Skip to content

Commit ae7d5a5

Browse files
committed
Rename Credential to PrivateCredential
Signed-off-by: Wiktor Kwapisiewicz <[email protected]>
1 parent 8aa6bf9 commit ae7d5a5

File tree

7 files changed

+27
-22
lines changed

7 files changed

+27
-22
lines changed

examples/key-storage.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ use ssh_agent_lib::agent::{listen, Session};
1212
use ssh_agent_lib::error::AgentError;
1313
use ssh_agent_lib::proto::extension::{QueryResponse, RestrictDestination, SessionBind};
1414
use ssh_agent_lib::proto::{
15-
message, signature, AddIdentity, AddIdentityConstrained, AddSmartcardKeyConstrained,
16-
Credential, Extension, KeyConstraint, RemoveIdentity, SignRequest, SmartcardKey,
15+
message, signature, AddIdentity, AddIdentityConstrained, AddSmartcardKeyConstrained, Extension,
16+
KeyConstraint, PrivateCredential, RemoveIdentity, SignRequest, SmartcardKey,
1717
};
1818
use ssh_key::{
1919
private::{KeypairData, PrivateKey},
@@ -121,7 +121,7 @@ impl Session for KeyStorage {
121121
}
122122

123123
async fn add_identity(&mut self, identity: AddIdentity) -> Result<(), AgentError> {
124-
if let Credential::Key { privkey, comment } = identity.credential {
124+
if let PrivateCredential::Key { privkey, comment } = identity.credential {
125125
let privkey = PrivateKey::try_from(privkey).map_err(AgentError::other)?;
126126
self.identity_add(Identity {
127127
pubkey: PublicKey::from(&privkey),
@@ -152,7 +152,7 @@ impl Session for KeyStorage {
152152
info!("Destination constraint: {destination:?}");
153153
}
154154

155-
if let Credential::Key { privkey, comment } = identity.credential.clone() {
155+
if let PrivateCredential::Key { privkey, comment } = identity.credential.clone() {
156156
let privkey = PrivateKey::try_from(privkey).map_err(AgentError::other)?;
157157
self.identity_add(Identity {
158158
pubkey: PublicKey::from(&privkey),

src/proto/message/add_remove.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,14 @@ use crate::proto::{Error, Result};
2020
#[derive(Clone, PartialEq, Debug)]
2121
pub struct AddIdentity {
2222
/// A credential (private & public key, or private key / certificate) to add to the agent
23-
pub credential: Credential,
23+
pub credential: PrivateCredential,
2424
}
2525

2626
impl Decode for AddIdentity {
2727
type Error = Error;
2828

2929
fn decode(reader: &mut impl Reader) -> Result<Self> {
30-
let credential = Credential::decode(reader)?;
30+
let credential = PrivateCredential::decode(reader)?;
3131

3232
Ok(Self { credential })
3333
}

src/proto/message/add_remove/credential.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ use crate::proto::{Error, PrivateKeyData, Result};
1616
/// This structure covers both types of identities a user may
1717
/// send to an agent as part of a [`Request::AddIdentity`](crate::proto::Request::AddIdentity) message.
1818
#[derive(Clone, PartialEq, Debug)]
19-
pub enum Credential {
19+
pub enum PrivateCredential {
2020
/// A public/private key pair
2121
Key {
2222
/// Public/private key pair data
@@ -42,7 +42,7 @@ pub enum Credential {
4242
},
4343
}
4444

45-
impl Decode for Credential {
45+
impl Decode for PrivateCredential {
4646
type Error = Error;
4747

4848
fn decode(reader: &mut impl Reader) -> Result<Self> {
@@ -57,7 +57,7 @@ impl Decode for Credential {
5757
let privkey = PrivateKeyData::decode_as(reader, algorithm.clone())?;
5858
let comment = String::decode(reader)?;
5959

