# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO # # When uploading crates to the registry Cargo will automatically # "normalize" Cargo.toml files for maximal compatibility # with all versions of Cargo and also rewrite `path` dependencies # to registry (e.g., crates.io) dependencies. # # If you are reading this file be aware that the original Cargo.toml # will likely look very different (and much more reasonable). # See Cargo.toml.orig for the original contents. [package] edition = "2021" name = "secret-vault" version = "1.14.0" authors = ["Abdulla Abdurakhmanov "] include = [ "Cargo.toml", "src/**/*.rs", "../README.md", "../LICENSE", "../SECURITY.md", ] description = "Library provides a secure vault to store securely application secrets in memory from Google/AWS/K8S and environment variables" homepage = "https://github.com/abdolence/secret-vault-rs" documentation = "https://docs.rs/secret-vault" readme = "README.md" keywords = [ "secret", "google", "aws", ] categories = [ "cryptography", "api-bindings", ] license = "Apache-2.0" repository = "https://github.com/abdolence/secret-vault-rs" [package.metadata.docs.rs] all-features = true [package.metadata.release] tag-prefix = "" [lib] name = "secret_vault" path = "src/lib.rs" bench = false [[example]] name = "gcp_secret_manager_vault" path = "examples/gcp_secret_manager_vault.rs" required-features = [ "gcp-secretmanager", "ring-aead-encryption", ] [[example]] name = "aws_secret_manager_vault" path = "examples/aws_secret_manager_vault.rs" required-features = [ "aws-secretmanager", "ring-aead-encryption", ] [[example]] name = "kms_gcp_secret_manager_vault" path = "examples/kms_gcp_secret_manager_vault.rs" required-features = [ "gcp-secretmanager", "gcp-kms-encryption", ] [[example]] name = "kms_aws_secret_manager_vault" path = "examples/kms_aws_secret_manager_vault.rs" required-features = [ "aws-secretmanager", "aws-kms-encryption", ] [[example]] name = "insecure_env_secret_vault" path = "examples/insecure_env_secret_vault.rs" [[example]] name = "auto_refresh_secret_manager_vault" path = "examples/auto_refresh_secret_manager_vault.rs" required-features = ["aws-secretmanager"] [[example]] name = "multiple_sources" path = "examples/multiple_sources.rs" required-features = ["aws-secretmanager"] [[example]] name = "files_source" path = "examples/files_source.rs" [[example]] name = "hashmap_snapshot" path = "examples/hashmap_snapshot.rs" required-features = ["ahash"] [[example]] name = "secret_gen_source" path = "examples/secret_gen_source.rs" required-features = ["ring-aead-encryption"] [[bench]] name = "read_vault_bench" path = "benches/read_vault_bench.rs" harness = false required-features = [ "ring-aead-encryption", "ahash", ] [dependencies.ahash] version = "0.8" optional = true [dependencies.async-trait] version = "0.1" [dependencies.aws-config] version = "1" optional = true [dependencies.aws-sdk-kms] version = "1" optional = true [dependencies.aws-sdk-secretsmanager] version = "1" optional = true [dependencies.aws-smithy-types-convert] version = "0.60" features = ["convert-chrono"] optional = true [dependencies.chrono] version = "0.4" features = [ "clock", "std", "serde", ] default-features = false [dependencies.gcloud-sdk] version = "0.25" optional = true [dependencies.hex] version = "0.4" [dependencies.kms-aead] version = "0.19" optional = true [dependencies.ring] version = "0.17" features = [ "default", "std", ] optional = true [dependencies.rsb_derive] version = "0.5" [dependencies.rvstruct] version = "0.3" [dependencies.secret-vault-value] version = "0.3" features = ["hex"] [dependencies.serde] version = "1" features = ["derive"] optional = true [dependencies.tokio] version = "1" features = [ "sync", "tracing", "macros", "rt", "time", ] [dependencies.tracing] version = "0.1" [dependencies.zeroize] version = "1.8" features = [ "std", "derive", ] [dev-dependencies.criterion] version = "0.5" features = [ "async", "async_futures", "cargo_bench_support", "html_reports", "futures", "tokio", "async_tokio", ] [dev-dependencies.proptest] version = "1.4" [dev-dependencies.serde_json] version = "1" [dev-dependencies.tempfile] version = "3.10" [dev-dependencies.tokio] version = "1" features = ["full"] [dev-dependencies.tracing-subscriber] version = "0.3" features = ["env-filter"] [build-dependencies.cargo-husky] version = "1.5" features = [ "run-for-all", "prepush-hook", "run-cargo-fmt", ] default-features = false [features] ahash = ["dep:ahash"] aws = [ "dep:aws-config", "dep:aws-smithy-types-convert", ] aws-kms-encryption = [ "aws", "kms", "dep:aws-sdk-kms", "kms-aead/aws-kms-encryption", "ring-aead-encryption", ] aws-secretmanager = [ "aws", "dep:aws-sdk-secretsmanager", ] default = [] gcp = ["gcloud-sdk"] gcp-kms-encryption = [ "gcp", "kms", "gcloud-sdk/google-cloud-kms-v1", "kms-aead/gcp-kms-encryption", "ring-aead-encryption", ] gcp-secretmanager = [ "gcp", "gcloud-sdk/google-cloud-secretmanager-v1", "ring-aead-encryption", ] kms = ["kms-aead/default"] ring-aead-encryption = [ "dep:ring", "kms-aead/ring-aead-encryption", ] serde = [ "dep:serde", "chrono/serde", "secret-vault-value/serde", ] [badges.maintenance] status = "actively-developed"