Carbyne Stack secret sharing distributed object store

Related tags

Messaging amphora
Overview

Carbyne Stack Amphora Secret Share Store

codecov Codacy Badge Known Vulnerabilities pre-commit Contributor Covenant

Amphora is an open source object store for secret shared data and part of Carbyne Stack.

DISCLAIMER: Carbyne Stack Amphora is alpha software. The software is not ready for production use. It has neither been developed nor tested for a specific use case.

Please have a look at the underlying modules for more information on how to run an Amphora service or how to interact with it using the Java client:

  • Amphora Common - A shared library of commonly used functionality.
  • Amphora Service - The microservice implementing the object store for secret shared data.
  • Amphora Java Client - A Java Client library to interact with Amphora service(s). The module provides client implementations to communicate with
    • the Amphora service from within the Virtual Cloud Provider
    • other Amphora services participating in the Virtual Cloud
    • all Amphora services participating in the Virtual Cloud to share secret or recombine secret shared data.

Namesake

As of wikipedia an amphora (from Greek amphoras) is a type of container of a characteristic shape and size. Amphorae were used in vast numbers for the transport and storage of various products, both liquid and dry, but mostly for wine.

Secure Secret Sharing and Recombination

The Amphora client and service use an additive secret sharing scheme and implement the Input Supply and Output Delivery Protocol [1] of Damgard et al. to provide secure secret sharing and recombination methods in the client/server model of MPC. Therefore, sharing a secret will consume one Input Mask for each word (BigInteger) to be shared and two InputMasks as well as two Multiplication Triples for each secret word to be retrieved.

By this, retrieving a secret comes at higher cost in terms of tuple consumption, but will reveal if any of the MPC parties behaves malicious when providing secret shares. The DefaultAmphoraClient will throw an exception in case the verification fails according to the Output Delivery Protocol.

License

Carbyne Stack Amphora Secret Sharing Object Store is open-sourced under the Apache License 2.0. See the LICENSE file for details.

3rd Party Licenses

For information on how license obligations for 3rd party OSS dependencies are fulfilled see the README file of the Carbyne Stack repository.

Contributing

Please see the Carbyne Stack Contributor's Guide .

References

  1. Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft: Confidential Benchmarking based on Multiparty Computation. IACR Cryptology ePrint Archive 2015: 1006 (2015) https://eprint.iacr.org/2015/1006
Comments
  • Enable prometheus endpoint

    Enable prometheus endpoint

    This PR creates and exposes the /actuator/prometheus endpoint. This allows a monitoring system that is prometheus-compatible to collect metrics from the endpoint.

    Currently, this will only expose the Metrics provided by SpringBoot, which are not application-specific but rather describe the memory consumption, incoming Request rate and so on.

    Example of accessing this endpoint using curl

    curl http://$CLUSTER_DNS/amphora/actuator/prometheus
    
    opened by kindlich 16
  • test amphora

    test amphora

    hi, i am interested in your project and hope to learn your way of using MP-SPDZ library, but there seem not exist any guidance in README. Could you give some explainations?

    Thank you.

    kind/support 
    opened by zlemon819 2
  • customize docker plugin

    customize docker plugin

    so we can push to a different registry - e.g. a private one.

    Publish Amphora docker iamge to a private registry:

    export AMPHORA_IMAGE_TAG=latest
    mvn package dockerfile:push \
     -Ddocker.repository=registry.example.org/carbynestack/amphora-service \
     -Ddocker.tag=$AMPHORA_IMAGE_TAG \
     -Ddockerfile.skip=false
    
    kind/feature 
    opened by grafjo 2
  • [Snyk] Security upgrade org.apache.logging.log4j:log4j-core from 2.14.1 to 2.15.0

    [Snyk] Security upgrade org.apache.logging.log4j:log4j-core from 2.14.1 to 2.15.0

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 893/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 10 | Arbitrary Code Execution
    SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720 | org.apache.logging.log4j:log4j-core:
    2.14.1 -> 2.15.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 2
  • Add maven settings with public read-only token

    Add maven settings with public read-only token

    Replace workflow based server configuration for GH maven package repository with settings file containing a partially xml encoded / obfuscated public GH PAT. This is required to fix build issue for workflows triggered on fork workflow based pull requests. (see #17)

    Signed-off-by: Sebastian Becker [email protected]

    opened by sbckr 1
  • Bump commons-io from 2.6 to 2.7 in /amphora-service

    Bump commons-io from 2.6 to 2.7 in /amphora-service

    Bumps commons-io from 2.6 to 2.7.

