diff --git a/.changes/config.json b/.changes/config.json
index 844eaa996..c0135c1e8 100644
--- a/.changes/config.json
+++ b/.changes/config.json
@@ -103,14 +103,6 @@
"dependencies": ["deep-link-js"],
"postversion": "pnpm install --no-frozen-lockfile"
},
- "authenticator": {
- "path": "./plugins/authenticator",
- "manager": "rust"
- },
- "authenticator-js": {
- "path": "./plugins/authenticator",
- "manager": "javascript"
- },
"autostart": {
"path": "./plugins/autostart",
"manager": "rust"
diff --git a/.github/workflows/check-generated-files.yml b/.github/workflows/check-generated-files.yml
index 7733a3d35..e59198961 100644
--- a/.github/workflows/check-generated-files.yml
+++ b/.github/workflows/check-generated-files.yml
@@ -25,10 +25,6 @@ jobs:
id: filter
with:
filters: |
- authenticator:
- - .github/workflows/check-generated-files.yml
- - plugins/authenticator/guest-js/**
- - plugins/authenticator/src/api-iife.js
autostart:
- .github/workflows/check-generated-files.yml
- plugins/autostart/guest-js/**
diff --git a/.github/workflows/lint-rust.yml b/.github/workflows/lint-rust.yml
index 7cb5a33ad..abfcbf6cd 100644
--- a/.github/workflows/lint-rust.yml
+++ b/.github/workflows/lint-rust.yml
@@ -41,9 +41,6 @@ jobs:
id: filter
with:
filters: |
- tauri-plugin-authenticator:
- - .github/workflows/lint-rust.yml
- - plugins/authenticator/**
tauri-plugin-autostart:
- .github/workflows/lint-rust.yml
- plugins/autostart/**
@@ -138,10 +135,10 @@ jobs:
steps:
- uses: actions/checkout@v4
- - name: install webkit2gtk and libudev for [authenticator]
+ - name: install webkit2gtk
run: |
sudo apt-get update
- sudo apt-get install -y libwebkit2gtk-4.0-dev libwebkit2gtk-4.1-dev libudev-dev
+ sudo apt-get install -y libwebkit2gtk-4.0-dev libwebkit2gtk-4.1-dev
- name: Install clippy with stable toolchain
uses: dtolnay/rust-toolchain@stable
diff --git a/.github/workflows/test-rust.yml b/.github/workflows/test-rust.yml
index b91f507ac..7a76cab2f 100644
--- a/.github/workflows/test-rust.yml
+++ b/.github/workflows/test-rust.yml
@@ -44,10 +44,6 @@ jobs:
with:
base: v2
filters: |
- tauri-plugin-authenticator:
- - .github/workflows/test-rust.yml
- - Cargo.toml
- - plugins/authenticator/**
tauri-plugin-autostart:
- .github/workflows/test-rust.yml
- Cargo.toml
@@ -200,17 +196,11 @@ jobs:
steps:
- uses: actions/checkout@v4
- - name: install webkit2gtk and libudev for [authenticator]
+ - name: install webkit2gtk
if: contains(matrix.platform.target, 'unknown-linux')
run: |
sudo apt-get update
- sudo apt-get install -y libwebkit2gtk-4.0-dev libwebkit2gtk-4.1-dev libudev-dev
-
- - name: install openssl
- if: ${{ matrix.platform.os == 'windows-latest' && matrix.package == 'tauri-plugin-authenticator' }}
- run: |
- echo "VCPKG_ROOT=$env:VCPKG_INSTALLATION_ROOT" | Out-File -FilePath $env:GITHUB_ENV -Append
- vcpkg install openssl:x64-windows-static-md
+ sudo apt-get install -y libwebkit2gtk-4.0-dev libwebkit2gtk-4.1-dev
- uses: dtolnay/rust-toolchain@1.75.0
with:
diff --git a/Cargo.lock b/Cargo.lock
index f6c5cbe12..313e8e837 100644
--- a/Cargo.lock
+++ b/Cargo.lock
@@ -527,23 +527,6 @@ version = "1.1.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1505bd5d3d116872e7271a6d4e16d81d0c8570876c8de68093a09ac269d8aac0"
-[[package]]
-name = "authenticator"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "08cee7a0952628fde958e149507c2bb321ab4fccfafd225da0b20adc956ef88a"
-dependencies = [
- "bitflags 1.3.2",
- "core-foundation 0.9.4",
- "devd-rs",
- "libc",
- "libudev",
- "log",
- "rand 0.7.3",
- "runloop",
- "winapi",
-]
-
