secret-vault 0.10.0

Library provides a secure vault to store application secrets in memory coming from Google/AWS/other secret managers
Documentation
use crate::errors::*;
use crate::*;
use async_trait::async_trait;
use kms_aead::KmsAeadEnvelopeEncryption;

use rvstruct::ValueStruct;
use secret_vault_value::SecretValue;

pub type AwsKmsKeyRef = kms_aead::providers::AwsKmsKeyRef;

pub struct AwsKmsEnvelopeEncryption {
    envelope_aead_encryption: kms_aead::KmsAeadRingEncryption<kms_aead::providers::AwsKmsProvider>,
}

impl AwsKmsEnvelopeEncryption {
    pub async fn new(kms_key_ref: &AwsKmsKeyRef) -> SecretVaultResult<Self> {
        let provider = kms_aead::providers::AwsKmsProvider::new(kms_key_ref)
            .await
            .map_err(|e| SecretVaultError::from(e))?;
        let envelope_aead_encryption = kms_aead::KmsAeadRingEncryption::new(provider)
            .await
            .map_err(|e| SecretVaultError::from(e))?;

        Ok(Self {
            envelope_aead_encryption,
        })
    }
}

#[async_trait]
impl SecretVaultEncryption for AwsKmsEnvelopeEncryption {
    async fn encrypt_value(
        &self,
        secret_name: &SecretName,
        secret_value: &SecretValue,
    ) -> SecretVaultResult<EncryptedSecretValue> {
        let (encrypted_value, _) = self
            .envelope_aead_encryption
            .encrypt_value(secret_name.value().into(), secret_value)
            .await?;

        Ok(encrypted_value.into())
    }

    async fn decrypt_value(
        &self,
        secret_name: &SecretName,
        encrypted_secret_value: &EncryptedSecretValue,
    ) -> SecretVaultResult<SecretValue> {
        let (secret_value, _) = self
            .envelope_aead_encryption
            .decrypt_value(
                secret_name.value().into(),
                &encrypted_secret_value.clone().into(),
            )
            .await?;
        Ok(secret_value)
    }
}