4 Commits

Author SHA1 Message Date
bbe382dc10 Migrate module path from kyle/ to mc/ org
All import paths updated to git.wntrmute.dev/mc/. Bumps mcdsl to v1.2.0.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 02:05:59 -07:00
5401181bde Merge pull request 'Bump mcdsl to adopt $PORT env var support' (#1) from feature/port-env-adoption into master 2026-03-27 08:16:23 +00:00
21989df08e Update mcdsl to v1.1.0 (tagged release)
Replace pseudo-version with the tagged v1.1.0 release.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 01:15:13 -07:00
f2f764289f Bump mcdsl to adopt $PORT env var support
Update mcdsl from v1.0.1 to v1.0.2-0.20260327074919-f94c4b1abf9c
(port-env-support branch) which adds $PORT environment variable
support for HTTP and gRPC server configuration.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 01:07:07 -07:00
105 changed files with 235 additions and 239 deletions

View File

@@ -4,7 +4,7 @@ This file provides guidance to Claude Code (claude.ai/code) when working with co
## Project Overview ## Project Overview
Metacrypt is a cryptographic service for the Metacircular platform, written in Go. It provides cryptographic resources via an "engines" architecture (CA, SSH CA, transit encryption, user-to-user encryption). Authentication is handled by MCIAS (Metacircular Identity and Access Service) using the client library at `git.wntrmute.dev/kyle/mcias/clients/go`. MCIAS API docs: https://mcias.metacircular.net:8443/docs Metacrypt is a cryptographic service for the Metacircular platform, written in Go. It provides cryptographic resources via an "engines" architecture (CA, SSH CA, transit encryption, user-to-user encryption). Authentication is handled by MCIAS (Metacircular Identity and Access Service) using the client library at `git.wntrmute.dev/mc/mcias/clients/go`. MCIAS API docs: https://mcias.metacircular.net:8443/docs
## Build & Test Commands ## Build & Test Commands

View File

@@ -425,7 +425,7 @@ issues scoped intermediate CAs ("issuers"), which in turn issue leaf
certificates. certificates.
Certificate generation uses the `certgen` package from Certificate generation uses the `certgen` package from
`git.wntrmute.dev/kyle/goutils/certlib/certgen`. `git.wntrmute.dev/mc/goutils/certlib/certgen`.
#### Lifecycle #### Lifecycle

View File

@@ -4,7 +4,7 @@ This file provides guidance to Claude Code (claude.ai/code) when working with co
## Project Overview ## Project Overview
Metacrypt is a cryptographic service for the Metacircular platform, written in Go. It provides cryptographic resources via an "engines" architecture (CA, SSH CA, transit encryption, user-to-user encryption). Authentication is handled by MCIAS (Metacircular Identity and Access Service) using the client library at `git.wntrmute.dev/kyle/mcias/clients/go`. MCIAS API docs: https://mcias.metacircular.net:8443/docs Metacrypt is a cryptographic service for the Metacircular platform, written in Go. It provides cryptographic resources via an "engines" architecture (CA, SSH CA, transit encryption, user-to-user encryption). Authentication is handled by MCIAS (Metacircular Identity and Access Service) using the client library at `git.wntrmute.dev/mc/mcias/clients/go`. MCIAS API docs: https://mcias.metacircular.net:8443/docs
## Build & Test Commands ## Build & Test Commands

View File

@@ -5,11 +5,11 @@ LDFLAGS := -trimpath -ldflags="-s -w -X main.version=$(shell git describe --tags
binaries: metacrypt metacrypt-web binaries: metacrypt metacrypt-web
proto: proto:
protoc --go_out=. --go_opt=module=git.wntrmute.dev/kyle/metacrypt \ protoc --go_out=. --go_opt=module=git.wntrmute.dev/mc/metacrypt \
--go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/kyle/metacrypt \ --go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/mc/metacrypt \
proto/metacrypt/v1/*.proto proto/metacrypt/v1/*.proto
protoc --go_out=. --go_opt=module=git.wntrmute.dev/kyle/metacrypt \ protoc --go_out=. --go_opt=module=git.wntrmute.dev/mc/metacrypt \
--go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/kyle/metacrypt \ --go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/mc/metacrypt \
proto/metacrypt/v2/*.proto proto/metacrypt/v2/*.proto
metacrypt: metacrypt:

View File

@@ -4,14 +4,14 @@
Metacrypt needs its first concrete engine implementation: the CA (PKI) engine. This provides X.509 certificate issuance for Metacircular infrastructure. A single root CA issues scoped intermediate CAs ("issuers"), which in turn issue leaf certificates. An unauthenticated public API serves CA/issuer certificates to allow systems to bootstrap TLS trust. Metacrypt needs its first concrete engine implementation: the CA (PKI) engine. This provides X.509 certificate issuance for Metacircular infrastructure. A single root CA issues scoped intermediate CAs ("issuers"), which in turn issue leaf certificates. An unauthenticated public API serves CA/issuer certificates to allow systems to bootstrap TLS trust.
Certificate generation uses the `certgen` package from `git.wntrmute.dev/kyle/goutils/certlib/certgen`. Certificate generation uses the `certgen` package from `git.wntrmute.dev/mc/goutils/certlib/certgen`.
## Implementation Order ## Implementation Order
### Step 1: Add goutils dependency ### Step 1: Add goutils dependency
**File: `go.mod`** **File: `go.mod`**
- Add `git.wntrmute.dev/kyle/goutils` with local replace directive (same pattern as mcias) - Add `git.wntrmute.dev/mc/goutils` with local replace directive (same pattern as mcias)
- Run `go mod tidy` - Run `go mod tidy`
### Step 2: Update engine framework ### Step 2: Update engine framework
@@ -150,7 +150,7 @@ engine/ca/{mount}/certs/{serial_hex}.json
### Step 7: Register CA factory ### Step 7: Register CA factory
**File: `cmd/metacrypt/server.go`** **File: `cmd/metacrypt/server.go`**
- Import `git.wntrmute.dev/kyle/metacrypt/internal/engine/ca` - Import `git.wntrmute.dev/mc/metacrypt/internal/engine/ca`
- After creating `engineRegistry`, call `engineRegistry.RegisterFactory(engine.EngineTypeCA, ca.NewCAEngine)` - After creating `engineRegistry`, call `engineRegistry.RegisterFactory(engine.EngineTypeCA, ca.NewCAEngine)`
### Step 8: Tests ### Step 8: Tests

View File

@@ -8,7 +8,7 @@ It should have a data model similar to what hashicorp vault does, in that it wil
The first step is to build out the basic framework for the application, to include login, unsealing, and the encrypted barrier. The first step is to build out the basic framework for the application, to include login, unsealing, and the encrypted barrier.
We will be using Go as the main language. The MCIAS client library (git.wntrmute.dev/kyle/mcias/clients/go) is used for authentication. Use 256-bit symmetric keys and Ed25519/Curve25519 or NIST P-521 where appropriate for public key algorithms. Use Argon2 for password hashing. We will be using Go as the main language. The MCIAS client library (git.wntrmute.dev/mc/mcias/clients/go) is used for authentication. Use 256-bit symmetric keys and Ed25519/Curve25519 or NIST P-521 where appropriate for public key algorithms. Use Argon2 for password hashing.
It will need a gRPC and JSON REST API, as well as a web frontend. It will need a gRPC and JSON REST API, as well as a web frontend.