[[package]]
name = "auto-launch"
version = "0.5.0"
@@ -978,10 +961,8 @@ checksum = "a21f936df1771bf62b77f047b726c4625ff2e8aa607c01ec06e5a05bd8463401"
dependencies = [
"android-tzdata",
"iana-time-zone",
- "js-sys",
"num-traits",
"serde",
- "wasm-bindgen",
"windows-targets 0.52.6",
]
@@ -1603,16 +1584,6 @@ dependencies = [
"syn 2.0.75",
]
-[[package]]
-name = "devd-rs"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "9313f104b590510b46fc01c0a324fc76505c13871454d3c48490468d04c8d395"
-dependencies = [
- "libc",
- "nom",
-]
-
[[package]]
name = "digest"
version = "0.10.7"
@@ -3469,26 +3440,6 @@ dependencies = [
"vcpkg",
]
-[[package]]
-name = "libudev"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ea626d3bdf40a1c5aee3bcd4f40826970cae8d80a8fec934c82a63840094dcfe"
-dependencies = [
- "libc",
- "libudev-sys",
-]
-
-[[package]]
-name = "libudev-sys"
-version = "0.1.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3c8469b4a23b962c1396b9b451dda50ef5b283e8dd309d69033475fa9b334324"
-dependencies = [
- "libc",
- "pkg-config",
-]
-
[[package]]
name = "linux-raw-sys"
version = "0.4.14"
@@ -5152,12 +5103,6 @@ dependencies = [
"zeroize",
]
-[[package]]
-name = "runloop"
-version = "0.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d79b4b604167921892e84afbbaad9d5ad74e091bf6c511d9dbfb0593f09fabd"
-
[[package]]
name = "rust-argon2"
version = "1.0.0"
@@ -6512,29 +6457,6 @@ dependencies = [
"walkdir",
]
-[[package]]
-name = "tauri-plugin-authenticator"
-version = "2.0.0-rc.1"
-dependencies = [
- "authenticator",
- "base64 0.22.1",
- "byteorder",
- "bytes",
- "chrono",
- "log",
- "once_cell",
- "openssl",
- "rand 0.8.5",
- "rusty-fork",
- "serde",
- "serde_json",
- "sha2",
- "tauri",
- "tauri-plugin",
- "thiserror",
- "winapi-util",
-]
-
[[package]]
name = "tauri-plugin-autostart"
version = "2.0.0-rc.1"
diff --git a/README.md b/README.md
index bdc6b6e8a..c511aa671 100644
--- a/README.md
+++ b/README.md
@@ -2,7 +2,6 @@
| | | Win | Mac | Lin | iOS | And |
| ----------------------------------------------- | ------------------------------------------------------ | --- | --- | --- | --- | --- |
-| [authenticator](plugins/authenticator) | Interface with hardware security keys. | ✅ | ✅ | ✅ | ? | ? |
| [autostart](plugins/autostart) | Automatically launch your app at system startup. | ✅ | ✅ | ✅ | ? | ? |
| [barcode-scanner](plugins/barcode-scanner) | Allows your mobile application to use the camera to scan QR codes, EAN-13 and other kinds of barcodes. | ? | ? | ? | ✅ | ✅ |
| [biometric](plugins/biometric) | Prompt the user for biometric authentication on Android and iOS. | ? | ? | ? | ✅ | ✅ |
diff --git a/plugins/authenticator/.gitignore b/plugins/authenticator/.gitignore
deleted file mode 100644
index b512c09d4..000000000
--- a/plugins/authenticator/.gitignore
+++ /dev/null
@@ -1 +0,0 @@
-node_modules
\ No newline at end of file
diff --git a/plugins/authenticator/CHANGELOG.md b/plugins/authenticator/CHANGELOG.md
deleted file mode 100644
index b573170ac..000000000
--- a/plugins/authenticator/CHANGELOG.md
+++ /dev/null
@@ -1,92 +0,0 @@
-# Changelog
-
-## \[2.0.0-rc.1]
-
-- [`e2e97db5`](https://github.com/tauri-apps/plugins-workspace/commit/e2e97db51983267f5be84d4f6f0278d58834d1f5) ([#1701](https://github.com/tauri-apps/plugins-workspace/pull/1701) by [@lucasfernog](https://github.com/tauri-apps/plugins-workspace/../../lucasfernog)) Update to tauri 2.0.0-rc.8
-
-## \[2.0.0-rc.0]
-
-- [`9887d1`](https://github.com/tauri-apps/plugins-workspace/commit/9887d14bd0e971c4c0f5c1188fc4005d3fc2e29e) Update to tauri RC.
