age-core: Re-export secrecy crate

This commit is contained in:
Jack Grigg 2021-10-18 13:40:32 +01:00
parent bbe8d518fb
commit c7a2e998c6
25 changed files with 45 additions and 38 deletions

2
Cargo.lock generated
View file

@ -79,7 +79,6 @@ dependencies = [
"rsa",
"rust-embed",
"scrypt",
"secrecy",
"sha2",
"subtle",
"web-sys",
@ -112,7 +111,6 @@ dependencies = [
"bech32",
"chrono",
"gumdrop",
"secrecy",
]
[[package]]

View file

@ -8,6 +8,7 @@ to 1.0.0 are beta releases.
## [Unreleased]
### Added
- `age_core::secrecy`, which re-exports the `secrecy` crate.
- `age_core::plugin::Error`
### Changed

View file

@ -1,6 +1,9 @@
// Catch documentation errors caused by code changes.
#![deny(broken_intra_doc_links)]
// Re-export crates that are used in our public API.
pub use secrecy;
pub mod format;
pub mod primitives;

View file

@ -12,7 +12,6 @@ edition = "2018"
age-core = { version = "0.6.0", path = "../age-core", features = ["plugin"] }
bech32 = "0.8"
chrono = "0.4"
secrecy = "0.8"
[dev-dependencies]
gumdrop = "0.8"

View file

@ -1,4 +1,7 @@
use age_core::format::{FileKey, Stanza};
use age_core::{
format::{FileKey, Stanza},
secrecy::ExposeSecret,
};
use age_plugin::{
identity::{self, IdentityPluginV1},
print_new_identity,
@ -6,7 +9,6 @@ use age_plugin::{
run_state_machine, Callbacks,
};
use gumdrop::Options;
use secrecy::ExposeSecret;
use std::collections::HashMap;
use std::convert::TryInto;
use std::io;

View file

@ -3,9 +3,9 @@
use age_core::{
format::{FileKey, Stanza},
plugin::{self, BidirSend, Connection},
secrecy::{ExposeSecret, SecretString},
};
use bech32::FromBase32;
use secrecy::{ExposeSecret, SecretString};
use std::collections::HashMap;
use std::io;

View file

@ -165,8 +165,8 @@
#![deny(broken_intra_doc_links)]
#![deny(missing_docs)]
use age_core::secrecy::SecretString;
use bech32::Variant;
use secrecy::SecretString;
use std::io;
pub mod identity;

View file

@ -3,9 +3,9 @@
use age_core::{
format::{FileKey, Stanza, FILE_KEY_BYTES},
plugin::{self, BidirSend, Connection},
secrecy::SecretString,
};
use bech32::FromBase32;
use secrecy::SecretString;
use std::convert::TryInto;
use std::io;

View file

@ -60,7 +60,6 @@ cookie-factory = "0.3.1"
nom = { version = "7", default-features = false, features = ["alloc"] }
# Secret management
secrecy = "0.8"
subtle = "2"
zeroize = "1"

View file

@ -1,5 +1,6 @@
//! Common helpers for CLI binaries.
use age_core::secrecy::{ExposeSecret, SecretString};
use pinentry::PassphraseInput;
use rand::{
distributions::{Distribution, Uniform},
@ -7,7 +8,6 @@ use rand::{
CryptoRng, RngCore,
};
use rpassword::read_password_from_tty;
use secrecy::{ExposeSecret, SecretString};
use std::fmt;
use std::fs::File;
use std::io::{self, BufReader};

View file

@ -212,7 +212,7 @@ impl<R: io::Read, C: Callbacks + Clone + 'static> crate::Identity for Identity<R
mod tests {
use std::{cell::Cell, io::BufReader};
use secrecy::{ExposeSecret, SecretString};
use age_core::secrecy::{ExposeSecret, SecretString};
use super::Identity;
use crate::{
@ -254,7 +254,7 @@ fOrxrKTj7xCdNS3+OrCdnBC8Z9cKDxjCGWW3fkjLsYha0Jo=
}
/// This intentionally panics if called twice.
fn request_passphrase(&self, _: &str) -> Option<secrecy::SecretString> {
fn request_passphrase(&self, _: &str) -> Option<SecretString> {
Some(SecretString::new(self.0.take().unwrap().to_owned()))
}
}