View File

@@ -1,4 +1,4 @@
module git.wntrmute.dev/kyle/metacrypt/clients/go module git.wntrmute.dev/mc/metacrypt/clients/go
go 1.25.0 go 1.25.0

View File

@@ -1,2 +0,0 @@
golang.org/x/crypto v0.49.0 h1:+Ng2ULVvLHnJ/ZFEq4KdcDd/cfjrrjjNSXNzxg0Y4U4=
golang.org/x/crypto v0.49.0/go.mod h1:ErX4dUh2UM+CFYiXZRTcMpEcN8b/1gxEuv3nODoYtCA=

View File

@@ -13,8 +13,8 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/webserver" "git.wntrmute.dev/mc/metacrypt/internal/webserver"
) )
var cfgFile string var cfgFile string

View File

@@ -10,11 +10,11 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
"golang.org/x/term" "golang.org/x/term"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
var initCmd = &cobra.Command{ var initCmd = &cobra.Command{

View File

@@ -10,9 +10,9 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
"golang.org/x/term" "golang.org/x/term"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
var migrateAADCmd = &cobra.Command{ var migrateAADCmd = &cobra.Command{

View File

@@ -10,10 +10,10 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
"golang.org/x/term" "golang.org/x/term"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
var migrateBarrierCmd = &cobra.Command{ var migrateBarrierCmd = &cobra.Command{

View File

@@ -10,20 +10,20 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/ca" "git.wntrmute.dev/mc/metacrypt/internal/engine/ca"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/sshca" "git.wntrmute.dev/mc/metacrypt/internal/engine/sshca"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/transit" "git.wntrmute.dev/mc/metacrypt/internal/engine/transit"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/user" "git.wntrmute.dev/mc/metacrypt/internal/engine/user"
"git.wntrmute.dev/kyle/metacrypt/internal/grpcserver" "git.wntrmute.dev/mc/metacrypt/internal/grpcserver"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
"git.wntrmute.dev/kyle/metacrypt/internal/server" "git.wntrmute.dev/mc/metacrypt/internal/server"
) )
var serverCmd = &cobra.Command{ var serverCmd = &cobra.Command{

View File

@@ -5,9 +5,9 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
var snapshotCmd = &cobra.Command{ var snapshotCmd = &cobra.Command{

View File

@@ -15,7 +15,7 @@ import (
"google.golang.org/grpc" "google.golang.org/grpc"
"google.golang.org/grpc/credentials" "google.golang.org/grpc/credentials"
metacryptv1 "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1" metacryptv1 "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1"
) )
var unsealCmd = &cobra.Command{ var unsealCmd = &cobra.Command{

View File

@@ -138,7 +138,7 @@ but the top-level skeleton is fixed.
Services hosted on `git.wntrmute.dev` use: Services hosted on `git.wntrmute.dev` use:
``` ```
git.wntrmute.dev/kyle/<service> git.wntrmute.dev/mc/<service>
``` ```
--- ---
@@ -251,7 +251,7 @@ Access Service). No service maintains its own user database.
- Client sends credentials to the service's `/v1/auth/login` endpoint. - Client sends credentials to the service's `/v1/auth/login` endpoint.
- The service forwards them to MCIAS via the client library - The service forwards them to MCIAS via the client library
(`git.wntrmute.dev/kyle/mcias/clients/go`). (`git.wntrmute.dev/mc/mcias/clients/go`).
- On success, MCIAS returns a bearer token. The service returns it to the - On success, MCIAS returns a bearer token. The service returns it to the
client and optionally sets it as a cookie for the web UI. client and optionally sets it as a cookie for the web UI.
- Subsequent requests include the token via `Authorization: Bearer <token>` - Subsequent requests include the token via `Authorization: Bearer <token>`

View File

@@ -600,7 +600,7 @@ const file_proto_metacrypt_v1_acme_proto_rawDesc = "" +
"\tSetConfig\x12\x1e.metacrypt.v1.SetConfigRequest\x1a\x1f.metacrypt.v1.SetConfigResponse\x12U\n" + "\tSetConfig\x12\x1e.metacrypt.v1.SetConfigRequest\x1a\x1f.metacrypt.v1.SetConfigResponse\x12U\n" +
"\fListAccounts\x12!.metacrypt.v1.ListAccountsRequest\x1a\".metacrypt.v1.ListAccountsResponse\x12O\n" + "\fListAccounts\x12!.metacrypt.v1.ListAccountsRequest\x1a\".metacrypt.v1.ListAccountsResponse\x12O\n" +
"\n" + "\n" +
"ListOrders\x12\x1f.metacrypt.v1.ListOrdersRequest\x1a .metacrypt.v1.ListOrdersResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "ListOrders\x12\x1f.metacrypt.v1.ListOrdersRequest\x1a .metacrypt.v1.ListOrdersResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_acme_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_acme_proto_rawDescOnce sync.Once

View File

@@ -324,7 +324,7 @@ const file_proto_metacrypt_v1_auth_proto_rawDesc = "" +
"\vAuthService\x12@\n" + "\vAuthService\x12@\n" +
"\x05Login\x12\x1a.metacrypt.v1.LoginRequest\x1a\x1b.metacrypt.v1.LoginResponse\x12C\n" + "\x05Login\x12\x1a.metacrypt.v1.LoginRequest\x1a\x1b.metacrypt.v1.LoginResponse\x12C\n" +
"\x06Logout\x12\x1b.metacrypt.v1.LogoutRequest\x1a\x1c.metacrypt.v1.LogoutResponse\x12L\n" + "\x06Logout\x12\x1b.metacrypt.v1.LogoutRequest\x1a\x1c.metacrypt.v1.LogoutResponse\x12L\n" +
"\tTokenInfo\x12\x1e.metacrypt.v1.TokenInfoRequest\x1a\x1f.metacrypt.v1.TokenInfoResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\tTokenInfo\x12\x1e.metacrypt.v1.TokenInfoRequest\x1a\x1f.metacrypt.v1.TokenInfoResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_auth_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_auth_proto_rawDescOnce sync.Once

