Skip to content

Commit a81c318

Browse files
committed
Update nitrokey-rs to 16f6c38 (branch backend)
1 parent 81554c7 commit a81c318

File tree

10 files changed

+26
-28
lines changed

10 files changed

+26
-28
lines changed

Cargo.lock

Lines changed: 1 addition & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,8 @@ version = "0.2"
5656
version = "0.1"
5757

5858
[dependencies.nitrokey]
59-
version = "0.9.0"
59+
git = "https://git.sr.ht/~ireas/nitrokey-rs"
60+
branch = "backend"
6061

6162
[dependencies.progressing]
6263
version = "3.0.2"

src/commands.rs

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ fn find_device(config: &config::Config) -> anyhow::Result<nitrokey::DeviceInfo>
112112

113113
/// Connect to a Nitrokey device that matches the given requirements
114114
fn connect<'mgr>(
115-
manager: &'mgr mut nitrokey::Manager,
115+
manager: &'mgr nitrokey::Manager,
116116
config: &config::Config,
117117
) -> anyhow::Result<nitrokey::DeviceWrapper<'mgr>> {
118118
let device_info = find_device(config)?;
@@ -131,12 +131,11 @@ fn with_device<F>(ctx: &mut Context<'_>, op: F) -> anyhow::Result<()>
131131
where
132132
F: FnOnce(&mut Context<'_>, nitrokey::DeviceWrapper<'_>) -> anyhow::Result<()>,
133133
{
134-
let mut manager =
135-
nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?;
134+
let manager = nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?;
136135

137136
set_log_level(ctx);
138137

139-
let device = connect(&mut manager, &ctx.config)?;
138+
let device = connect(&manager, &ctx.config)?;
140139
op(ctx, device)
141140
}
142141

@@ -145,8 +144,7 @@ fn with_storage_device<F>(ctx: &mut Context<'_>, op: F) -> anyhow::Result<()>
145144
where
146145
F: FnOnce(&mut Context<'_>, nitrokey::Storage<'_>) -> anyhow::Result<()>,
147146
{
148-
let mut manager =
149-
nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?;
147+
let manager = nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?;
150148

151149
set_log_level(ctx);
152150

@@ -158,7 +156,7 @@ where
158156
ctx.config.model = Some(args::DeviceModel::Storage);
159157
}
160158

161-
let device = connect(&mut manager, &ctx.config)?;
159+
let device = connect(&manager, &ctx.config)?;
162160
if let nitrokey::DeviceWrapper::Storage(storage) = device {
163161
op(ctx, storage)
164162
} else {
@@ -518,7 +516,7 @@ pub fn list(ctx: &mut Context<'_>, no_connect: bool) -> anyhow::Result<()> {
518516
println!(ctx, "No Nitrokey device connected")?;
519517
} else {
520518
println!(ctx, "USB path\tmodel\tserial number")?;
521-
let mut manager =
519+
let manager =
522520
nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?;
523521

524522
for device_info in device_infos {

src/tests/encrypted.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ fn encrypted_open_close(model: nitrokey::Model) -> anyhow::Result<()> {
6666
assert!(out.is_empty());
6767

6868
{
69-
let mut manager = nitrokey::force_take()?;
69+
let manager = nitrokey::force_take()?;
7070
let device = manager.connect_storage()?;
7171
assert!(device.get_storage_status()?.encrypted_volume.active);
7272
assert!(!device.get_storage_status()?.hidden_volume.active);
@@ -76,7 +76,7 @@ fn encrypted_open_close(model: nitrokey::Model) -> anyhow::Result<()> {
7676
assert!(out.is_empty());
7777

7878
{
79-
let mut manager = nitrokey::force_take()?;
79+
let manager = nitrokey::force_take()?;
8080
let device = manager.connect_storage()?;
8181
assert!(!device.get_storage_status()?.encrypted_volume.active);
8282
assert!(!device.get_storage_status()?.hidden_volume.active);

src/tests/hidden.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ fn hidden_create_open_close(model: nitrokey::Model) -> anyhow::Result<()> {
1515
assert!(out.is_empty());
1616

1717
{
18-
let mut manager = nitrokey::force_take()?;
18+
let manager = nitrokey::force_take()?;
1919
let device = manager.connect_storage()?;
2020
assert!(!device.get_storage_status()?.encrypted_volume.active);
2121
assert!(device.get_storage_status()?.hidden_volume.active);
@@ -25,7 +25,7 @@ fn hidden_create_open_close(model: nitrokey::Model) -> anyhow::Result<()> {
2525
assert!(out.is_empty());
2626

2727
{
28-
let mut manager = nitrokey::force_take()?;
28+
let manager = nitrokey::force_take()?;
2929
let device = manager.connect_storage()?;
3030
assert!(!device.get_storage_status()?.encrypted_volume.active);
3131
assert!(!device.get_storage_status()?.hidden_volume.active);

src/tests/lock.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ fn lock_storage(model: nitrokey::Model) -> anyhow::Result<()> {
2222
let out = ncli.handle(&["lock"])?;
2323
assert!(out.is_empty());
2424

