You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: fix 25 documentation issues found by dual-verification review
Correct blocking issues across 15 documentation files:
- Fix TLS example TOML field names to match serde model (certificate_path/private_key_path)
- Fix incorrect passwords in Go test README and DEVELOPMENT.md
- Fix broken relative links in how-to guide and message-flow SVG references
- Fix CHANGELOG Prometheus metric name (cache_hit → cache_hits)
- Add missing Prometheus metrics to reference table
- Fix supported architectures to include both arm64 and amd64
- Fix LICENSE link, port convention typo, callout syntax
- Fix searchable-json operator direction, malformed JSON, and remove duplicate section
- Add .env.proxy.docker credential template to README getting-started
- Fill in "Running Proxy locally" TODO section
- Clarify cipher_cache_size, mapping_errors_enabled env var, and language test paths
- Update ARCHITECTURE.md package tree with missing directories
Copy file name to clipboardExpand all lines: CHANGELOG.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/).
17
17
18
18
### Added
19
19
20
-
-**Cipher cache miss metric**: New Prometheus counter `cipherstash_proxy_keyset_cipher_cache_miss_total` tracks cache misses requiring cipher initialization. This complements the `cipherstash_proxy_keyset_cipher_cache_hit_total` metric, and can be used to calculate cache hit/miss ratio.
20
+
-**Cipher cache miss metric**: New Prometheus counter `cipherstash_proxy_keyset_cipher_cache_miss_total` tracks cache misses requiring cipher initialization. This complements the `cipherstash_proxy_keyset_cipher_cache_hits_total` metric, and can be used to calculate cache hit/miss ratio.
21
21
-**Cipher init duration metric**: New Prometheus histogram `cipherstash_proxy_keyset_cipher_init_duration_seconds` tracks cipher initialization time including ZeroKMS network calls.
22
22
-**Encrypt/decrypt timing**: Debug logs for `encrypt_eql` and `decrypt_eql` now include `duration_ms`.
23
23
-**Cache eviction logging**: ScopedCipher cache eviction events are now logged under the `ZEROKMS` target.
Copy file name to clipboardExpand all lines: docs/errors.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -220,6 +220,8 @@ When `mapping_errors_enabled` is `false` (the default), then type check errors a
220
220
221
221
When `mapping_errors_enabled` is `true`, then type check errors are raised, and statement execution halts.
222
222
223
+
Configure this setting with the environment variable `CS_DEVELOPMENT__ENABLE_MAPPING_ERRORS` or in the TOML config file under `[development] enable_mapping_errors = true`.
224
+
223
225
In our experience, most production systems have a relatively small number of columns that require protection.
224
226
As SQL is large and complex, instead of blocking statements with type check errors that are false negatives, the default behaviour of Proxy is to allow the statement.
Copy file name to clipboardExpand all lines: docs/how-to/index.md
+24-4Lines changed: 24 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ services:
58
58
```
59
59
60
60
61
-
For a fully-working example, go to [`docker-compose.yml`](./docker-compose.yml).
61
+
For a fully-working example, go to [`docker-compose.yml`](../../docker-compose.yml).
62
62
Follow the steps in [Getting started](../README.md#getting-started) to see it in action.
63
63
64
64
Once you have set up a `docker-compose.yml`, start the Proxy container:
@@ -132,7 +132,27 @@ Read the full list of configuration options and what they do in the [reference d
132
132
133
133
## Running Proxy locally
134
134
135
-
TODO: Add instructions for running Proxy locally
135
+
To run CipherStash Proxy locally for development:
136
+
137
+
```bash
138
+
# Install prerequisites
139
+
mise trust --yes && mise install
140
+
141
+
# Start PostgreSQL and install EQL
142
+
mise run postgres:up --extra-args "--detach --wait"
143
+
mise run postgres:setup
144
+
145
+
# Run Proxy as a local process
146
+
mise run proxy
147
+
```
148
+
149
+
Alternatively, run Proxy in a container:
150
+
151
+
```bash
152
+
mise run proxy:up --extra-args "--detach --wait"
153
+
```
154
+
155
+
See [Configuring Proxy](#configuring-proxy) for required environment variables and configuration options.
136
156
137
157
## Setting up the database schema
138
158
@@ -223,14 +243,14 @@ The first SQL statement adds a `match` index, which is used for partial matches
223
243
The second SQL statement adds an `ore` index, which is used for ordering with `ORDER BY`.
224
244
225
245
226
-
> ![IMPORTANT]
246
+
> [!IMPORTANT]
227
247
> Adding, updating, or deleting encrypted indexes on columns that already contain encrypted data will not re-index that data. To use the new indexes, you must `SELECT` the data out of the column, and `UPDATE` it again.
228
248
229
249
To learn how to use encrypted indexes for other encrypted data types like `text`, `int`, `boolean`, `date`, and `jsonb`, see the [EQL documentation](https://github.com/cipherstash/encrypt-query-language/blob/main/docs/reference/INDEX.md).
230
250
231
251
When deploying CipherStash Proxy into production environments with real data, we recommend that you apply these database schema changes with the normal tools and process you use for making changes to your database schema.
232
252
233
-
To see more examples of how to modify your database schema, check out [the example schema](./sql/schema-example.sql) from [Getting started](#getting-started).
253
+
To see more examples of how to modify your database schema, check out [the example schema](../sql/schema-example.sql) from [Getting started](#getting-started).
Copy file name to clipboardExpand all lines: docs/reference/index.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This page contains reference documentation for configuring CipherStash Proxy and
16
16
17
17
## Proxy config options
18
18
19
-
You can configure CipherStash Proxy with a config file, enviroment variables, or a combination of the two – see [Configuring Proxy](#configuring-proxy) for instructions.
19
+
You can configure CipherStash Proxy with a config file, environment variables, or a combination of the two – see [Configuring Proxy](#configuring-proxy) for instructions.
20
20
21
21
The following are all the configuration options available for Proxy, with their equivalent environment variables:
22
22
@@ -29,7 +29,7 @@ The following are all the configuration options available for Proxy, with their
29
29
# Env: CS_SERVER__HOST
30
30
host = "0.0.0.0"
31
31
32
-
# Proxy host posgt
32
+
# Proxy host port
33
33
# Optional
34
34
# Default: `6432`
35
35
# Env: CS_SERVER__PORT
@@ -60,8 +60,8 @@ worker_threads = "4"
60
60
# Env: CS_SERVER__THREAD_STACK_SIZE
61
61
thread_stack_size = "2097152"
62
62
63
-
# Cipher cache size (number of entries)
64
-
# Sets the maximum number of encryption/decryption operations to cache
63
+
# Cipher cache size (number of keyset-scoped ciphers)
64
+
# Sets the maximum number of keyset-scoped ciphers to cache (internal sizing is calculated per entry)
CipherStash Proxy is [available as a Docker container image](https://hub.docker.com/r/cipherstash/proxy) for `linux/arm64` architectures.
634
+
CipherStash Proxy is [available as a Docker container image](https://hub.docker.com/r/cipherstash/proxy) for `linux/arm64`and `linux/amd64`architectures.
633
635
634
-
If you're interested in a Docker image for other architectures (like `linux/amd64`), upvote[this idea](https://github.com/cipherstash/proxy/discussions/214).
636
+
For other architecture requests, see[this discussion](https://github.com/cipherstash/proxy/discussions/214).
0 commit comments