Skip to content

Add HermitStash — post-quantum encrypted file uploads#253

Open
dotCooCoo wants to merge 3 commits intoportainer:masterfrom
dotCooCoo:add-hermitstash
Open

Add HermitStash — post-quantum encrypted file uploads#253
dotCooCoo wants to merge 3 commits intoportainer:masterfrom
dotCooCoo:add-hermitstash

Conversation

@dotCooCoo
Copy link
Copy Markdown

New template: HermitStash

Post-quantum encrypted, self-hosted file upload server.

Image: ghcr.io/dotcoocoo/hermitstash:latest
Project: https://github.com/dotCooCoo/hermitstash
License: AGPL-3.0-or-later

Template includes

  • Port 3000
  • Persistent volumes for /app/data and /app/uploads
  • TRUST_PROXY and RP_ORIGIN environment variables
  • Note about --shm-size=256m requirement
  • Logo icon from assets.hermitstash.com

Features

  • ML-KEM-1024 + P-384 hybrid encryption (FIPS 203)
  • Zero plaintext on disk — vault-sealed database
  • One-command deploy, admin panel for all configuration
  • Multi-arch: linux/amd64 + linux/arm64

- Pin image tag to :1 (rolling latest in 1.x major) instead of :latest
- Add PUID/PGID/UMASK/TZ env vars
- Note recommends cap_drop=ALL + minimal cap_add, no-new-privileges, init=true
  (set under Portainer Advanced container settings during deployment)
- Refresh description to mention WebAuthn passkeys, TOTP 2FA (HMAC-SHA-512),
  shareable links, and S3 backend support — the original one-line summary
  understated the feature surface.
- Note: add stop_grace_period=1m to the recommended runtime flags so the
  SQLite shutdown path can flush + reseal data/db.key.enc before the
  container stops.
- Note: call out that /app/data/vault.key must be backed up after first run
  — losing it makes every encrypted record unrecoverable.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant