- Project/component: thenv server contract
- Canonical path:
servers/thenv
- Runtime: Go server
- Primary language: Go
- CLI and web-console clients performing secret management operations
- Operators enforcing policy, audit, and availability targets
- Stable component identifier:
server. - API contracts for secret lifecycle operations must align with CLI and web console semantics.
- Trust/bootstrap and policy evaluation contracts must remain explicit and versioned.
- Owns encrypted secret storage and trust metadata persistence.
- Retention and revocation metadata must be auditable and deterministic.
- Enforce strict authentication, authorization, encryption, and audit requirements.
- Never expose secret values in logs, metrics labels, or default error responses.
- Use structured
log/sloglogs for auth decisions, policy checks, and secret lifecycle operations. - Include actor ID, resource scope, action type, and sanitized result fields.
- Local validation:
go test ./servers/thenv/... - Repository baseline:
go test ./...
- Client integrations:
cmds/thenvandapps/devkit/src/apps/thenv. - Shared policy model must remain aligned with thenv project-level trust invariants.
- Update
docs/project-thenv.mdand this file for server API, policy, or storage changes. - Synchronize trust model changes with CLI and web console thenv docs.
docs/project-thenv.mddocs/cmds-thenv-cli-foundation.mddocs/apps-thenv-web-console-foundation.mddocs/domain-template.md