View File

@@ -455,7 +455,7 @@ const file_proto_metacrypt_v1_barrier_proto_rawDesc = "" +
"\bListKeys\x12\x1d.metacrypt.v1.ListKeysRequest\x1a\x1e.metacrypt.v1.ListKeysResponse\x12L\n" + "\bListKeys\x12\x1d.metacrypt.v1.ListKeysRequest\x1a\x1e.metacrypt.v1.ListKeysResponse\x12L\n" +
"\tRotateMEK\x12\x1e.metacrypt.v1.RotateMEKRequest\x1a\x1f.metacrypt.v1.RotateMEKResponse\x12L\n" + "\tRotateMEK\x12\x1e.metacrypt.v1.RotateMEKRequest\x1a\x1f.metacrypt.v1.RotateMEKResponse\x12L\n" +
"\tRotateKey\x12\x1e.metacrypt.v1.RotateKeyRequest\x1a\x1f.metacrypt.v1.RotateKeyResponse\x12T\n" + "\tRotateKey\x12\x1e.metacrypt.v1.RotateKeyRequest\x1a\x1f.metacrypt.v1.RotateKeyResponse\x12T\n" +
"\aMigrate\x12#.metacrypt.v1.MigrateBarrierRequest\x1a$.metacrypt.v1.MigrateBarrierResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\aMigrate\x12#.metacrypt.v1.MigrateBarrierRequest\x1a$.metacrypt.v1.MigrateBarrierResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_barrier_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_barrier_proto_rawDescOnce sync.Once

View File

@@ -24,7 +24,7 @@ var File_proto_metacrypt_v1_common_proto protoreflect.FileDescriptor
const file_proto_metacrypt_v1_common_proto_rawDesc = "" + const file_proto_metacrypt_v1_common_proto_rawDesc = "" +
"\n" + "\n" +
"\x1fproto/metacrypt/v1/common.proto\x12\fmetacrypt.v1B>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\x1fproto/metacrypt/v1/common.proto\x12\fmetacrypt.v1B>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var file_proto_metacrypt_v1_common_proto_goTypes = []any{} var file_proto_metacrypt_v1_common_proto_goTypes = []any{}
var file_proto_metacrypt_v1_common_proto_depIdxs = []int32{ var file_proto_metacrypt_v1_common_proto_depIdxs = []int32{

View File

@@ -483,7 +483,7 @@ const file_proto_metacrypt_v1_engine_proto_rawDesc = "" +
"\aUnmount\x12\x1c.metacrypt.v1.UnmountRequest\x1a\x1d.metacrypt.v1.UnmountResponse\x12O\n" + "\aUnmount\x12\x1c.metacrypt.v1.UnmountRequest\x1a\x1d.metacrypt.v1.UnmountResponse\x12O\n" +
"\n" + "\n" +
"ListMounts\x12\x1f.metacrypt.v1.ListMountsRequest\x1a .metacrypt.v1.ListMountsResponse\x12F\n" + "ListMounts\x12\x1f.metacrypt.v1.ListMountsRequest\x1a .metacrypt.v1.ListMountsResponse\x12F\n" +
"\aExecute\x12\x1c.metacrypt.v1.ExecuteRequest\x1a\x1d.metacrypt.v1.ExecuteResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\aExecute\x12\x1c.metacrypt.v1.ExecuteRequest\x1a\x1d.metacrypt.v1.ExecuteResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_engine_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_engine_proto_rawDescOnce sync.Once

View File

@@ -324,7 +324,7 @@ const file_proto_metacrypt_v1_pki_proto_rawDesc = "" +
"PKIService\x12R\n" + "PKIService\x12R\n" +
"\vGetRootCert\x12 .metacrypt.v1.GetRootCertRequest\x1a!.metacrypt.v1.GetRootCertResponse\x12I\n" + "\vGetRootCert\x12 .metacrypt.v1.GetRootCertRequest\x1a!.metacrypt.v1.GetRootCertResponse\x12I\n" +
"\bGetChain\x12\x1d.metacrypt.v1.GetChainRequest\x1a\x1e.metacrypt.v1.GetChainResponse\x12X\n" + "\bGetChain\x12\x1d.metacrypt.v1.GetChainRequest\x1a\x1e.metacrypt.v1.GetChainResponse\x12X\n" +
"\rGetIssuerCert\x12\".metacrypt.v1.GetIssuerCertRequest\x1a#.metacrypt.v1.GetIssuerCertResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\rGetIssuerCert\x12\".metacrypt.v1.GetIssuerCertRequest\x1a#.metacrypt.v1.GetIssuerCertResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_pki_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_pki_proto_rawDescOnce sync.Once

View File

@@ -481,7 +481,7 @@ const file_proto_metacrypt_v1_policy_proto_rawDesc = "" +
"\fCreatePolicy\x12!.metacrypt.v1.CreatePolicyRequest\x1a\".metacrypt.v1.CreatePolicyResponse\x12U\n" + "\fCreatePolicy\x12!.metacrypt.v1.CreatePolicyRequest\x1a\".metacrypt.v1.CreatePolicyResponse\x12U\n" +
"\fListPolicies\x12!.metacrypt.v1.ListPoliciesRequest\x1a\".metacrypt.v1.ListPoliciesResponse\x12L\n" + "\fListPolicies\x12!.metacrypt.v1.ListPoliciesRequest\x1a\".metacrypt.v1.ListPoliciesResponse\x12L\n" +
"\tGetPolicy\x12\x1e.metacrypt.v1.GetPolicyRequest\x1a\x1f.metacrypt.v1.GetPolicyResponse\x12U\n" + "\tGetPolicy\x12\x1e.metacrypt.v1.GetPolicyRequest\x1a\x1f.metacrypt.v1.GetPolicyResponse\x12U\n" +
"\fDeletePolicy\x12!.metacrypt.v1.DeletePolicyRequest\x1a\".metacrypt.v1.DeletePolicyResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\fDeletePolicy\x12!.metacrypt.v1.DeletePolicyRequest\x1a\".metacrypt.v1.DeletePolicyResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_policy_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_policy_proto_rawDescOnce sync.Once

View File

@@ -380,7 +380,7 @@ const file_proto_metacrypt_v1_system_proto_rawDesc = "" +
"\x06Status\x12\x1b.metacrypt.v1.StatusRequest\x1a\x1c.metacrypt.v1.StatusResponse\x12=\n" + "\x06Status\x12\x1b.metacrypt.v1.StatusRequest\x1a\x1c.metacrypt.v1.StatusResponse\x12=\n" +
"\x04Init\x12\x19.metacrypt.v1.InitRequest\x1a\x1a.metacrypt.v1.InitResponse\x12C\n" + "\x04Init\x12\x19.metacrypt.v1.InitRequest\x1a\x1a.metacrypt.v1.InitResponse\x12C\n" +
"\x06Unseal\x12\x1b.metacrypt.v1.UnsealRequest\x1a\x1c.metacrypt.v1.UnsealResponse\x12=\n" + "\x06Unseal\x12\x1b.metacrypt.v1.UnsealRequest\x1a\x1c.metacrypt.v1.UnsealResponse\x12=\n" +
"\x04Seal\x12\x19.metacrypt.v1.SealRequest\x1a\x1a.metacrypt.v1.SealResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3" "\x04Seal\x12\x19.metacrypt.v1.SealRequest\x1a\x1a.metacrypt.v1.SealResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1b\x06proto3"
var ( var (
file_proto_metacrypt_v1_system_proto_rawDescOnce sync.Once file_proto_metacrypt_v1_system_proto_rawDescOnce sync.Once

