Compare commits

..

No commits in common. "1b6241f92b7e22a5430e29d03c6cf8ffea735d55" and "97f9a57e08ce323e22b1e96fd6b36c9c766b5bf7" have entirely different histories.

19 changed files with 92 additions and 142 deletions

23
Cargo.lock generated
View File

@ -533,7 +533,6 @@ dependencies = [
"keyfork-frame",
"keyfork-slip10-test-data",
"keyforkd",
"keyforkd-client",
"tempdir",
"thiserror",
"tokio",
@ -618,20 +617,6 @@ dependencies = [
"tracing-subscriber",
]
[[package]]
name = "keyforkd-client"
version = "0.1.0"
dependencies = [
"bincode",
"keyfork-derive-util",
"keyfork-frame",
"keyfork-slip10-test-data",
"keyforkd",
"tempdir",
"thiserror",
"tokio",
]
[[package]]
name = "lazy_static"
version = "1.4.0"
@ -1087,18 +1072,18 @@ dependencies = [
[[package]]
name = "thiserror"
version = "1.0.49"
version = "1.0.48"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1177e8c6d7ede7afde3585fd2513e611227efd6481bd78d2e82ba1ce16557ed4"
checksum = "9d6d7a740b8a666a7e828dd00da9c0dc290dff53154ea77ac109281de90589b7"
dependencies = [
"thiserror-impl",
]
[[package]]
name = "thiserror-impl"
version = "1.0.49"
version = "1.0.48"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "10712f02019e9288794769fba95cd6847df9874d49d871d062172f9dd41bc4cc"
checksum = "49922ecae66cc8a249b77e68d1d0623c1b2c514f0060c27cdc68bd62a1219d35"
dependencies = [
"proc-macro2",
"quote",

View File

@ -11,6 +11,5 @@ members = [
"keyfork-mnemonic-util",
"keyfork-slip10-test-data",
"keyforkd",
"keyforkd-client",
"smex",
]

View File

@ -10,7 +10,6 @@ bincode = { version = "1.3.3", default-features = false }
clap = { version = "4.4.2", default-features = false, features = ["std", "usage", "help", "derive"] }
keyfork-derive-util = { version = "0.1.0", path = "../keyfork-derive-util" }
keyfork-frame = { version = "0.1.0", path = "../keyfork-frame", default-features = false }
keyforkd-client = { version = "0.1.0", path = "../keyforkd-client" }
thiserror = "1.0.48"
[dev-dependencies]

View File

@ -1,9 +1,6 @@
use crate::client::Client;
use clap::Parser;
use keyfork_derive_util::{
request::{DerivationAlgorithm, DerivationRequest, DerivationResponse},
DerivationPath,
};
use keyforkd_client::{Client, Result};
use keyfork_derive_util::{request::*, DerivationPath};
#[derive(Parser, Clone, Debug)]
pub struct Command {
@ -15,7 +12,7 @@ pub struct Command {
}
impl Command {
pub fn handle(&self) -> Result<DerivationResponse> {
pub fn handle(&self) -> super::Result<DerivationResponse> {
let mut client = Client::discover_socket()?;
let request = DerivationRequest::new(self.algorithm.clone(), &self.path);
client.request(&request)

View File

@ -0,0 +1,25 @@
use crate::Result;
use keyfork_derive_util::request::*;
use keyfork_frame::*;
use std::os::unix::net::UnixStream;
#[derive(Debug)]
pub struct Client {
socket: UnixStream,
}
impl Client {
pub fn new(socket: UnixStream) -> Self {
Self { socket }
}
pub fn discover_socket() -> Result<Self> {
super::socket::get_socket().map(|socket| Self { socket })
}
pub fn request(&mut self, req: &DerivationRequest) -> Result<DerivationResponse> {
try_encode_to(&bincode::serialize(&req)?, &mut self.socket)?;
let resp = try_decode_from(&mut self.socket)?;
bincode::deserialize(&resp).map_err(From::from)
}
}

View File

@ -1,4 +1,11 @@
use keyfork_frame::{DecodeError, EncodeError};
use std::path::PathBuf;
pub mod cli;
pub mod client;
pub mod socket;
pub use client::Client;
#[derive(Debug, thiserror::Error)]
pub enum Error {
@ -8,8 +15,23 @@ pub enum Error {
#[error("The given path was incorrectly formatted: {0}")]
ArgsFormat(#[from] keyfork_derive_util::path::Error),
#[error("Unable to perform key derivation request: {0}")]
KeyforkdClient(#[from] keyforkd_client::Error),
#[error("Neither KEYFORK_SOCKET_PATH nor XDG_RUNTIME_DIR were set")]
EnvVarsNotFound,
#[error("Socket was unable to connect to {1}: {0}")]
Connect(std::io::Error, PathBuf),
#[error("Could not write to or from the socket: {0}")]
Io(#[from] std::io::Error),
#[error("Could not perform bincode transformation: {0}")]
Bincode(#[from] Box<bincode::ErrorKind>),
#[error("Could not perform frame transformation: {0}")]
FrameEnc(#[from] EncodeError),
#[error("Could not perform frame transformation: {0}")]
FrameDec(#[from] DecodeError),
}
pub type Result<T, E = Error> = std::result::Result<T, E>;

View File

@ -1,6 +1,8 @@
use clap::Parser;
#[allow(clippy::wildcard_imports)]
#[cfg(test)]
mod tests;
use keyfork_derive_key::*;
fn main() -> Result<()> {

View File

@ -0,0 +1,24 @@
use super::Error;
use std::{collections::HashMap, os::unix::net::UnixStream, path::PathBuf};
pub fn get_socket() -> Result<UnixStream, Error> {
let socket_vars = std::env::vars()
.filter(|(key, _)| ["XDG_RUNTIME_DIR", "KEYFORKD_SOCKET_PATH"].contains(&key.as_str()))
.collect::<HashMap<String, String>>();
let mut socket_path: PathBuf;
#[allow(clippy::single_match_else)]
match socket_vars.get("KEYFORKD_SOCKET_PATH") {
Some(occupied) => {
socket_path = PathBuf::from(occupied);
}
None => {
socket_path = PathBuf::from(
socket_vars
.get("XDG_RUNTIME_DIR")
.ok_or(Error::EnvVarsNotFound)?,
);
socket_path.extend(["keyforkd", "keyforkd.sock"]);
}
}
UnixStream::connect(&socket_path).map_err(|e| Error::Connect(e, socket_path))
}

View File

@ -1,4 +1,4 @@
use crate::Client;
use crate::client::Client;
use keyfork_derive_util::{request::*, DerivationPath};
use keyfork_slip10_test_data::test_data;
use std::sync::mpsc::channel;
@ -13,7 +13,6 @@ fn secp256k1() {
.remove(&"secp256k1".to_string())
.unwrap();
// todo: move to tokio::sync channels to avoid using multi thread tokio
let rt = Builder::new_multi_thread().enable_io().build().unwrap();
let tempdir = TempDir::new("keyfork-seed").unwrap();
for (i, per_seed) in tests.into_iter().enumerate() {

View File

@ -35,7 +35,7 @@ pub trait PublicKey: Sized {
let hash = Sha256::new().chain_update(self.to_bytes()).finalize();
let hash = Ripemd160::new().chain_update(hash).finalize();
// Note: Safety assured by type returned from Ripemd160
hash[..4].try_into().expect("Ripemd160 returned too little data")
hash[..4].try_into().unwrap()
}
}
@ -73,9 +73,8 @@ impl PublicKey for k256::PublicKey {
*/
fn to_bytes(&self) -> PublicKeyBytes {
let mut result = [0u8; 33];
result[..].copy_from_slice(self.to_encoded_point(true).as_bytes());
result
// Note: Safety assured by type returned from EncodedPoint
self.to_encoded_point(true).as_bytes().try_into().unwrap()
}
fn derive_child(&self, other: PrivateKeyBytes) -> Result<Self, Self::Err> {

View File

@ -37,7 +37,7 @@ fn ensure_offline() {
.expect("Unable to decode UTF-8 filepath")
.split('/')
.last()
.expect("No data in file path")
.unwrap()
== "lo"
{
continue;

View File

@ -1,4 +1,3 @@
#[allow(clippy::wildcard_imports)]
use keyfork_mnemonic_from_seed::*;
fn main() -> Result<(), Box<dyn std::error::Error>> {

View File

@ -25,7 +25,6 @@ const ED25519_512: &str = "fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b
9f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542";
// Note: This should never error.
#[allow(clippy::too_many_lines)]
pub fn test_data() -> Result<HashMap<String, Vec<TestData>>, Box<dyn std::error::Error>> {
// Format:
let mut map = HashMap::new();

View File

@ -1,5 +1,3 @@
#![allow(clippy::module_name_repetitions)]
use clap::Parser;
mod cli;
@ -7,5 +5,5 @@ mod cli;
fn main() {
let opts = cli::Keyfork::parse();
opts.command.handle(&opts).expect("Unable to handle command");
opts.command.handle(&opts).unwrap();
}

View File

@ -1,18 +0,0 @@
[package]
name = "keyforkd-client"
version = "0.1.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
bincode = "1.3.3"
keyfork-derive-util = { version = "0.1.0", path = "../keyfork-derive-util" }
keyfork-frame = { version = "0.1.0", path = "../keyfork-frame" }
thiserror = "1.0.49"
[dev-dependencies]
keyfork-slip10-test-data = { path = "../keyfork-slip10-test-data" }
keyforkd = { path = "../keyforkd" }
tempdir = "0.3.7"
tokio = { version = "1.32.0", features = ["rt", "sync", "rt-multi-thread"] }

View File

@ -1,73 +0,0 @@
use std::{collections::HashMap, os::unix::net::UnixStream, path::PathBuf};
use keyfork_derive_util::request::{DerivationRequest, DerivationResponse};
use keyfork_frame::{try_decode_from, try_encode_to, DecodeError, EncodeError};
#[cfg(test)]
mod tests;
#[derive(Debug, thiserror::Error)]
pub enum Error {
#[error("Neither KEYFORK_SOCKET_PATH nor XDG_RUNTIME_DIR were set")]
EnvVarsNotFound,
#[error("Socket was unable to connect to {1}: {0}")]
Connect(std::io::Error, PathBuf),
#[error("Could not write to or from the socket: {0}")]
Io(#[from] std::io::Error),
#[error("Could not perform bincode transformation: {0}")]
Bincode(#[from] Box<bincode::ErrorKind>),
#[error("Could not perform frame transformation: {0}")]
FrameEnc(#[from] EncodeError),
#[error("Could not perform frame transformation: {0}")]
FrameDec(#[from] DecodeError),
}
pub type Result<T, E = Error> = std::result::Result<T, E>;
pub fn get_socket() -> Result<UnixStream, Error> {
let socket_vars = std::env::vars()
.filter(|(key, _)| ["XDG_RUNTIME_DIR", "KEYFORKD_SOCKET_PATH"].contains(&key.as_str()))
.collect::<HashMap<String, String>>();
let mut socket_path: PathBuf;
#[allow(clippy::single_match_else)]
match socket_vars.get("KEYFORKD_SOCKET_PATH") {
Some(occupied) => {
socket_path = PathBuf::from(occupied);
}
None => {
socket_path = PathBuf::from(
socket_vars
.get("XDG_RUNTIME_DIR")
.ok_or(Error::EnvVarsNotFound)?,
);
socket_path.extend(["keyforkd", "keyforkd.sock"]);
}
}
UnixStream::connect(&socket_path).map_err(|e| Error::Connect(e, socket_path))
}
#[derive(Debug)]
pub struct Client {
socket: UnixStream,
}
impl Client {
pub fn new(socket: UnixStream) -> Self {
Self { socket }
}
pub fn discover_socket() -> Result<Self> {
get_socket().map(|socket| Self { socket })
}
pub fn request(&mut self, req: &DerivationRequest) -> Result<DerivationResponse> {
try_encode_to(&bincode::serialize(&req)?, &mut self.socket)?;
let resp = try_decode_from(&mut self.socket)?;
bincode::deserialize(&resp).map_err(From::from)
}
}

View File

@ -1,7 +1,7 @@
use thiserror::Error;
#[derive(Debug, Clone, Error)]
pub enum Keyforkd {
pub enum KeyforkdError {
#[error("Neither KEYFORKD_SOCKET_PATH nor XDG_RUNTIME_DIR were set, nowhere to mount socket")]
NoSocketPath,
}

View File

@ -13,7 +13,7 @@ pub mod error;
pub mod middleware;
pub mod server;
pub mod service;
pub use error::Keyforkd as KeyforkdError;
pub use error::KeyforkdError;
pub use server::UnixServer;
pub use service::Keyforkd;

View File

@ -19,12 +19,6 @@ impl<'a, Request> BincodeLayer<'a, Request> {
}
}
impl<'a, Request> Default for BincodeLayer<'a, Request> {
fn default() -> Self {
Self::new()
}
}
impl<'a, S: 'a, Request> Layer<S> for BincodeLayer<'a, Request> {
type Service = BincodeService<S, Request>;
@ -143,7 +137,7 @@ mod tests {
async fn can_serde_responses() {
let content = serialize(&Test::new()).unwrap();
let mut service = ServiceBuilder::new()
.layer(BincodeLayer::<Test>::default())
.layer(BincodeLayer::<Test>::new())
.service(App);
let result = service
.ready()