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    opened by dependabot[bot] 1
  • [Snyk] Security upgrade org.postgresql:postgresql from 42.2.1 to 42.2.25

    [Snyk] Security upgrade org.postgresql:postgresql from 42.2.1 to 42.2.25

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-service/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 711/1000
    Why? Recently disclosed, Has a fix available, CVSS 8.5 | Remote Code Execution (RCE)
    SNYK-JAVA-ORGPOSTGRESQL-2390459 | org.postgresql:postgresql:
    42.2.1 -> 42.2.25
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 1
  • [Snyk] Fix for 1 vulnerabilities

    [Snyk] Fix for 1 vulnerabilities

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 723/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 6.6 | Arbitrary Code Execution
    SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2327339 | org.apache.logging.log4j:log4j-core:
    2.16.0 -> 2.17.1
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Vulnerabilities that could not be fixed

    • Upgrade:
      • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.4.RELEASE/spring-boot-dependencies-2.2.4.RELEASE.pom

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 1
  • [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.10.2 to 2.12.6

    [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.10.2 to 2.12.6

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-common/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 581/1000
    Why? Recently disclosed, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
    SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698 | com.fasterxml.jackson.core:jackson-databind:
    2.10.2 -> 2.12.6
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 1
  • [Snyk] Fix for 1 vulnerabilities

    [Snyk] Fix for 1 vulnerabilities

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 792/1000
    Why? Currently trending on Twitter, Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.5 | Denial of Service (DoS)
    SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2321524 | org.apache.logging.log4j:log4j-core:
    2.16.0 -> 2.17.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Vulnerabilities that could not be fixed

    • Upgrade:
      • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.4.RELEASE/spring-boot-dependencies-2.2.4.RELEASE.pom

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic

    opened by snyk-bot 1
  • Upgrade helm-oci-chart-releaser to v0.3.0

    Upgrade helm-oci-chart-releaser to v0.3.0

    Required since Helm 3.7.0 broke former version 0.2.0. This was resolved with appany/helm-oci-chart-releaser#4

    Signed-off-by: Sebastian Becker [email protected]

    kind/bug 
    opened by sbckr 1
  • [Snyk] Fix for 6 vulnerabilities

    [Snyk] Fix for 6 vulnerabilities

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-service/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 521/1000
    Why? Recently disclosed, Has a fix available, CVSS 4.7 | Information Exposure
    SNYK-JAVA-ORGPOSTGRESQL-3146847 | org.postgresql:postgresql:
    42.3.3 -> 42.3.8
    | No | No Known Exploit high severity | 589/1000
    Why? Has a fix available, CVSS 7.5 | Denial of Service (DoS)
    SNYK-JAVA-ORGYAML-2806360 | | Yes | No Known Exploit low severity | 506/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 3.7 | Stack-based Buffer Overflow
    SNYK-JAVA-ORGYAML-3016888 | | Yes | Proof of Concept low severity | 399/1000
    Why? Has a fix available, CVSS 3.7 | Stack-based Buffer Overflow
    SNYK-JAVA-ORGYAML-3016889 | | Yes | No Known Exploit medium severity | 536/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 4.3 | Stack-based Buffer Overflow
    SNYK-JAVA-ORGYAML-3016891 | | Yes | Proof of Concept low severity | 471/1000
    Why? Recently disclosed, Has a fix available, CVSS 3.7 | Stack-based Buffer Overflow
    SNYK-JAVA-ORGYAML-3113851 | | Yes | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Vulnerabilities that could not be fixed

    • Upgrade:
      • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.4.RELEASE/spring-boot-dependencies-2.2.4.RELEASE.pom

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Denial of Service (DoS)

    opened by strieflin 1
  • [Snyk] Security upgrade io.minio:minio from 8.2.1 to 8.4.6

    [Snyk] Security upgrade io.minio:minio from 8.2.1 to 8.4.6

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-service/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 616/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
    SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424 | io.minio:minio:
    8.2.1 -> 8.4.6
    | No | Proof of Concept medium severity | 616/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
    SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426 | io.minio:minio:
    8.2.1 -> 8.4.6
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS)

    needs-triage 
    opened by snyk-bot 0
  • [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.12.6 to 2.12.7.1

    [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.12.6 to 2.12.7.1

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-common/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 712/1000
    Why? Currently trending on Twitter, Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
    SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426 | com.fasterxml.jackson.core:jackson-databind:
    2.12.6 -> 2.12.7.1
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Denial of Service (DoS)

    needs-triage 
    opened by strieflin 0
  • [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.12.6 to 2.13.4

    [Snyk] Security upgrade com.fasterxml.jackson.core:jackson-databind from 2.12.6 to 2.13.4

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-common/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 688/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
    SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424 | com.fasterxml.jackson.core:jackson-databind:
    2.12.6 -> 2.13.4
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Denial of Service (DoS)

    needs-triage 
    opened by snyk-bot 1
  • [Snyk] Security upgrade io.minio:minio from 8.2.1 to 8.4.4

    [Snyk] Security upgrade io.minio:minio from 8.2.1 to 8.4.4

    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-service/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 731/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 8.2 | Information Exposure
    SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044 | io.minio:minio:
    8.2.1 -> 8.4.4
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    needs-triage 
    opened by snyk-bot 0
  • [Snyk] Security upgrade org.postgresql:postgresql from 42.3.3 to 42.4.1

    [Snyk] Security upgrade org.postgresql:postgresql from 42.3.3 to 42.4.1

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • amphora-service/pom.xml

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 748/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.1 | SQL Injection
    SNYK-JAVA-ORGPOSTGRESQL-2970521 | org.postgresql:postgresql:
    42.3.3 -> 42.4.1
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    needs-triage 
    opened by strieflin 2
Releases(0.1-SNAPSHOT-3541990771-21-ef4f222)
Owner
Carbyne Stack
Cloud Native Secure Multiparty Computation
Carbyne Stack
Evgeniy Khyst 54 Dec 28, 2022
EventStoreDB is the database for Event Sourcing. This repository provides a sample of event sourced system that uses EventStoreDB as event store.

