-
Notifications
You must be signed in to change notification settings - Fork 34
feat: implement mero-kms-phala service #1734
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
396d2e5 to
3b7e0de
Compare
SDK JS Workflows FailedThe following SDK JS workflow(s) failed:
Please check the workflow logs for more details. |
6bc9940 to
8bea518
Compare
2f21b32 to
fb893a0
Compare
xilosada
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please, address open issues
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with Cloud Agents, enable Autofix in the Cursor dashboard.
Merobox Proposals Workflows FailedThe following proposal workflow(s) failed:
Please check the workflow logs for more details. |
Merobox Workflows FailedThe following workflow(s) failed after retries:
Please check the workflow logs for more details. |
Note
Adds a TEE-aware key management service and enables optional encrypted storage in the node.
crates/mero-kms-phala: Axum service verifying TDX quotes and fetching deterministic keys viadstack-sdk; includes/healthand/get-keyendpoints, env-based config, Dockerfile, and compose filemerod: fetches storage key from configured KMS (tee.kms.phala.url), derives attestation nonce from peer ID, and refuses to start if KMS fetch fails when TEE is configuredcalimero-store-encryption: AES-256-GCM value encryption with HKDF-derived DEKs, key versioning/rotation;EncryptedDatabasewrapper and decrypting iteratorcalimero-store:StoreConfigsupportswith_encryption; transactions gainraw_put/raw_deletecalimero-node: opens RocksDB wrapped byEncryptedDatabasewhen an encryption key is presentcalimero-config: addstee→kms.phala.urltypes (usingUrl)mero-kms-phalabinary to builds and a container release job with new prebuilt Dockerfile; minor extraction step tweakdeny.toml: allowsDstack-TEE/dstackgit sourceWritten by Cursor Bugbot for commit 9aa455a. This will update automatically on new commits. Configure here.