Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(sdk): Allow custom KAO array templates #307

Merged
merged 17 commits into from
Aug 21, 2024

Conversation

dmihalcik-virtru
Copy link
Member

@dmihalcik-virtru dmihalcik-virtru commented Jul 15, 2024

This will allow opening of files with multi-kas splits.

Step 1 of #314

While I'm here I also:

  1. Lets platform-xtest job run in parallel with other e2e tests
  2. Updates config for platform-roundtrip job, since the provision fixture keycloak needs a new config file
  3. Adds a new phony make target to simplify development, you can now make cli to get the cli without having to guess the version number
  4. Adds a prettier ignore directive so make format no longer formats the generated protocol buffer code
  5. Updates the fetching of KAS public keys to happen during encrypt, not during client creation. This makes more sense now that we don't know at client start time which kases will actually be involved in the encrypt step

@dmihalcik-virtru dmihalcik-virtru requested a review from a team as a code owner July 15, 2024 14:19
@dmihalcik-virtru dmihalcik-virtru force-pushed the feature/encryption-info-versioning branch from d9df338 to b3ed7b2 Compare July 15, 2024 14:20
Copy link

If these changes look good, signoff on them with:

git pull && git commit --amend --signoff && git push --force-with-lease origin

If they aren't any good, please remove them with:

git pull && git reset --hard HEAD~1 && git push --force-with-lease origin

pflynn-virtru
pflynn-virtru previously approved these changes Jul 15, 2024
@dmihalcik-virtru dmihalcik-virtru force-pushed the feature/encryption-info-versioning branch from ec2b51c to d7d484c Compare July 15, 2024 16:43
@dmihalcik-virtru dmihalcik-virtru changed the title Feature/encryption info versioning feat(sdk): Allow custom KAO array templates Jul 15, 2024
@dmihalcik-virtru dmihalcik-virtru force-pushed the feature/encryption-info-versioning branch from d7d484c to 938d2ea Compare July 16, 2024 01:43
pflynn-virtru
pflynn-virtru previously approved these changes Jul 16, 2024
@dmihalcik-virtru dmihalcik-virtru force-pushed the feature/encryption-info-versioning branch 2 times, most recently from 08625d6 to 445e20c Compare July 31, 2024 16:56
Copy link

If these changes look good, signoff on them with:

git pull && git commit --amend --signoff && git push --force-with-lease origin

If they aren't any good, please remove them with:

git pull && git reset --hard HEAD~1 && git push --force-with-lease origin

dmihalcik-virtru and others added 3 commits August 7, 2024 10:29
Small refactor to consolidate KAS methods
- Adds the ability to share and split DEKs
- Reconstructs keys using share ids
- Does NOT support TDFs that were created with id-less splits. While the old code did support reading them, it did not support creating them
Signed-off-by: David Mihalcik <dmihalcik@virtru.com>
@dmihalcik-virtru dmihalcik-virtru force-pushed the feature/encryption-info-versioning branch from dac8253 to 6180784 Compare August 7, 2024 14:30
Copy link

sonarcloud bot commented Aug 21, 2024

@dmihalcik-virtru dmihalcik-virtru merged commit fd1b386 into main Aug 21, 2024
12 checks passed
@dmihalcik-virtru dmihalcik-virtru deleted the feature/encryption-info-versioning branch August 21, 2024 22:15
dmihalcik-virtru added a commit that referenced this pull request Aug 22, 2024
- Adds the ability to share and split DEKs
- Reconstructs keys using share ids

This will allow opening of files with multi-kas splits.

Step 1 of #314

While I'm here I also:

1. Lets platform-xtest job run in parallel with other e2e tests
2. Updates config for platform-roundtrip job, since the `provision fixture keycloak` needs a new config file
3. Adds a new phony make target to simplify development, you can now `make cli` to get the cli without having to guess the version number
4. Adds a `prettier ignore` directive so `make format` no longer formats the generated protocol buffer code
5. Updates the fetching of KAS public keys to happen during encrypt, not during client creation. This makes more sense now that we don't know at client start time which kases will actually be involved in the encrypt step

---
Co-authored-by: Patrick Bacon-Blaber <pbacon-blaber@virtru.com>

Signed-off-by: David Mihalcik <dmihalcik@virtru.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants