘named’ key exists but the version is not present.
Returns the Ed25519 public key stored at ‘name’.
Returns the previous version of the Ed25519 public key stored at ‘name’. For the most recent version, see ‘get_public_key(..)’ above.
Rotates an Ed25519 private key. Future calls without version to this ‘named’ key will return the rotated key instance. The previous key is retained and can be accessed via the version. At most two versions are expected to be retained.
fn sign<T: CryptoHash + Serialize>(
&self,
name: &str,
message: &T
) -> Result<Ed25519Signature, Error>
fn sign<T: CryptoHash + Serialize>(
&self,
name: &str,
message: &T
) -> Result<Ed25519Signature, Error>
Signs the provided securely-hashable struct, using the ‘named’ private key.
fn sign_using_version<T: CryptoHash + Serialize>(
&self,
name: &str,
version: Ed25519PublicKey,
message: &T
) -> Result<Ed25519Signature, Error>
fn sign_using_version<T: CryptoHash + Serialize>(
&self,
name: &str,
version: Ed25519PublicKey,
message: &T
) -> Result<Ed25519Signature, Error>
Signs the provided securely-hashable struct, using the ‘named’ and ‘versioned’ private key. This may fail even if the ‘named’ key exists but the version is not present.
Performs the conversion.
Performs the conversion.
Performs the conversion.
Performs the conversion.
Returns an error if the backend service is not online and available.
Retrieves a value from storage and fails if the backend is unavailable or the process has invalid permissions.
Sets a value in storage and fails if the backend is unavailable or the process has invalid permissions.
Resets and clears all data held in the storage engine. Note: this should only be exposed and used for testing. Resetting the storage engine is not something that should be supported in production.
Performs the conversion.
Performs the conversion.
Performs the conversion.
Performs the conversion.