Event Sourcing with EventStoreDB Introduction Example Domain Event Sourcing and CQRS 101 State-Oriented Persistence Event Sourcing CQRS Advantages of

Evgeniy Khyst 53 Dec 15, 2022
A distributed event bus that implements a RESTful API abstraction on top of Kafka-like queues

Nakadi Event Broker Nakadi is a distributed event bus broker that implements a RESTful API abstraction on top of Kafka-like queues, which can be used

Zalando SE 866 Dec 21, 2022
Apache Pulsar - distributed pub-sub messaging system

Pulsar is a distributed pub-sub messaging platform with a very flexible messaging model and an intuitive client API. Learn more about Pulsar at https:

The Apache Software Foundation 12.1k Jan 4, 2023
A high available,high performance distributed messaging system.

#新闻 MetaQ 1.4.6.2发布。更新日志 MetaQ 1.4.6.1发布。更新日志 MetaQ 1.4.5.1发布。更新日志 MetaQ 1.4.5发布。更新日志 Meta-ruby 0.1 released: a ruby client for metaq. SOURCE #介绍 Meta

dennis zhuang 1.3k Dec 12, 2022
An Open-Source, Distributed MQTT Message Broker for IoT.

MMQ broker MMQ broker 是一款完全开源,高度可伸缩,高可用的分布式 MQTT 消息服务器,适用于 IoT、M2M 和移动应用程序。 MMQ broker 完整支持MQTT V3.1 和 V3.1.1。 安装 MMQ broker 是跨平台的,支持 Linux、Unix、macOS

Solley 60 Dec 15, 2022
SeaTunnel is a distributed, high-performance data integration platform for the synchronization and transformation of massive data (offline & real-time).

SeaTunnel SeaTunnel was formerly named Waterdrop , and renamed SeaTunnel since October 12, 2021. SeaTunnel is a very easy-to-use ultra-high-performanc

The Apache Software Foundation 4.4k Jan 2, 2023
Carbyne Stack tuple store for secure multiparty computation

Carbyne Stack Castor Tuple Store Castor is an open source storage service for cryptographic material used in Secure Multiparty Computation, so called

Carbyne Stack 5 Oct 15, 2022
Carbyne Stack MP-SPDZ Integration Utilities

Carbyne Stack MP-SPDZ Integration Utilities This project provides utilities for using MP-SPDZ in the Carbyne Stack microservices. License Carbyne Stac

Carbyne Stack 5 Oct 15, 2022
Command Line Interface to interact with Carbyne Stack Virtual Clouds

Carbyne Stack Command Line Interface This is a CLI tool to communicate with the Carbyne Stack services. DISCLAIMER: The Carbyne Stack CLI is alpha sof

Carbyne Stack 5 Oct 15, 2022
Base classes and utilities for Java Carbyne Stack service clients

Carbyne Stack Java HTTP Client This project provides common functionality for the Java-based HTTP clients for the Carbyne Stack microservices. License

Carbyne Stack 5 Oct 15, 2022
Apache Mesos is a cluster manager that provides efficient resource isolation and sharing across distributed applications, or frameworks

Apache Mesos is a cluster manager that provides efficient resource isolation and sharing across distributed applications, or frameworks. It can run Hadoop, Jenkins, Spark, Aurora, and other frameworks on a dynamically shared pool of nodes.

The Apache Software Foundation 5k Dec 31, 2022
Evgeniy Khyst 54 Dec 28, 2022
Flink Table Store is a unified streaming and batch store for building dynamic tables on Apache Flink

Flink Table Store is a unified streaming and batch store for building dynamic tables on Apache Flink

The Apache Software Foundation 366 Jan 1, 2023
CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of machine data in real-time.

About CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of machine data in real-time. CrateDB offers the

Crate.io 3.6k Jan 2, 2023
A distributed in-memory data store for the cloud

EVCache EVCache is a memcached & spymemcached based caching solution that is mainly used for AWS EC2 infrastructure for caching frequently used data.

Netflix, Inc. 1.9k Jan 2, 2023
A simple file sharing program

FileSharing A simple file sharing program How to use Place all the files to be shared in /html/files (symbolic links work).

AK 3 May 13, 2021
backend for a sharing app using SpringBoot, Redis, MySQL, and AWS S3.

moments_v2_backend (Work In Progress) backend for a sharing app using SpringBoot, Redis, MySQL, and AWS S3. This is the second version of my project S

Haiming Sun 53 Dec 26, 2022
An open source codebase for sharing programming solutions.

Codinasion An open source codebase for sharing programming blogs and solutions. This repository contains the Markdown source files for codinasion.web.

Codinasion 0 Jan 2, 2023