Purpose
Policy-aware trace vault with sessions, permissions, storage backends, WAL, fsck, snapshots, and replication. This page follows the real source shape for Trace Vault and explains the workflow a developer is likely to use first.Trust contract
Document which keys authorize the operation, what is signed, what is encrypted, what is deliberately public, and which policy hook can deny the call. Security examples should use deterministic test vectors where possible.Primary types to know
AgentPermissions— libs/trace-vault/src/permissions.rsAppendGuard— libs/trace-vault/src/vault.rsAtom— libs/trace-vault/src/vault.rsCreateOptions— libs/trace-vault/src/config.rsDefaultPolicy— libs/trace-vault/src/policy.rsFileMetadataStorage— libs/trace-vault/src/storage/filesystem.rsFileSystemStorage— libs/trace-vault/src/storage/filesystem.rsFileSystemStorageFactory— libs/trace-vault/src/storage/filesystem.rsFileTraceStorage— libs/trace-vault/src/storage/filesystem.rsFsckReport— libs/trace-vault/src/fsck.rsIndexingConfig— libs/trace-vault/src/config.rsLruStoragePool— libs/trace-vault/src/storage/mod.rs
Example shape
Release-quality documentation checklist
- Every public type on the API Surface page has at least one sentence of behavior documentation.
- Every fallible operation lists errors and recovery guidance.
- Every networked example names the peer/session/topic lifecycle.
- Every storage example names durability, repair, and deletion semantics.