-
-## \[2.0.0-beta.8]
-
-- [`99d6ac0f`](https://github.com/tauri-apps/plugins-workspace/commit/99d6ac0f9506a6a4a1aa59c728157190a7441af6) ([#1606](https://github.com/tauri-apps/plugins-workspace/pull/1606) by [@FabianLars](https://github.com/tauri-apps/plugins-workspace/../../FabianLars)) The JS packages now specify the *minimum* `@tauri-apps/api` version instead of a single exact version.
-- [`6de87966`](https://github.com/tauri-apps/plugins-workspace/commit/6de87966ecc00ad9d91c25be452f1f46bd2b7e1f) ([#1597](https://github.com/tauri-apps/plugins-workspace/pull/1597) by [@Legend-Master](https://github.com/tauri-apps/plugins-workspace/../../Legend-Master)) Update to tauri beta.25.
-
-## \[2.0.0-beta.7]
-
-- [`22a17980`](https://github.com/tauri-apps/plugins-workspace/commit/22a17980ff4f6f8c40adb1b8f4ffc6dae2fe7e30) ([#1537](https://github.com/tauri-apps/plugins-workspace/pull/1537) by [@lucasfernog](https://github.com/tauri-apps/plugins-workspace/../../lucasfernog)) Update to tauri beta.24.
-
-## \[2.0.0-beta.6]
-
-- [`76daee7a`](https://github.com/tauri-apps/plugins-workspace/commit/76daee7aafece34de3092c86e531cf9eb1138989) ([#1512](https://github.com/tauri-apps/plugins-workspace/pull/1512) by [@renovate](https://github.com/tauri-apps/plugins-workspace/../../renovate)) Update to tauri beta.23.
-
-## \[2.0.0-beta.5]
-
-- [`9013854f`](https://github.com/tauri-apps/plugins-workspace/commit/9013854f42a49a230b9dbb9d02774765528a923f)([#1382](https://github.com/tauri-apps/plugins-workspace/pull/1382)) Update to tauri beta.22.
-
-## \[2.0.0-beta.4]
-
-- [`430bd6f4`](https://github.com/tauri-apps/plugins-workspace/commit/430bd6f4f379bee5d232ae6b098ae131db7f178a)([#1363](https://github.com/tauri-apps/plugins-workspace/pull/1363)) Update to tauri beta.20.
-
-## \[2.0.0-beta.3]
-
-- [`bd1ed590`](https://github.com/tauri-apps/plugins-workspace/commit/bd1ed5903ffcce5500310dac1e59e8c67674ef1e)([#1237](https://github.com/tauri-apps/plugins-workspace/pull/1237)) Update to tauri beta.17.
-
-## \[2.0.0-beta.4]
-
-- [`7e2fcc5`](https://github.com/tauri-apps/plugins-workspace/commit/7e2fcc5e74df7c3c718e40f75bfb0eafc7d69d8d)([#1146](https://github.com/tauri-apps/plugins-workspace/pull/1146)) Update dependencies to align with tauri 2.0.0-beta.14.