25-
let mut manager = nitrokey::force_take()?;
25+
let manager = nitrokey::force_take()?;
2626
let device = manager.connect_storage()?;
2727
assert!(!device.get_storage_status()?.encrypted_volume.active);
2828

src/tests/pin.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ use super::*;
1111
#[test_device]
1212
fn unblock(model: nitrokey::Model) -> anyhow::Result<()> {
1313
{
14-
let mut manager = nitrokey::force_take()?;
14+
let manager = nitrokey::force_take()?;
1515
let device = manager.connect_model(model)?;
1616
let (device, err) = device.authenticate_user("wrong-pin").unwrap_err();
1717
match err {
@@ -24,7 +24,7 @@ fn unblock(model: nitrokey::Model) -> anyhow::Result<()> {
2424
let _ = Nitrocli::new().model(model).handle(&["pin", "unblock"])?;
2525

2626
{
27-
let mut manager = nitrokey::force_take()?;
27+
let manager = nitrokey::force_take()?;
2828
let device = manager.connect_model(model)?;
2929
assert_eq!(device.get_user_retry_count()?, 3);
3030
}
@@ -40,7 +40,7 @@ fn set_user(model: nitrokey::Model) -> anyhow::Result<()> {
4040
assert!(out.is_empty());
4141

4242
{
43-
let mut manager = nitrokey::force_take()?;
43+
let manager = nitrokey::force_take()?;
4444
let device = manager.connect_model(model)?;
4545
let (_, err) = device
4646
.authenticate_user(nitrokey::DEFAULT_USER_PIN)
@@ -61,7 +61,7 @@ fn set_user(model: nitrokey::Model) -> anyhow::Result<()> {
6161
assert!(out.is_empty());
6262

6363
{
64-
let mut manager = nitrokey::force_take()?;
64+
let manager = nitrokey::force_take()?;
6565
let device = manager.connect_model(model)?;
6666
let _ = device
6767
.authenticate_user(nitrokey::DEFAULT_USER_PIN)

src/tests/pws.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ use nitrokey::GetPasswordSafe as _;
88
use super::*;
99

1010
fn clear_pws(model: nitrokey::Model) -> anyhow::Result<()> {
11-
let mut manager = nitrokey::force_take()?;
11+
let manager = nitrokey::force_take()?;
1212
let mut device = manager.connect_model(model)?;
1313
let mut pws = device.get_password_safe(nitrokey::DEFAULT_USER_PIN)?;
1414
let slots_to_clear = pws
@@ -342,7 +342,7 @@ fn add_full(model: nitrokey::Model) -> anyhow::Result<()> {
342342

343343
// Fill all PWS slots
344344
{
345-
let mut manager = nitrokey::force_take()?;
345+
let manager = nitrokey::force_take()?;
346346
let mut device = manager.connect_model(model)?;
347347
let mut pws = device.get_password_safe(nitrokey::DEFAULT_USER_PIN)?;
348348
for slot in 0..pws.get_slot_count() {

src/tests/reset.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ fn reset(model: nitrokey::Model) -> anyhow::Result<()> {
1717
let _ = ncli.handle(&["pin", "set", "admin"])?;
1818

1919
{
20-
let mut manager = nitrokey::force_take()?;
20+
let manager = nitrokey::force_take()?;
2121
// Check that the admin PIN has been changed.
2222
let device = manager.connect_model(model)?;
2323
let _ = device.authenticate_admin(new_admin_pin).unwrap();
@@ -29,7 +29,7 @@ fn reset(model: nitrokey::Model) -> anyhow::Result<()> {
2929
assert!(out.is_empty());
3030

3131
{
32-
let mut manager = nitrokey::force_take()?;
32+
let manager = nitrokey::force_take()?;
3333
// Check that the admin PIN has been reset.
3434
let device = manager.connect_model(model)?;
3535
let mut device = device
@@ -58,7 +58,7 @@ fn reset_only_aes_key(model: nitrokey::Model) -> anyhow::Result<()> {
5858

5959
// Add an entry to the PWS
6060
{
61-
let mut manager = nitrokey::force_take()?;
61+
let manager = nitrokey::force_take()?;
6262
let mut device = manager.connect_model(model)?;
6363
let mut pws = device.get_password_safe(NEW_USER_PIN)?;
6464
pws.write_slot(0, NAME, LOGIN, PASSWORD)?;
@@ -74,7 +74,7 @@ fn reset_only_aes_key(model: nitrokey::Model) -> anyhow::Result<()> {
7474
// been replaced, and that 3) the changed user PIN still works, i.e.,
7575
// we did not perform a factory reset.
7676
{
77-
let mut manager = nitrokey::force_take()?;
77+
let manager = nitrokey::force_take()?;
7878
let mut device = manager.connect_model(model)?;
7979
let pws = device.get_password_safe(NEW_USER_PIN)?;
8080
let slot = pws.get_slot_unchecked(0)?;

src/tests/unencrypted.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ fn unencrypted_set_read_write(model: nitrokey::Model) -> anyhow::Result<()> {
1212
assert!(out.is_empty());
1313

1414
{
15-
let mut manager = nitrokey::force_take()?;
15+
let manager = nitrokey::force_take()?;
1616
let device = manager.connect_storage()?;
1717
assert!(device.get_storage_status()?.unencrypted_volume.active);
1818
assert!(!device.get_storage_status()?.unencrypted_volume.read_only);
@@ -22,7 +22,7 @@ fn unencrypted_set_read_write(model: nitrokey::Model) -> anyhow::Result<()> {
2222
assert!(out.is_empty());
2323

2424
{
25-
let mut manager = nitrokey::force_take()?;
25+
let manager = nitrokey::force_take()?;
2626
let device = manager.connect_storage()?;
2727
assert!(device.get_storage_status()?.unencrypted_volume.active);
2828
assert!(device.get_storage_status()?.unencrypted_volume.read_only);

0 commit comments

Comments
 (0)