View file

@ -128,7 +128,7 @@ impl IdentityFile {
#[cfg(test)]
pub(crate) mod tests {
use secrecy::ExposeSecret;
use age_core::secrecy::ExposeSecret;
use std::io::BufReader;
use super::{IdentityFile, IdentityFileEntry};

View file

@ -1,8 +1,11 @@
//! Key structs and serialization.
use age_core::{format::FileKey, primitives::hkdf};
use age_core::{
format::FileKey,
primitives::hkdf,
secrecy::{ExposeSecret, Secret},
};
use rand::{rngs::OsRng, RngCore};
use secrecy::{ExposeSecret, Secret};
use crate::{
error::DecryptError,

View file

@ -83,7 +83,7 @@
//! ## Passphrase-based encryption
//!
//! ```
//! use secrecy::Secret;
//! use age_core::secrecy::Secret;
//! use std::io::{Read, Write};
//!
//! # fn run_main() -> Result<(), ()> {
@ -177,8 +177,10 @@ pub mod plugin;
#[cfg_attr(docsrs, doc(cfg(feature = "ssh")))]
pub mod ssh;
use age_core::format::{FileKey, Stanza};
use secrecy::SecretString;
use age_core::{
format::{FileKey, Stanza},
secrecy::SecretString,
};
/// A private key or other value that can unwrap an opaque file key from a recipient
/// stanza.

View file

@ -3,9 +3,9 @@
use age_core::{
format::{FileKey, Stanza},
plugin::{Connection, IDENTITY_V1, RECIPIENT_V1},
secrecy::ExposeSecret,
};
use bech32::Variant;
use secrecy::ExposeSecret;
use std::convert::TryInto;
use std::fmt;
use std::io;

View file

@ -1,11 +1,11 @@
//! Primitive cryptographic operations used by `age`.
use age_core::secrecy::{ExposeSecret, Secret};
use hmac::{
crypto_mac::{MacError, Output},
Hmac, Mac, NewMac,
};
use scrypt::{errors::InvalidParams, scrypt as scrypt_inner, Params as ScryptParams};
use secrecy::{ExposeSecret, Secret};
use sha2::Sha256;
use std::io::{self, Write};

View file

@ -1,11 +1,11 @@
//! I/O helper structs for age file encryption and decryption.
use age_core::secrecy::{ExposeSecret, SecretVec};
use chacha20poly1305::{
aead::{generic_array::GenericArray, Aead, NewAead},
ChaCha20Poly1305,
};
use pin_project::pin_project;
use secrecy::{ExposeSecret, SecretVec};
use std::cmp;
use std::convert::TryInto;
use std::io::{self, Read, Seek, SeekFrom, Write};
@ -643,7 +643,7 @@ impl<R: Read + Seek> Seek for StreamReader<R> {
#[cfg(test)]
mod tests {
use secrecy::ExposeSecret;
use age_core::secrecy::ExposeSecret;
use std::io::{self, Cursor, Read, Seek, SeekFrom, Write};
use super::{PayloadKey, Stream, CHUNK_SIZE};

View file

@ -1,8 +1,7 @@
//! Encryption and decryption routines for age.
use age_core::format::grease_the_joint;
use age_core::{format::grease_the_joint, secrecy::SecretString};
use rand::{rngs::OsRng, RngCore};
use secrecy::SecretString;
use std::io::{self, Read, Write};
use crate::{
@ -214,7 +213,7 @@ impl<R: AsyncRead + Unpin> Decryptor<R> {
#[cfg(test)]
mod tests {
use secrecy::SecretString;
use age_core::secrecy::SecretString;
use std::io::{BufReader, Read, Write};
#[cfg(feature = "ssh")]

View file

@ -1,7 +1,9 @@
//! Decryptors for age.
use age_core::format::{FileKey, Stanza};
use secrecy::SecretString;
use age_core::{
format::{FileKey, Stanza},
secrecy::SecretString,
};
use std::io::Read;
use super::Nonce;