-
-## \[2.0.0-beta.3]
-
-- [`a04ea2f`](https://github.com/tauri-apps/plugins-workspace/commit/a04ea2f38294d5a3987578283badc8eec87a7752)([#1071](https://github.com/tauri-apps/plugins-workspace/pull/1071)) The global API script is now only added to the binary when the `withGlobalTauri` config is true.
-
-## \[2.0.0-beta.2]
-
-- [`99bea25`](https://github.com/tauri-apps/plugins-workspace/commit/99bea2559c2c0648c2519c50a18cd124dacef57b)([#1005](https://github.com/tauri-apps/plugins-workspace/pull/1005)) Update to tauri beta.8.
-
-## \[2.0.0-beta.1]
-
-- [`569defb`](https://github.com/tauri-apps/plugins-workspace/commit/569defbe9492e38938554bb7bdc1be9151456d21) Update to tauri beta.4.
-
-## \[2.0.0-beta.0]
-
-- [`d198c01`](https://github.com/tauri-apps/plugins-workspace/commit/d198c014863ee260cb0de88a14b7fc4356ef7474)([#862](https://github.com/tauri-apps/plugins-workspace/pull/862)) Update to tauri beta.
-
-## \[2.0.0-alpha.5]
-
-- [`387c2f9`](https://github.com/tauri-apps/plugins-workspace/commit/387c2f9e0ce4c75c07ffa3fd76391a25b58f5daf)([#802](https://github.com/tauri-apps/plugins-workspace/pull/802)) Update to @tauri-apps/api v2.0.0-alpha.13.
-
-## \[2.0.0-alpha.4]
-
-- [`387c2f9`](https://github.com/tauri-apps/plugins-workspace/commit/387c2f9e0ce4c75c07ffa3fd76391a25b58f5daf)([#802](https://github.com/tauri-apps/plugins-workspace/pull/802)) Update to @tauri-apps/api v2.0.0-alpha.12.
-
-## \[2.0.0-alpha.3]
-
-- [`e438e0a`](https://github.com/tauri-apps/plugins-workspace/commit/e438e0a62d4b430a5159f05f13ecd397dd891a0d)([#676](https://github.com/tauri-apps/plugins-workspace/pull/676)) Update to @tauri-apps/api v2.0.0-alpha.11.
-
-## \[2.0.0-alpha.2]
-
-- [`5c13736`](https://github.com/tauri-apps/plugins-workspace/commit/5c137365c60790e8d4037d449e8237aa3fffdab0)([#673](https://github.com/tauri-apps/plugins-workspace/pull/673)) Update to @tauri-apps/api v2.0.0-alpha.9.
-
-## \[2.0.0-alpha.2]
-
-- [`4e2cef9`](https://github.com/tauri-apps/plugins-workspace/commit/4e2cef9b702bbbb9cf4ee17de50791cb21f1b2a4)([#593](https://github.com/tauri-apps/plugins-workspace/pull/593)) Update to alpha.12.
-
-## \[2.0.0-alpha.1]
-
-- [`d74fc0a`](https://github.com/tauri-apps/plugins-workspace/commit/d74fc0a097996e90a37be8f57d50b7d1f6ca616f)([#555](https://github.com/tauri-apps/plugins-workspace/pull/555)) Update to alpha.11.
-
-## \[2.0.0-alpha.0]
-
-- [`717ae67`](https://github.com/tauri-apps/plugins-workspace/commit/717ae670978feb4492fac1f295998b93f2b9347f)([#371](https://github.com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
- te to alpha.11.
-
-## \[2.0.0-alpha.0]
-
-- [`717ae67`](https://github.com/tauri-apps/plugins-workspace/commit/717ae670978feb4492fac1f295998b93f2b9347f)([#371](https://github.com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
- ae67\`]\(https://github.com/tauri-apps/plugins-workspace/commit/717ae670978feb4492fac1f295998b93f2b9347f)([#371](https://github.com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
- 717ae670978feb4492fac1f295998b93f2b9347f)([#371](https://github.com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
- \-workspace/pull/371)) First v2 alpha release!