View File

@@ -592,7 +592,7 @@ const file_proto_metacrypt_v2_acme_proto_rawDesc = "" +
"\tSetConfig\x12\x1e.metacrypt.v2.SetConfigRequest\x1a\x1f.metacrypt.v2.SetConfigResponse\x12U\n" + "\tSetConfig\x12\x1e.metacrypt.v2.SetConfigRequest\x1a\x1f.metacrypt.v2.SetConfigResponse\x12U\n" +
"\fListAccounts\x12!.metacrypt.v2.ListAccountsRequest\x1a\".metacrypt.v2.ListAccountsResponse\x12O\n" + "\fListAccounts\x12!.metacrypt.v2.ListAccountsRequest\x1a\".metacrypt.v2.ListAccountsResponse\x12O\n" +
"\n" + "\n" +
"ListOrders\x12\x1f.metacrypt.v2.ListOrdersRequest\x1a .metacrypt.v2.ListOrdersResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "ListOrders\x12\x1f.metacrypt.v2.ListOrdersRequest\x1a .metacrypt.v2.ListOrdersResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_acme_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_acme_proto_rawDescOnce sync.Once

View File

@@ -325,7 +325,7 @@ const file_proto_metacrypt_v2_auth_proto_rawDesc = "" +
"\vAuthService\x12@\n" + "\vAuthService\x12@\n" +
"\x05Login\x12\x1a.metacrypt.v2.LoginRequest\x1a\x1b.metacrypt.v2.LoginResponse\x12C\n" + "\x05Login\x12\x1a.metacrypt.v2.LoginRequest\x1a\x1b.metacrypt.v2.LoginResponse\x12C\n" +
"\x06Logout\x12\x1b.metacrypt.v2.LogoutRequest\x1a\x1c.metacrypt.v2.LogoutResponse\x12L\n" + "\x06Logout\x12\x1b.metacrypt.v2.LogoutRequest\x1a\x1c.metacrypt.v2.LogoutResponse\x12L\n" +
"\tTokenInfo\x12\x1e.metacrypt.v2.TokenInfoRequest\x1a\x1f.metacrypt.v2.TokenInfoResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\tTokenInfo\x12\x1e.metacrypt.v2.TokenInfoRequest\x1a\x1f.metacrypt.v2.TokenInfoResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_auth_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_auth_proto_rawDescOnce sync.Once

View File

@@ -455,7 +455,7 @@ const file_proto_metacrypt_v2_barrier_proto_rawDesc = "" +
"\bListKeys\x12\x1d.metacrypt.v2.ListKeysRequest\x1a\x1e.metacrypt.v2.ListKeysResponse\x12L\n" + "\bListKeys\x12\x1d.metacrypt.v2.ListKeysRequest\x1a\x1e.metacrypt.v2.ListKeysResponse\x12L\n" +
"\tRotateMEK\x12\x1e.metacrypt.v2.RotateMEKRequest\x1a\x1f.metacrypt.v2.RotateMEKResponse\x12L\n" + "\tRotateMEK\x12\x1e.metacrypt.v2.RotateMEKRequest\x1a\x1f.metacrypt.v2.RotateMEKResponse\x12L\n" +
"\tRotateKey\x12\x1e.metacrypt.v2.RotateKeyRequest\x1a\x1f.metacrypt.v2.RotateKeyResponse\x12T\n" + "\tRotateKey\x12\x1e.metacrypt.v2.RotateKeyRequest\x1a\x1f.metacrypt.v2.RotateKeyResponse\x12T\n" +
"\aMigrate\x12#.metacrypt.v2.MigrateBarrierRequest\x1a$.metacrypt.v2.MigrateBarrierResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\aMigrate\x12#.metacrypt.v2.MigrateBarrierRequest\x1a$.metacrypt.v2.MigrateBarrierResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_barrier_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_barrier_proto_rawDescOnce sync.Once

View File

@@ -2075,7 +2075,7 @@ const file_proto_metacrypt_v2_ca_proto_rawDesc = "" +
"\n" + "\n" +
"RevokeCert\x12\x1f.metacrypt.v2.RevokeCertRequest\x1a .metacrypt.v2.RevokeCertResponse\x12O\n" + "RevokeCert\x12\x1f.metacrypt.v2.RevokeCertRequest\x1a .metacrypt.v2.RevokeCertResponse\x12O\n" +
"\n" + "\n" +
"DeleteCert\x12\x1f.metacrypt.v2.DeleteCertRequest\x1a .metacrypt.v2.DeleteCertResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "DeleteCert\x12\x1f.metacrypt.v2.DeleteCertRequest\x1a .metacrypt.v2.DeleteCertResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_ca_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_ca_proto_rawDescOnce sync.Once

View File

@@ -24,7 +24,7 @@ var File_proto_metacrypt_v2_common_proto protoreflect.FileDescriptor
const file_proto_metacrypt_v2_common_proto_rawDesc = "" + const file_proto_metacrypt_v2_common_proto_rawDesc = "" +
"\n" + "\n" +
"\x1fproto/metacrypt/v2/common.proto\x12\fmetacrypt.v2B>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\x1fproto/metacrypt/v2/common.proto\x12\fmetacrypt.v2B>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var file_proto_metacrypt_v2_common_proto_goTypes = []any{} var file_proto_metacrypt_v2_common_proto_goTypes = []any{}
var file_proto_metacrypt_v2_common_proto_depIdxs = []int32{ var file_proto_metacrypt_v2_common_proto_depIdxs = []int32{

View File

@@ -366,7 +366,7 @@ const file_proto_metacrypt_v2_engine_proto_rawDesc = "" +
"\x05Mount\x12\x1a.metacrypt.v2.MountRequest\x1a\x1b.metacrypt.v2.MountResponse\x12F\n" + "\x05Mount\x12\x1a.metacrypt.v2.MountRequest\x1a\x1b.metacrypt.v2.MountResponse\x12F\n" +
"\aUnmount\x12\x1c.metacrypt.v2.UnmountRequest\x1a\x1d.metacrypt.v2.UnmountResponse\x12O\n" + "\aUnmount\x12\x1c.metacrypt.v2.UnmountRequest\x1a\x1d.metacrypt.v2.UnmountResponse\x12O\n" +
"\n" + "\n" +
"ListMounts\x12\x1f.metacrypt.v2.ListMountsRequest\x1a .metacrypt.v2.ListMountsResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "ListMounts\x12\x1f.metacrypt.v2.ListMountsRequest\x1a .metacrypt.v2.ListMountsResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_engine_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_engine_proto_rawDescOnce sync.Once

