Skip to content

Commit 9adb7da

Browse files
committed
Fix dependency features & clippy lints
1 parent 660d89e commit 9adb7da

File tree

5 files changed

+17
-18
lines changed

5 files changed

+17
-18
lines changed

Cargo.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ rust-version = "1.73.0"
2323
base64 = "0.22"
2424
serde = { version = "1.0", features = ["derive"] }
2525
serde_json = "1.0"
26-
signature = "2.2.0"
26+
signature = { version = "2.2.0", features = ["std"] }
2727

2828
# For PEM decoding
2929
pem = { version = "3", optional = true }
@@ -33,7 +33,7 @@ simple_asn1 = { version = "0.6", optional = true }
3333
aws-lc-rs = { version = "1.10.0", optional = true }
3434

3535
# "rust_crypto" feature
36-
ed25519-dalek = { version = "2.1.1", optional = true }
36+
ed25519-dalek = { version = "2.1.1", optional = true, features = ["pkcs8"] }
3737
hmac = { version = "0.12.1", optional = true }
3838
p256 = { version = "0.13.2", optional = true, features = ["ecdsa"] }
3939
p384 = { version = "0.13.0", optional = true, features = ["ecdsa"] }

src/crypto/aws_lc/hmac.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ impl Hs256Verifier {
4747

4848
impl Verifier<Vec<u8>> for Hs256Verifier {
4949
fn verify(&self, msg: &[u8], signature: &Vec<u8>) -> std::result::Result<(), signature::Error> {
50-
hmac::verify(&self.0, msg, &signature).map_err(|err| signature::Error::from_source(err))
50+
hmac::verify(&self.0, msg, signature).map_err(signature::Error::from_source)
5151
}
5252
}
5353

@@ -93,7 +93,7 @@ impl Hs384Verifier {
9393

9494
impl Verifier<Vec<u8>> for Hs384Verifier {
9595
fn verify(&self, msg: &[u8], signature: &Vec<u8>) -> std::result::Result<(), signature::Error> {
96-
hmac::verify(&self.0, msg, &signature).map_err(|err| signature::Error::from_source(err))
96+
hmac::verify(&self.0, msg, signature).map_err(signature::Error::from_source)
9797
}
9898
}
9999

@@ -139,7 +139,7 @@ impl Hs512Verifier {
139139

140140
impl Verifier<Vec<u8>> for Hs512Verifier {
141141
fn verify(&self, msg: &[u8], signature: &Vec<u8>) -> std::result::Result<(), signature::Error> {
142-
hmac::verify(&self.0, msg, &signature).map_err(|err| signature::Error::from_source(err))
142+
hmac::verify(&self.0, msg, signature).map_err(signature::Error::from_source)
143143
}
144144
}
145145

src/crypto/aws_lc/rsa.rs

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,11 @@ fn try_sign_rsa(
1717
msg: &[u8],
1818
) -> std::result::Result<Vec<u8>, signature::Error> {
1919
let key_pair = crypto_sig::RsaKeyPair::from_der(encoding_key.inner())
20-
.map_err(|err| signature::Error::from_source(err))?;
20+
.map_err(signature::Error::from_source)?;
2121

2222
let mut signature = vec![0; key_pair.public_modulus_len()];
2323
let rng = rand::SystemRandom::new();
24-
key_pair
25-
.sign(algorithm, &rng, msg, &mut signature)
26-
.map_err(|err| signature::Error::from_source(err))?;
24+
key_pair.sign(algorithm, &rng, msg, &mut signature).map_err(signature::Error::from_source)?;
2725

2826
Ok(signature)
2927
}
@@ -42,13 +40,11 @@ fn verify_rsa(
4240
match &decoding_key.kind {
4341
DecodingKeyKind::SecretOrDer(bytes) => {
4442
let public_key = crypto_sig::UnparsedPublicKey::new(algorithm, bytes);
45-
public_key.verify(msg, signature).map_err(|err| signature::Error::from_source(err))?;
43+
public_key.verify(msg, signature).map_err(signature::Error::from_source)?;
4644
}
4745
DecodingKeyKind::RsaModulusExponent { n, e } => {
4846
let public_key = crypto_sig::RsaPublicKeyComponents { n, e };
49-
public_key
50-
.verify(algorithm, msg, &signature)
51-
.map_err(|err| signature::Error::from_source(err))?;
47+
public_key.verify(algorithm, msg, signature).map_err(signature::Error::from_source)?;
5248
}
5349
};
5450

src/crypto/rust_crypto/hmac.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ impl Verifier<Vec<u8>> for Hs256Verifier {
6262
verifier.reset();
6363
verifier.update(msg);
6464

65-
verifier.verify_slice(signature).map_err(|e| signature::Error::from_source(e))
65+
verifier.verify_slice(signature).map_err(signature::Error::from_source)
6666
}
6767
}
6868

@@ -118,7 +118,7 @@ impl Verifier<Vec<u8>> for Hs384Verifier {
118118
verifier.reset();
119119
verifier.update(msg);
120120

121-
verifier.verify_slice(signature).map_err(|e| signature::Error::from_source(e))
121+
verifier.verify_slice(signature).map_err(signature::Error::from_source)
122122
}
123123
}
124124

@@ -174,7 +174,7 @@ impl Verifier<Vec<u8>> for Hs512Verifier {
174174
verifier.reset();
175175
verifier.update(msg);
176176

177-
verifier.verify_slice(signature).map_err(|e| signature::Error::from_source(e))
177+
verifier.verify_slice(signature).map_err(signature::Error::from_source)
178178
}
179179
}
180180

src/encoding.rs

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,13 +164,16 @@ pub fn _encode<T: Serialize>(
164164
let encoded_claims = b64_encode_part(claims)?;
165165
let message = [encoded_header, encoded_claims].join(".");
166166

167-
let signature = b64_encode(&signing_provider.sign(message.as_bytes()));
167+
let signature = b64_encode(signing_provider.sign(message.as_bytes()));
168168

169169
Ok([message, signature].join("."))
170170
}
171171

172172
/// Return the correct [`JwtSigner`] based on the `algorithm`.
173-
pub(crate) fn jwt_signer_factory(algorithm: &Algorithm, key: &EncodingKey) -> Result<Box<dyn JwtSigner>> {
173+
pub(crate) fn jwt_signer_factory(
174+
algorithm: &Algorithm,
175+
key: &EncodingKey,
176+
) -> Result<Box<dyn JwtSigner>> {
174177
let jwt_signer = match algorithm {
175178
Algorithm::HS256 => Box::new(Hs256Signer::new(key)?) as Box<dyn JwtSigner>,
176179
Algorithm::HS384 => Box::new(Hs384Signer::new(key)?) as Box<dyn JwtSigner>,

0 commit comments

Comments
 (0)