- 717ae670978feb4492fac1f295998b93f2b9347f)([#371](https://github.com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
- com/tauri-apps/plugins-workspace/pull/371)) First v2 alpha release!
diff --git a/plugins/authenticator/Cargo.toml b/plugins/authenticator/Cargo.toml
deleted file mode 100644
index f56dffc33..000000000
--- a/plugins/authenticator/Cargo.toml
+++ /dev/null
@@ -1,41 +0,0 @@
-[package]
-name = "tauri-plugin-authenticator"
-version = "2.0.0-rc.1"
-description = "Use hardware security-keys in your Tauri App."
-authors = { workspace = true }
-license = { workspace = true }
-edition = { workspace = true }
-rust-version = { workspace = true }
-repository = { workspace = true }
-links = "tauri-plugin-authenticator"
-
-[package.metadata.docs.rs]
-rustc-args = [ "--cfg", "docsrs" ]
-rustdoc-args = [ "--cfg", "docsrs" ]
-
-[build-dependencies]
-tauri-plugin = { workspace = true, features = [ "build" ] }
-
-[dependencies]
-serde = { workspace = true }
-serde_json = { workspace = true }
-tauri = { workspace = true }
-log = { workspace = true }
-thiserror = { workspace = true }
-
-[target."cfg(not(any(target_os = \"android\", target_os = \"ios\")))".dependencies]
-authenticator = "0.3.1"
-once_cell = "1"
-sha2 = "0.10"
-base64 = "0.22"
-chrono = "0.4"
-bytes = "1"
-byteorder = "1"
-openssl = "0.10"
-
-[target."cfg(target_os = \"windows\")".dependencies]
-winapi-util = "=0.1.6"
-
-[dev-dependencies]
-rand = "0.8"
-rusty-fork = "0.3"
diff --git a/plugins/authenticator/LICENSE.spdx b/plugins/authenticator/LICENSE.spdx
deleted file mode 100644
index cdd0df5ad..000000000
--- a/plugins/authenticator/LICENSE.spdx
+++ /dev/null
@@ -1,20 +0,0 @@
-SPDXVersion: SPDX-2.1
-DataLicense: CC0-1.0
-PackageName: tauri
-DataFormat: SPDXRef-1
-PackageSupplier: Organization: The Tauri Programme in the Commons Conservancy
-PackageHomePage: https://tauri.app
-PackageLicenseDeclared: Apache-2.0
-PackageLicenseDeclared: MIT
-PackageCopyrightText: 2019-2022, The Tauri Programme in the Commons Conservancy
-PackageSummary: Tauri is a rust project that enables developers to make secure
-and small desktop applications using a web frontend.
-
-PackageComment: The package includes the following libraries; see
-Relationship information.
-
-Created: 2019-05-20T09:00:00Z
-PackageDownloadLocation: git://github.com/tauri-apps/tauri
-PackageDownloadLocation: git+https://github.com/tauri-apps/tauri.git
-PackageDownloadLocation: git+ssh://github.com/tauri-apps/tauri.git
-Creator: Person: Daniel Thompson-Yvetot
\ No newline at end of file
diff --git a/plugins/authenticator/LICENSE_APACHE-2.0 b/plugins/authenticator/LICENSE_APACHE-2.0
deleted file mode 100644
index 4947287f7..000000000
--- a/plugins/authenticator/LICENSE_APACHE-2.0
+++ /dev/null
@@ -1,177 +0,0 @@
-
- Apache License
- Version 2.0, January 2004
- http://www.apache.org/licenses/
-
- TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
-
- 1. Definitions.
-
- "License" shall mean the terms and conditions for use, reproduction,
- and distribution as defined by Sections 1 through 9 of this document.
-
- "Licensor" shall mean the copyright owner or entity authorized by
- the copyright owner that is granting the License.