View File

@@ -426,7 +426,7 @@ const file_proto_metacrypt_v2_pki_proto_rawDesc = "" +
"\vGetRootCert\x12 .metacrypt.v2.GetRootCertRequest\x1a!.metacrypt.v2.GetRootCertResponse\x12I\n" + "\vGetRootCert\x12 .metacrypt.v2.GetRootCertRequest\x1a!.metacrypt.v2.GetRootCertResponse\x12I\n" +
"\bGetChain\x12\x1d.metacrypt.v2.GetChainRequest\x1a\x1e.metacrypt.v2.GetChainResponse\x12X\n" + "\bGetChain\x12\x1d.metacrypt.v2.GetChainRequest\x1a\x1e.metacrypt.v2.GetChainResponse\x12X\n" +
"\rGetIssuerCert\x12\".metacrypt.v2.GetIssuerCertRequest\x1a#.metacrypt.v2.GetIssuerCertResponse\x12C\n" + "\rGetIssuerCert\x12\".metacrypt.v2.GetIssuerCertRequest\x1a#.metacrypt.v2.GetIssuerCertResponse\x12C\n" +
"\x06GetCRL\x12\x1b.metacrypt.v2.GetCRLRequest\x1a\x1c.metacrypt.v2.GetCRLResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\x06GetCRL\x12\x1b.metacrypt.v2.GetCRLRequest\x1a\x1c.metacrypt.v2.GetCRLResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_pki_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_pki_proto_rawDescOnce sync.Once

View File

@@ -481,7 +481,7 @@ const file_proto_metacrypt_v2_policy_proto_rawDesc = "" +
"\fCreatePolicy\x12!.metacrypt.v2.CreatePolicyRequest\x1a\".metacrypt.v2.CreatePolicyResponse\x12U\n" + "\fCreatePolicy\x12!.metacrypt.v2.CreatePolicyRequest\x1a\".metacrypt.v2.CreatePolicyResponse\x12U\n" +
"\fListPolicies\x12!.metacrypt.v2.ListPoliciesRequest\x1a\".metacrypt.v2.ListPoliciesResponse\x12L\n" + "\fListPolicies\x12!.metacrypt.v2.ListPoliciesRequest\x1a\".metacrypt.v2.ListPoliciesResponse\x12L\n" +
"\tGetPolicy\x12\x1e.metacrypt.v2.GetPolicyRequest\x1a\x1f.metacrypt.v2.GetPolicyResponse\x12U\n" + "\tGetPolicy\x12\x1e.metacrypt.v2.GetPolicyRequest\x1a\x1f.metacrypt.v2.GetPolicyResponse\x12U\n" +
"\fDeletePolicy\x12!.metacrypt.v2.DeletePolicyRequest\x1a\".metacrypt.v2.DeletePolicyResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\fDeletePolicy\x12!.metacrypt.v2.DeletePolicyRequest\x1a\".metacrypt.v2.DeletePolicyResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_policy_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_policy_proto_rawDescOnce sync.Once

View File

@@ -1919,7 +1919,7 @@ const file_proto_metacrypt_v2_sshca_proto_rawDesc = "" +
"RevokeCert\x12\".metacrypt.v2.SSHRevokeCertRequest\x1a#.metacrypt.v2.SSHRevokeCertResponse\x12U\n" + "RevokeCert\x12\".metacrypt.v2.SSHRevokeCertRequest\x1a#.metacrypt.v2.SSHRevokeCertResponse\x12U\n" +
"\n" + "\n" +
"DeleteCert\x12\".metacrypt.v2.SSHDeleteCertRequest\x1a#.metacrypt.v2.SSHDeleteCertResponse\x12I\n" + "DeleteCert\x12\".metacrypt.v2.SSHDeleteCertRequest\x1a#.metacrypt.v2.SSHDeleteCertResponse\x12I\n" +
"\x06GetKRL\x12\x1e.metacrypt.v2.SSHGetKRLRequest\x1a\x1f.metacrypt.v2.SSHGetKRLResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\x06GetKRL\x12\x1e.metacrypt.v2.SSHGetKRLRequest\x1a\x1f.metacrypt.v2.SSHGetKRLResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_sshca_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_sshca_proto_rawDescOnce sync.Once

View File

@@ -380,7 +380,7 @@ const file_proto_metacrypt_v2_system_proto_rawDesc = "" +
"\x06Status\x12\x1b.metacrypt.v2.StatusRequest\x1a\x1c.metacrypt.v2.StatusResponse\x12=\n" + "\x06Status\x12\x1b.metacrypt.v2.StatusRequest\x1a\x1c.metacrypt.v2.StatusResponse\x12=\n" +
"\x04Init\x12\x19.metacrypt.v2.InitRequest\x1a\x1a.metacrypt.v2.InitResponse\x12C\n" + "\x04Init\x12\x19.metacrypt.v2.InitRequest\x1a\x1a.metacrypt.v2.InitResponse\x12C\n" +
"\x06Unseal\x12\x1b.metacrypt.v2.UnsealRequest\x1a\x1c.metacrypt.v2.UnsealResponse\x12=\n" + "\x06Unseal\x12\x1b.metacrypt.v2.UnsealRequest\x1a\x1c.metacrypt.v2.UnsealResponse\x12=\n" +
"\x04Seal\x12\x19.metacrypt.v2.SealRequest\x1a\x1a.metacrypt.v2.SealResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\x04Seal\x12\x19.metacrypt.v2.SealRequest\x1a\x1a.metacrypt.v2.SealResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_system_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_system_proto_rawDescOnce sync.Once

View File

@@ -2075,7 +2075,7 @@ const file_proto_metacrypt_v2_transit_proto_rawDesc = "" +
"\x04Sign\x12 .metacrypt.v2.TransitSignRequest\x1a!.metacrypt.v2.TransitSignResponse\x12Q\n" + "\x04Sign\x12 .metacrypt.v2.TransitSignRequest\x1a!.metacrypt.v2.TransitSignResponse\x12Q\n" +
"\x06Verify\x12\".metacrypt.v2.TransitVerifyRequest\x1a#.metacrypt.v2.TransitVerifyResponse\x12K\n" + "\x06Verify\x12\".metacrypt.v2.TransitVerifyRequest\x1a#.metacrypt.v2.TransitVerifyResponse\x12K\n" +
"\x04Hmac\x12 .metacrypt.v2.TransitHmacRequest\x1a!.metacrypt.v2.TransitHmacResponse\x12c\n" + "\x04Hmac\x12 .metacrypt.v2.TransitHmacRequest\x1a!.metacrypt.v2.TransitHmacResponse\x12c\n" +
"\fGetPublicKey\x12(.metacrypt.v2.GetTransitPublicKeyRequest\x1a).metacrypt.v2.GetTransitPublicKeyResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "\fGetPublicKey\x12(.metacrypt.v2.GetTransitPublicKeyRequest\x1a).metacrypt.v2.GetTransitPublicKeyResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_transit_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_transit_proto_rawDescOnce sync.Once

