bitwarden_fido/
client_fido.rs1use bitwarden_core::Client;
2use bitwarden_vault::CipherView;
3use thiserror::Error;
4
5use crate::{
6 Fido2Authenticator, Fido2Client, Fido2CredentialAutofillView, Fido2CredentialAutofillViewError,
7 Fido2CredentialStore, Fido2UserInterface,
8};
9
10#[allow(missing_docs)]
11#[derive(Clone)]
12pub struct ClientFido2 {
13 pub(crate) client: Client,
14}
15
16#[allow(missing_docs)]
17#[derive(Debug, Error)]
18pub enum DecryptFido2AutofillCredentialsError {
19 #[error(transparent)]
20 VaultLocked(#[from] bitwarden_core::VaultLockedError),
21 #[error(transparent)]
22 Fido2CredentialAutofillViewError(#[from] Fido2CredentialAutofillViewError),
23}
24
25impl ClientFido2 {
26 #[allow(missing_docs)]
27 pub fn new(client: Client) -> Self {
28 Self { client }
29 }
30
31 #[allow(missing_docs)]
32 pub fn create_authenticator<'a>(
33 &'a self,
34 user_interface: &'a dyn Fido2UserInterface,
35 credential_store: &'a dyn Fido2CredentialStore,
36 ) -> Fido2Authenticator<'a> {
37 Fido2Authenticator::new(&self.client, user_interface, credential_store)
38 }
39
40 #[allow(missing_docs)]
41 pub fn create_client<'a>(
42 &'a self,
43 user_interface: &'a dyn Fido2UserInterface,
44 credential_store: &'a dyn Fido2CredentialStore,
45 ) -> Fido2Client<'a> {
46 Fido2Client {
47 authenticator: self.create_authenticator(user_interface, credential_store),
48 }
49 }
50
51 #[allow(missing_docs)]
52 pub fn decrypt_fido2_autofill_credentials(
53 &self,
54 cipher_view: CipherView,
55 ) -> Result<Vec<Fido2CredentialAutofillView>, DecryptFido2AutofillCredentialsError> {
56 let key_store = self.client.internal.get_key_store();
57
58 Ok(Fido2CredentialAutofillView::from_cipher_view(
59 &cipher_view,
60 &mut key_store.context(),
61 )?)
62 }
63}
64
65#[allow(missing_docs)]
66pub trait ClientFido2Ext {
67 fn fido2(&self) -> ClientFido2;
68}
69
70impl ClientFido2Ext for Client {
71 fn fido2(&self) -> ClientFido2 {
72 ClientFido2::new(self.clone())
73 }
74}