1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
use Secret;
use crateResult;
use Future;
use Uuid;
/// Repository abstraction for persisting authentication [`Secret`]s (hashed credentials).
///
/// Secrets are intentionally stored separately from account metadata to allow:
/// - Split persistence (e.g. different database / schema / encryption domain)
/// - Principle of least privilege for services that only need account profile data
/// - Defense-in-depth (compartmentalization if one store is compromised)
///
/// # Semantics
///
/// | Method | Success Value | Special `false` / `None` Meaning | Error (`Err`) Meaning |
/// |-------------------|------------------------------|------------------------------------------------|-----------------------------------------------|
/// | `store_secret` | `true` (inserted) | `false` = secret already exists for account_id | Backend / persistence failure |
/// | `update_secret` | `()` | — | Backend / persistence failure |
/// | `delete_secret` | `Some(secret)` = removed | `None` = no secret for that id | Backend / persistence failure |
///
/// # Implementation Guidelines
///
/// - `store_secret` SHOULD perform an atomic insert (do not overwrite existing secret).
/// - `update_secret` SHOULD replace the stored hash (e.g. after password change / rehash).
/// - `delete_secret` MUST (where possible) remove and return atomically to enable callers
/// to perform compensating actions if subsequent logic fails.
/// - All methods should avoid leaking timing that distinguishes “exists vs not” where the
/// caller relies on indistinguishability (e.g. during login flows with enumeration resistance).
///
/// # Error vs Absence
///
/// Use:
/// - `Ok(false)` (only for `store_secret`) to indicate a duplicate attempt.
/// - `Ok(None)` for expected absence (`delete_secret`).
/// - `Err(..)` strictly for exceptional conditions (I/O, serialization, constraint violation).
///
/// # Example (rotate secret)
/// ```rust
/// use axum_gate::secrets::{Secret, SecretRepository};
/// use axum_gate::hashing::argon2::Argon2Hasher;
/// use axum_gate::repositories::memory::MemorySecretRepository;
/// use uuid::Uuid;
///
/// fn rotate_secret(
/// repo: &MemorySecretRepository,
/// new_secret: Secret
/// ) -> axum_gate::errors::Result<()> {
/// tokio_test::block_on(repo.update_secret(new_secret))
/// }
///
/// // Usage
/// let repo = MemorySecretRepository::new_with_argon2_hasher().unwrap();
/// let account_id = Uuid::now_v7();
/// let hasher = Argon2Hasher::new_recommended().unwrap();
/// let secret = Secret::new(&account_id, "new_password", hasher).unwrap();
/// rotate_secret(&repo, secret).unwrap();
/// ```
///
/// # Security Note
///
/// Callers MUST ensure the `Secret` they pass was created using a secure hashing
/// service (e.g. Argon2 via `Secret::new`). This repository trait does not verify
/// hash format; it treats the value opaquely.
///
/// Avoid adding a read/list-all API to this trait; derive any necessary audit logging
/// at a different layer to minimize accidental exposure of hashed credentials.