View File

@@ -1023,7 +1023,7 @@ const file_proto_metacrypt_v2_user_proto_rawDesc = "" +
"\tReEncrypt\x12\".metacrypt.v2.UserReEncryptRequest\x1a#.metacrypt.v2.UserReEncryptResponse\x12T\n" + "\tReEncrypt\x12\".metacrypt.v2.UserReEncryptRequest\x1a#.metacrypt.v2.UserReEncryptResponse\x12T\n" +
"\tRotateKey\x12\".metacrypt.v2.UserRotateKeyRequest\x1a#.metacrypt.v2.UserRotateKeyResponse\x12W\n" + "\tRotateKey\x12\".metacrypt.v2.UserRotateKeyRequest\x1a#.metacrypt.v2.UserRotateKeyResponse\x12W\n" +
"\n" + "\n" +
"DeleteUser\x12#.metacrypt.v2.UserDeleteUserRequest\x1a$.metacrypt.v2.UserDeleteUserResponseB>Z<git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3" "DeleteUser\x12#.metacrypt.v2.UserDeleteUserRequest\x1a$.metacrypt.v2.UserDeleteUserResponseB>Z<git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2b\x06proto3"
var ( var (
file_proto_metacrypt_v2_user_proto_rawDescOnce sync.Once file_proto_metacrypt_v2_user_proto_rawDescOnce sync.Once

4
go.mod
View File

@@ -1,10 +1,10 @@
module git.wntrmute.dev/kyle/metacrypt module git.wntrmute.dev/mc/metacrypt
go 1.25.7 go 1.25.7
require ( require (
git.wntrmute.dev/kyle/goutils v1.21.0 git.wntrmute.dev/kyle/goutils v1.21.0
git.wntrmute.dev/kyle/mcdsl v1.0.1 git.wntrmute.dev/mc/mcdsl v1.2.0
github.com/go-chi/chi/v5 v5.2.5 github.com/go-chi/chi/v5 v5.2.5
github.com/spf13/cobra v1.10.2 github.com/spf13/cobra v1.10.2
github.com/spf13/viper v1.21.0 github.com/spf13/viper v1.21.0

6
go.sum
View File

@@ -1,9 +1,7 @@
git.wntrmute.dev/kyle/goutils v1.21.0 h1:ZR7ovV400hsF09zc8tkdHs6vyen8TDJ7flong/dnFXM= git.wntrmute.dev/kyle/goutils v1.21.0 h1:ZR7ovV400hsF09zc8tkdHs6vyen8TDJ7flong/dnFXM=
git.wntrmute.dev/kyle/goutils v1.21.0/go.mod h1:JQ8NL5lHSEYl719UMf20p4G1ei70RVGma0hjjNXCR2c= git.wntrmute.dev/kyle/goutils v1.21.0/go.mod h1:JQ8NL5lHSEYl719UMf20p4G1ei70RVGma0hjjNXCR2c=
git.wntrmute.dev/kyle/mcdsl v1.0.0 h1:YB7dx4gdNYKKcVySpL6UkwHqdCJ9Nl1yS0+eHk0hNtk= git.wntrmute.dev/mc/mcdsl v1.2.0 h1:41hep7/PNZJfN0SN/nM+rQpyF1GSZcvNNjyVG81DI7U=
git.wntrmute.dev/kyle/mcdsl v1.0.0/go.mod h1:wo0tGfUAxci3XnOe4/rFmR0RjUElKdYUazc+Np986sg= git.wntrmute.dev/mc/mcdsl v1.2.0/go.mod h1:lXYrAt74ZUix6rx9oVN8d2zH1YJoyp4uxPVKQ+SSxuM=
git.wntrmute.dev/kyle/mcdsl v1.0.1 h1:Dr9Ud8cjWWybulpv+KsuSKbuZmzBXPCItQztR7o2hcA=
git.wntrmute.dev/kyle/mcdsl v1.0.1/go.mod h1:wo0tGfUAxci3XnOe4/rFmR0RjUElKdYUazc+Np986sg=
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs= github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g= github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=

View File

@@ -14,7 +14,7 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// directoryResponse is the ACME directory object (RFC 8555 §7.1.1). // directoryResponse is the ACME directory object (RFC 8555 §7.1.1).

View File

@@ -20,7 +20,7 @@ import (
"testing" "testing"
"time" "time"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
) )
// memBarrier is an in-memory barrier for testing. // memBarrier is an in-memory barrier for testing.

View File

@@ -9,8 +9,8 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// Handler implements the ACME protocol for a single CA mount. // Handler implements the ACME protocol for a single CA mount.

View File

@@ -6,7 +6,7 @@ import (
"errors" "errors"
"log/slog" "log/slog"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
) )
// TokenInfo is an alias for the mcdsl auth.TokenInfo type. // TokenInfo is an alias for the mcdsl auth.TokenInfo type.

View File

@@ -9,7 +9,7 @@ import (
"strings" "strings"
"sync" "sync"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
) )
var ( var (

View File

@@ -6,8 +6,8 @@ import (
"path/filepath" "path/filepath"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
func setupBarrier(t *testing.T) (*AESGCMBarrier, func()) { func setupBarrier(t *testing.T) (*AESGCMBarrier, func()) {

View File

@@ -4,8 +4,8 @@ package config
import ( import (
"fmt" "fmt"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
mcdslconfig "git.wntrmute.dev/kyle/mcdsl/config" mcdslconfig "git.wntrmute.dev/mc/mcdsl/config"
) )
// Config is the top-level configuration for Metacrypt. // Config is the top-level configuration for Metacrypt.

View File

@@ -4,7 +4,7 @@ package db
import ( import (
"database/sql" "database/sql"
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
) )
// Open opens or creates a SQLite database at the given path with the // Open opens or creates a SQLite database at the given path with the

View File

@@ -3,7 +3,7 @@ package db
import ( import (
"database/sql" "database/sql"
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
) )
// Migrations is the ordered list of metacrypt schema migrations. // Migrations is the ordered list of metacrypt schema migrations.

View File

@@ -21,8 +21,8 @@ import (
"git.wntrmute.dev/kyle/goutils/certlib/certgen" "git.wntrmute.dev/kyle/goutils/certlib/certgen"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
var ( var (

View File

@@ -10,8 +10,8 @@ import (
"testing" "testing"
"time" "time"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// memBarrier is an in-memory barrier for testing. // memBarrier is an in-memory barrier for testing.

View File

@@ -12,7 +12,7 @@ import (
"strings" "strings"
"sync" "sync"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
) )
// EngineType identifies a cryptographic engine type. // EngineType identifies a cryptographic engine type.

View File

@@ -6,7 +6,7 @@ import (
"log/slog" "log/slog"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
) )
// mockEngine implements Engine for testing. // mockEngine implements Engine for testing.