View file

@ -1,9 +1,9 @@
use age_core::{
format::{FileKey, Stanza, FILE_KEY_BYTES},
primitives::{aead_decrypt, aead_encrypt},
secrecy::{ExposeSecret, SecretString},
};
use rand::{rngs::OsRng, RngCore};
use secrecy::{ExposeSecret, SecretString};
use std::convert::TryInto;
use std::time::Duration;
use zeroize::Zeroize;

View file

@ -8,8 +8,8 @@
//! a short 32-bit ID of the public key.
use aes::{Aes128Ctr, Aes192Ctr, Aes256, Aes256Ctr};
use age_core::secrecy::{ExposeSecret, SecretString};
use bcrypt_pbkdf::bcrypt_pbkdf;
use secrecy::{ExposeSecret, SecretString};
use sha2::{Digest, Sha256};
use crate::error::DecryptError;
@ -113,8 +113,8 @@ mod decrypt {
use aes::cipher::{
BlockCipher, BlockDecrypt, BlockEncrypt, NewBlockCipher, NewCipher, StreamCipher,
};
use age_core::secrecy::SecretString;
use block_modes::{block_padding::NoPadding, BlockMode, Cbc};
use secrecy::SecretString;
use super::OpenSshKdf;
use crate::error::DecryptError;
@ -270,6 +270,7 @@ mod read_asn1 {
}
mod read_ssh {
use age_core::secrecy::Secret;
use curve25519_dalek::edwards::{CompressedEdwardsY, EdwardsPoint};
use nom::{
branch::alt,
@ -282,7 +283,6 @@ mod read_ssh {
};
use num_traits::Zero;
use rsa::BigUint;
use secrecy::Secret;
use super::{
identity::{UnencryptedKey, UnsupportedKey},

View file

@ -1,6 +1,7 @@
use age_core::{
format::{FileKey, Stanza, FILE_KEY_BYTES},
primitives::{aead_decrypt, hkdf},
secrecy::{ExposeSecret, Secret},
};
use i18n_embed_fl::fl;
use nom::{
@ -13,7 +14,6 @@ use nom::{
};
use rand::rngs::OsRng;
use rsa::padding::PaddingScheme;
use secrecy::{ExposeSecret, Secret};
use sha2::{Digest, Sha256, Sha512};
use std::convert::TryInto;
use std::fmt;
@ -345,7 +345,7 @@ pub(crate) fn ssh_identity(input: &str) -> IResult<&str, Identity> {
#[cfg(test)]
pub(crate) mod tests {
use secrecy::ExposeSecret;
use age_core::secrecy::ExposeSecret;
use std::io::BufReader;
use super::Identity;

View file

@ -1,6 +1,7 @@
use age_core::{
format::{FileKey, Stanza},
primitives::{aead_encrypt, hkdf},
secrecy::ExposeSecret,
};
use curve25519_dalek::edwards::EdwardsPoint;
use nom::{
@ -12,7 +13,6 @@ use nom::{
};
use rand::rngs::OsRng;
use rsa::{padding::PaddingScheme, PublicKey};
use secrecy::ExposeSecret;
use sha2::Sha256;
use std::convert::TryFrom;
use std::fmt;

View file

@ -3,11 +3,10 @@
use age_core::{
format::{FileKey, Stanza, FILE_KEY_BYTES},
primitives::{aead_decrypt, aead_encrypt, hkdf},
secrecy::{ExposeSecret, SecretString},
};
use bech32::{ToBase32, Variant};
use rand_7::rngs::OsRng;
use secrecy::ExposeSecret;
use secrecy::SecretString;
use std::convert::TryInto;
use std::fmt;
use x25519_dalek::{EphemeralSecret, PublicKey, StaticSecret};
@ -188,9 +187,9 @@ impl crate::Recipient for Recipient {
#[cfg(test)]
pub(crate) mod tests {
use age_core::secrecy::ExposeSecret;
use quickcheck::TestResult;
use quickcheck_macros::quickcheck;
use secrecy::ExposeSecret;
use x25519_dalek::{PublicKey, StaticSecret};
use super::{Identity, Recipient};

View file

@ -1,4 +1,4 @@
use secrecy::SecretString;
use age_core::secrecy::SecretString;
use std::fs;
use std::io::Read;