60-
Ok(Credential::Cert {
60+
Ok(PrivateCredential::Cert {
6161
algorithm,
6262
certificate,
6363
privkey,
@@ -67,12 +67,12 @@ impl Decode for Credential {
6767
let algorithm = Algorithm::from_str(&alg).map_err(ssh_encoding::Error::from)?;
6868
let privkey = KeypairData::decode_as(reader, algorithm)?;
6969
let comment = String::decode(reader)?;
70-
Ok(Credential::Key { privkey, comment })
70+
Ok(PrivateCredential::Key { privkey, comment })
7171
}
7272
}
7373
}
7474

75-
impl Encode for Credential {
75+
impl Encode for PrivateCredential {
7676
fn encoded_len(&self) -> ssh_encoding::Result<usize> {
7777
match self {
7878
Self::Key { privkey, comment } => {

tests/roundtrip/expected/req_add_identity_constrained_extension_restrict_destination.rs

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,16 @@
11
use hex_literal::hex;
2-
use ssh_agent_lib::proto::{AddIdentity, AddIdentityConstrained, Credential, Extension, KeyConstraint, Request, Unparsed};
2+
use ssh_agent_lib::proto::{
3+
AddIdentity, AddIdentityConstrained, Extension, KeyConstraint, PrivateCredential, Request,
4+
Unparsed,
5+
};
36
use ssh_key::private::KeypairData;
47

58
use super::fixtures;
69

710
pub fn expected() -> Request {
811
Request::AddIdConstrained(AddIdentityConstrained {
912
identity: AddIdentity {
10-
credential: Credential::Key {
13+
credential: PrivateCredential::Key {
1114
privkey: KeypairData::Ecdsa(fixtures::demo_key()),
1215
comment: "baloo@angela".to_string(),
1316
},

tests/roundtrip/expected/req_add_identity_constrained_lifetime.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,14 @@
1-
use ssh_agent_lib::proto::{AddIdentity, AddIdentityConstrained, Credential, KeyConstraint, Request};
1+
use ssh_agent_lib::proto::{
2+
AddIdentity, AddIdentityConstrained, KeyConstraint, PrivateCredential, Request,
3+
};
24
use ssh_key::private::KeypairData;
35

46
use super::fixtures;
57

68
pub fn expected() -> Request {
79
Request::AddIdConstrained(AddIdentityConstrained {
810
identity: AddIdentity {
9-
credential: Credential::Key {
11+
credential: PrivateCredential::Key {
1012
privkey: KeypairData::Ecdsa(fixtures::demo_key()),
1113
comment: "baloo@angela".to_string(),
1214
},
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
use ssh_agent_lib::proto::{AddIdentity, Credential, Request};
1+
use ssh_agent_lib::proto::{AddIdentity, PrivateCredential, Request};
22
use ssh_key::private::KeypairData;
33

44
use super::fixtures;
55

66
pub fn expected() -> Request {
77
Request::AddIdentity(AddIdentity {
8-
credential: Credential::Key {
8+
credential: PrivateCredential::Key {
99
privkey: KeypairData::Ecdsa(fixtures::demo_key()),
1010
comment: "baloo@angela".to_string(),
11-
}
11+
},
1212
})
1313
}

tests/roundtrip/expected/req_parse_certificates.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
use hex_literal::hex;
2-
use ssh_agent_lib::proto::{AddIdentity, AddIdentityConstrained, Credential, KeyConstraint, PrivateKeyData, Request,};
3-
use ssh_key::{
4-
private::RsaPrivateKey, Algorithm, Mpint
2+
use ssh_agent_lib::proto::{
3+
AddIdentity, AddIdentityConstrained, KeyConstraint, PrivateCredential, PrivateKeyData, Request,
54
};
5+
use ssh_key::{private::RsaPrivateKey, Algorithm, Mpint};
66

77
use super::fixtures;
88

99
pub fn expected() -> Request {
1010
Request::AddIdConstrained(AddIdentityConstrained {
1111
identity: AddIdentity {
12-
credential: Credential::Cert {
12+
credential: PrivateCredential::Cert {
1313
algorithm: Algorithm::new("ssh-rsa").unwrap(),
1414
certificate: fixtures::demo_certificate(),
1515
privkey: PrivateKeyData::Rsa(RsaPrivateKey {

0 commit comments

Comments
 (0)