View File

@@ -22,9 +22,9 @@ import (
"golang.org/x/crypto/ssh" "golang.org/x/crypto/ssh"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
mcrypto "git.wntrmute.dev/kyle/metacrypt/internal/crypto" mcrypto "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
var ( var (

View File

@@ -12,8 +12,8 @@ import (
"golang.org/x/crypto/ssh" "golang.org/x/crypto/ssh"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// memBarrier is an in-memory barrier for testing. // memBarrier is an in-memory barrier for testing.

View File

@@ -27,9 +27,9 @@ import (
"golang.org/x/crypto/chacha20poly1305" "golang.org/x/crypto/chacha20poly1305"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
mcrypto "git.wntrmute.dev/kyle/metacrypt/internal/crypto" mcrypto "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
const maxBatchSize = 500 const maxBatchSize = 500

View File

@@ -7,8 +7,8 @@ import (
"sync" "sync"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// memBarrier is an in-memory barrier for testing. // memBarrier is an in-memory barrier for testing.

View File

@@ -19,9 +19,9 @@ import (
"golang.org/x/crypto/hkdf" "golang.org/x/crypto/hkdf"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
const ( const (

View File

@@ -7,8 +7,8 @@ import (
"sync" "sync"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// memBarrier is an in-memory barrier for testing. // memBarrier is an in-memory barrier for testing.

View File

@@ -8,10 +8,10 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
internacme "git.wntrmute.dev/kyle/metacrypt/internal/acme" internacme "git.wntrmute.dev/mc/metacrypt/internal/acme"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
type acmeServer struct { type acmeServer struct {

View File

@@ -7,8 +7,8 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
) )
type authServer struct { type authServer struct {

View File

@@ -7,9 +7,9 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
type barrierServer struct { type barrierServer struct {

View File

@@ -10,11 +10,11 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/ca" "git.wntrmute.dev/mc/metacrypt/internal/engine/ca"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
) )
type caServer struct { type caServer struct {

View File

@@ -7,9 +7,9 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
type engineServer struct { type engineServer struct {

View File

@@ -11,15 +11,15 @@ import (
"google.golang.org/grpc/metadata" "google.golang.org/grpc/metadata"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
// ---- test helpers ---- // ---- test helpers ----

View File

@@ -9,9 +9,9 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
// sealInterceptor rejects calls with FailedPrecondition when the vault is // sealInterceptor rejects calls with FailedPrecondition when the vault is

View File

@@ -7,9 +7,9 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/ca" "git.wntrmute.dev/mc/metacrypt/internal/engine/ca"
) )
type pkiServer struct { type pkiServer struct {

View File

@@ -6,8 +6,8 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
) )
type policyServer struct { type policyServer struct {

View File

@@ -11,16 +11,16 @@ import (
"google.golang.org/grpc" "google.golang.org/grpc"
"google.golang.org/grpc/metadata" "google.golang.org/grpc/metadata"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/mcdsl/grpcserver" "git.wntrmute.dev/mc/mcdsl/grpcserver"
internacme "git.wntrmute.dev/kyle/metacrypt/internal/acme" internacme "git.wntrmute.dev/mc/metacrypt/internal/acme"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
// GRPCServer wraps the mcdsl gRPC server and all service implementations. // GRPCServer wraps the mcdsl gRPC server and all service implementations.

View File

@@ -10,11 +10,11 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/sshca" "git.wntrmute.dev/mc/metacrypt/internal/engine/sshca"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
) )
type sshcaServer struct { type sshcaServer struct {

View File

@@ -7,9 +7,9 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
type systemServer struct { type systemServer struct {

View File

@@ -8,11 +8,11 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/transit" "git.wntrmute.dev/mc/metacrypt/internal/engine/transit"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
) )
type transitServer struct { type transitServer struct {

View File

@@ -8,11 +8,11 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/user" "git.wntrmute.dev/mc/metacrypt/internal/engine/user"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
) )
type userServer struct { type userServer struct {

View File

@@ -9,7 +9,7 @@ import (
"sort" "sort"
"strings" "strings"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
) )
const rulesPrefix = "policy/rules/" const rulesPrefix = "policy/rules/"

View File

@@ -5,9 +5,9 @@ import (
"path/filepath" "path/filepath"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
func setupPolicy(t *testing.T) (*Engine, func()) { func setupPolicy(t *testing.T) (*Engine, func()) {

View File

@@ -10,9 +10,9 @@ import (
"sync" "sync"
"time" "time"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
) )
// ServiceState represents the current state of the Metacrypt service. // ServiceState represents the current state of the Metacrypt service.

View File

@@ -7,9 +7,9 @@ import (
"path/filepath" "path/filepath"
"testing" "testing"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
) )
func setupSeal(t *testing.T) (*Manager, func()) { func setupSeal(t *testing.T) (*Manager, func()) {

View File

@@ -6,8 +6,8 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
internacme "git.wntrmute.dev/kyle/metacrypt/internal/acme" internacme "git.wntrmute.dev/mc/metacrypt/internal/acme"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
) )
// registerACMERoutes adds ACME protocol and management routes to r. // registerACMERoutes adds ACME protocol and management routes to r.

View File

@@ -5,8 +5,8 @@ import (
"net/http" "net/http"
"strings" "strings"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
type contextKey string type contextKey string

View File

@@ -11,16 +11,16 @@ import (
"git.wntrmute.dev/kyle/mcdsl/health" "git.wntrmute.dev/mc/mcdsl/health"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/ca" "git.wntrmute.dev/mc/metacrypt/internal/engine/ca"
"git.wntrmute.dev/kyle/metacrypt/internal/engine/sshca" "git.wntrmute.dev/mc/metacrypt/internal/engine/sshca"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
func (s *Server) registerRoutes(r chi.Router) { func (s *Server) registerRoutes(r chi.Router) {

View File

@@ -9,14 +9,14 @@ import (
"google.golang.org/grpc" "google.golang.org/grpc"
"git.wntrmute.dev/kyle/mcdsl/httpserver" "git.wntrmute.dev/mc/mcdsl/httpserver"
internacme "git.wntrmute.dev/kyle/metacrypt/internal/acme" internacme "git.wntrmute.dev/mc/metacrypt/internal/acme"
"git.wntrmute.dev/kyle/metacrypt/internal/audit" "git.wntrmute.dev/mc/metacrypt/internal/audit"
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
) )
// Server is the Metacrypt HTTP server. // Server is the Metacrypt HTTP server.

