Releases: scrtlabs/secret-vm-build
Releases · scrtlabs/secret-vm-build
v0.0.20
v0.0.19
v0.0.18
REST-attest — Update
- Token-based protection: endpoints now require an access token for restricted routes.
- Configurable mask: a single mask defines which routes are public vs token-protected.
- Unified coverage: the mask applies to both API endpoints and their HTML views.
v0.0.17
v0.0.17
v0.0.16
Cnanges
- Password support for KMS requests in both
kms-query
and thesecret-vm-startup
script (readsvm_password
fromsecret-vm.json
). - Dev override: when running in dev mode (
DEBUG=true
), a custom KMS contract address fromsecret-vm.json
(kms_contract_address
) can be used.
If these fields are not present, behavior remains unchanged.
v0.0.15
v0.0.14
Changelog
Added
- New
/services
endpoint — returns list of available services (secretvm
+ all Docker containers).
Changed
-
Improved
/logs
endpoint:- Unified output format (systemd + Docker logs sorted by timestamp).
- Filtering of noisy “blob data” entries.
- Support for selecting logs per specific container via query parameter
?service=
.
Other
- SecretVM version is now printed into
/logs
at VM startup for easier diagnostics.
v0.0.13
Changelog
KMS-related changes
- Updated secrets fetching to support service-scoped env (by
service_id
). - Updated kms-query tool.
Attest REST changes
/status
now includes anenv
field (dev / prod) depending on the machine type.- Added private_mode feature: when enabled, logs and docker-compose endpoints are disabled.
- Added public keys endpoints:
/publickey_ed25519
/publickey_secp256k1
(HTML views are also available at/*.html
)
v0.0.12
v0.0.12