parallaxsecond/parsec-client-rust

Parsec Rust Client

When using the JWT-SVID authentication method, the client will expect the SPIFFE_ENDPOINT_SOCKET environment variable to contain the path of the Workload API endpoint

This repository contains a Rust client for consuming the API provided by the Parsec service. The low-level functionality that this library uses for IPC is implemented in the interface crate.

When using the JWT-SVID authentication method, the client will expect the SPIFFE_ENDPOINT_SOCKET environment variable to contain the path of the Workload API endpoint. You will need to compile the crate with the spiffe-auth feature activated. See the SPIFFE Workload Endpoint for more information.

Locating the Parsec endpoint

The Rust client follows the service discovery policy to find the Parsec endpoint. For example if the socket is at /tmp/parsec.sock:

export PARSEC_SERVICE_ENDPOINT="unix:/tmp/parsec.sock"

License

The software is provided under Apache-2.0. Contributions to this project are accepted under the same license.

Contributing

Please check the Contribution Guidelines to know more about the contribution process.

Copyright 2020 Contributors to the Parsec project.

Issues

Collection of the latest Issues

jn9e9

jn9e9

Comment Icon0

To support https://github.com/parallaxsecond/parsec-tool/issues/49 it is necessary to create a new BasicClient without authentication being automatically configured as it is with BasicClient::new().

It would be possible to use latest version of new_naked(), but this would not automatically configure other aspects of the client (e.g. providers).

New method should do all the auto configuration as BasicClient::new() except for authenticator, which should be set to Authentication::None

hug-dev

hug-dev

documentation
Comment Icon0

As a proof to the following mitigation on the Client threat model:

The Parsec client is coded with safety in mind and is tested extensively.

There should be a list of tests, somewhere, describing in high-level terms the kind of tests that we do on the client.

This could either be in the book or somewhere in this repo. It would also probably be good to have a link from this repo to the threat model. Clients using Parsec through this Rust crate directly might not even look at the global Parsec documentation but just want to use it.

ionut-arm

ionut-arm

enhancement
Comment Icon5

No proper work has been done to identify solid trends within the Rust development community as to how cryptography APIs should be defined. Time invested in this would be worthwhile, especially with a plan to update our core client (and any future abstract clients).

If possible, the outcome of the investigation should be to improve our APIs. Additionally, the findings should be summarised as a markdown page presenting the ideas behind/"philosophy of" our APIs.

Information - Updated Jan 18, 2022

Stars: 8
Forks: 13
Issues: 4

Orion is a cryptography library written in pure Rust

It aims to provide easy and usable crypto while trying to minimize the use of unsafe code

Orion is a cryptography library written in pure Rust

Rustls is a modern TLS library written in Rust

ring for cryptography and rustls-pemfile crate

Rustls is a modern TLS library written in Rust

Mundane is a Rust cryptography library backed by BoringSSL that is difficult

to misuse, ergonomic, and performant (in that order)

Mundane is a Rust cryptography library backed by BoringSSL that is difficult

Rustls is a modern TLS library written in Rust

ring for cryptography and rustls-pemfile crate

Rustls is a modern TLS library written in Rust

This repository holds a Rust port of Google's Tink cryptography library

This repository holds a Rust port of Google's RustCrypto crates – this repo focuses on making

This repository holds a Rust port of Google's Tink cryptography library

A cryptography library that is mainly implemented in Rust

I aim to implement bindings to other languages such as C/C++ and Python

A cryptography library that is mainly implemented in Rust

RSA-key-encryption

A simple RSA cryptography library

RSA-key-encryption

The SIDH-RS library is an efficient supersingular isogeny-based cryptography library written in Rust language

The library includes the ephemeral Diffie-Hellman key exchange (SIDH) as described in [1,2]

The SIDH-RS library is an efficient supersingular isogeny-based cryptography library written in Rust language

The Hydrogen library is a small, easy-to-use, hard-to-misuse cryptographic library

Hydrogen library is a small, easy-to-use, hard-to-misuse cryptographic library

The Hydrogen library is a small, easy-to-use, hard-to-misuse cryptographic library

To use this library, you can either use one of the provided finite fields, or...

Gridiron Cryptography Services team has conducted an audit of this library - release

To use this library, you can either use one of the provided finite fields, or...

This project has reached the end of its development as a cryptographic library

Feel free to browse the code, and feel free to use it, but it will

This project has reached the end of its development as a cryptographic library
Facebook Instagram Twitter GitHub Dribbble
Privacy