View File

@@ -13,19 +13,19 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"git.wntrmute.dev/kyle/metacrypt/internal/barrier" "git.wntrmute.dev/mc/metacrypt/internal/barrier"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
"git.wntrmute.dev/kyle/metacrypt/internal/crypto" "git.wntrmute.dev/mc/metacrypt/internal/crypto"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
mcdslconfig "git.wntrmute.dev/kyle/mcdsl/config" mcdslconfig "git.wntrmute.dev/mc/mcdsl/config"
"git.wntrmute.dev/kyle/metacrypt/internal/db" "git.wntrmute.dev/mc/metacrypt/internal/db"
"git.wntrmute.dev/kyle/metacrypt/internal/engine" "git.wntrmute.dev/mc/metacrypt/internal/engine"
"git.wntrmute.dev/kyle/metacrypt/internal/policy" "git.wntrmute.dev/mc/metacrypt/internal/policy"
"git.wntrmute.dev/kyle/metacrypt/internal/seal" "git.wntrmute.dev/mc/metacrypt/internal/seal"
// auth is used indirectly via the server // auth is used indirectly via the server
"git.wntrmute.dev/kyle/metacrypt/internal/auth" "git.wntrmute.dev/mc/metacrypt/internal/auth"
) )
func setupTestServer(t *testing.T) (*Server, *seal.Manager, chi.Router) { func setupTestServer(t *testing.T) (*Server, *seal.Manager, chi.Router) {

View File

@@ -14,7 +14,7 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
webui "git.wntrmute.dev/kyle/metacrypt/web" webui "git.wntrmute.dev/mc/metacrypt/web"
) )
// mockVault is a minimal vaultBackend implementation for tests. // mockVault is a minimal vaultBackend implementation for tests.

View File

@@ -13,7 +13,7 @@ import (
"google.golang.org/grpc/credentials" "google.golang.org/grpc/credentials"
"google.golang.org/grpc/metadata" "google.golang.org/grpc/metadata"
pb "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2" pb "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2"
) )
// VaultClient wraps the gRPC stubs for communicating with the vault. // VaultClient wraps the gRPC stubs for communicating with the vault.

View File

@@ -8,7 +8,7 @@ import (
"strings" "strings"
"testing" "testing"
"git.wntrmute.dev/kyle/mcdsl/csrf" "git.wntrmute.dev/mc/mcdsl/csrf"
) )
func newTestCSRF(t *testing.T) *csrf.Protect { func newTestCSRF(t *testing.T) *csrf.Protect {

View File

@@ -17,7 +17,7 @@ import (
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"git.wntrmute.dev/kyle/mcdsl/web" "git.wntrmute.dev/mc/mcdsl/web"
) )
// splitLines splits a newline-delimited string into non-empty trimmed lines. // splitLines splits a newline-delimited string into non-empty trimmed lines.

View File

@@ -15,11 +15,11 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
"git.wntrmute.dev/kyle/mcdsl/csrf" "git.wntrmute.dev/mc/mcdsl/csrf"
"git.wntrmute.dev/kyle/mcdsl/web" "git.wntrmute.dev/mc/mcdsl/web"
"git.wntrmute.dev/kyle/metacrypt/internal/config" "git.wntrmute.dev/mc/metacrypt/internal/config"
webui "git.wntrmute.dev/kyle/metacrypt/web" webui "git.wntrmute.dev/mc/metacrypt/web"
) )
// vaultBackend is the interface used by WebServer to communicate with the vault. // vaultBackend is the interface used by WebServer to communicate with the vault.

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
// ACMEService provides authenticated management of ACME state. // ACMEService provides authenticated management of ACME state.
// These RPCs correspond to the REST management endpoints at /v1/acme/{mount}/. // These RPCs correspond to the REST management endpoints at /v1/acme/{mount}/.

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
service AuthService { service AuthService {
rpc Login(LoginRequest) returns (LoginResponse); rpc Login(LoginRequest) returns (LoginResponse);

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
service BarrierService { service BarrierService {
rpc ListKeys(ListKeysRequest) returns (ListKeysResponse); rpc ListKeys(ListKeysRequest) returns (ListKeysResponse);

View File

@@ -2,4 +2,4 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";

View File

@@ -4,7 +4,7 @@ package metacrypt.v1;
import "google/protobuf/struct.proto"; import "google/protobuf/struct.proto";
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
service EngineService { service EngineService {
rpc Mount(MountRequest) returns (MountResponse); rpc Mount(MountRequest) returns (MountResponse);

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
// PKIService provides unauthenticated access to public CA certificates. // PKIService provides unauthenticated access to public CA certificates.
// These endpoints only require the service to be unsealed. // These endpoints only require the service to be unsealed.

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
service PolicyService { service PolicyService {
rpc CreatePolicy(CreatePolicyRequest) returns (CreatePolicyResponse); rpc CreatePolicy(CreatePolicyRequest) returns (CreatePolicyResponse);

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v1; package metacrypt.v1;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v1;metacryptv1"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v1;metacryptv1";
service SystemService { service SystemService {
rpc Status(StatusRequest) returns (StatusResponse); rpc Status(StatusRequest) returns (StatusResponse);

View File

@@ -4,7 +4,7 @@ package metacrypt.v2;
import "google/protobuf/timestamp.proto"; import "google/protobuf/timestamp.proto";
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
// ACMEService provides authenticated management of ACME state. // ACMEService provides authenticated management of ACME state.
// These RPCs correspond to the REST management endpoints at /v2/acme/{mount}/. // These RPCs correspond to the REST management endpoints at /v2/acme/{mount}/.

View File

@@ -4,7 +4,7 @@ package metacrypt.v2;
import "google/protobuf/timestamp.proto"; import "google/protobuf/timestamp.proto";
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
service AuthService { service AuthService {
rpc Login(LoginRequest) returns (LoginResponse); rpc Login(LoginRequest) returns (LoginResponse);

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v2; package metacrypt.v2;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
service BarrierService { service BarrierService {
rpc ListKeys(ListKeysRequest) returns (ListKeysResponse); rpc ListKeys(ListKeysRequest) returns (ListKeysResponse);

View File

@@ -4,7 +4,7 @@ package metacrypt.v2;
import "google/protobuf/timestamp.proto"; import "google/protobuf/timestamp.proto";
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
// CAService provides typed, authenticated access to CA engine operations. // CAService provides typed, authenticated access to CA engine operations.
// All RPCs require the service to be unsealed. Write operations (CreateIssuer, // All RPCs require the service to be unsealed. Write operations (CreateIssuer,

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v2; package metacrypt.v2;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
// Common message types shared across metacrypt.v2 services. // Common message types shared across metacrypt.v2 services.
// Currently empty; reserved for future shared types. // Currently empty; reserved for future shared types.

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v2; package metacrypt.v2;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
// EngineService manages the lifecycle of engine mounts. // EngineService manages the lifecycle of engine mounts.
// In v2, typed service RPCs (e.g. CAService) replace the generic Execute RPC // In v2, typed service RPCs (e.g. CAService) replace the generic Execute RPC

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package metacrypt.v2; package metacrypt.v2;
option go_package = "git.wntrmute.dev/kyle/metacrypt/gen/metacrypt/v2;metacryptv2"; option go_package = "git.wntrmute.dev/mc/metacrypt/gen/metacrypt/v2;metacryptv2";
// PKIService provides unauthenticated access to public CA certificates. // PKIService provides unauthenticated access to public CA certificates.
// These endpoints only require the service to be unsealed. // These endpoints only require the service to be unsealed.

Some files were not shown because too many files have changed in this diff Show More