-
- "Legal Entity" shall mean the union of the acting entity and all
- other entities that control, are controlled by, or are under common
- control with that entity. For the purposes of this definition,
- "control" means (i) the power, direct or indirect, to cause the
- direction or management of such entity, whether by contract or
- otherwise, or (ii) ownership of fifty percent (50%) or more of the
- outstanding shares, or (iii) beneficial ownership of such entity.
-
- "You" (or "Your") shall mean an individual or Legal Entity
- exercising permissions granted by this License.
-
- "Source" form shall mean the preferred form for making modifications,
- including but not limited to software source code, documentation
- source, and configuration files.
-
- "Object" form shall mean any form resulting from mechanical
- transformation or translation of a Source form, including but
- not limited to compiled object code, generated documentation,
- and conversions to other media types.
-
- "Work" shall mean the work of authorship, whether in Source or
- Object form, made available under the License, as indicated by a
- copyright notice that is included in or attached to the work
- (an example is provided in the Appendix below).
-
- "Derivative Works" shall mean any work, whether in Source or Object
- form, that is based on (or derived from) the Work and for which the
- editorial revisions, annotations, elaborations, or other modifications
- represent, as a whole, an original work of authorship. For the purposes
- of this License, Derivative Works shall not include works that remain
- separable from, or merely link (or bind by name) to the interfaces of,
- the Work and Derivative Works thereof.
-
- "Contribution" shall mean any work of authorship, including
- the original version of the Work and any modifications or additions
- to that Work or Derivative Works thereof, that is intentionally
- submitted to Licensor for inclusion in the Work by the copyright owner
- or by an individual or Legal Entity authorized to submit on behalf of
- the copyright owner. For the purposes of this definition, "submitted"
- means any form of electronic, verbal, or written communication sent
- to the Licensor or its representatives, including but not limited to
- communication on electronic mailing lists, source code control systems,
- and issue tracking systems that are managed by, or on behalf of, the
- Licensor for the purpose of discussing and improving the Work, but
- excluding communication that is conspicuously marked or otherwise
- designated in writing by the copyright owner as "Not a Contribution."
-
- "Contributor" shall mean Licensor and any individual or Legal Entity
- on behalf of whom a Contribution has been received by Licensor and
- subsequently incorporated within the Work.
-
- 2. Grant of Copyright License. Subject to the terms and conditions of
- this License, each Contributor hereby grants to You a perpetual,
- worldwide, non-exclusive, no-charge, royalty-free, irrevocable
- copyright license to reproduce, prepare Derivative Works of,
- publicly display, publicly perform, sublicense, and distribute the
- Work and such Derivative Works in Source or Object form.
-
- 3. Grant of Patent License. Subject to the terms and conditions of
- this License, each Contributor hereby grants to You a perpetual,
- worldwide, non-exclusive, no-charge, royalty-free, irrevocable
- (except as stated in this section) patent license to make, have made,
- use, offer to sell, sell, import, and otherwise transfer the Work,
- where such license applies only to those patent claims licensable
- by such Contributor that are necessarily infringed by their
- Contribution(s) alone or by combination of their Contribution(s)
- with the Work to which such Contribution(s) was submitted. If You
- institute patent litigation against any entity (including a
- cross-claim or counterclaim in a lawsuit) alleging that the Work
- or a Contribution incorporated within the Work constitutes direct
- or contributory patent infringement, then any patent licenses
- granted to You under this License for that Work shall terminate
- as of the date such litigation is filed.
-
- 4. Redistribution. You may reproduce and distribute copies of the
- Work or Derivative Works thereof in any medium, with or without
- modifications, and in Source or Object form, provided that You
- meet the following conditions:
-
- (a) You must give any other recipients of the Work or
- Derivative Works a copy of this License; and
-
- (b) You must cause any modified files to carry prominent notices
- stating that You changed the files; and
-
- (c) You must retain, in the Source form of any Derivative Works
- that You distribute, all copyright, patent, trademark, and
- attribution notices from the Source form of the Work,
- excluding those notices that do not pertain to any part of
- the Derivative Works; and
-
- (d) If the Work includes a "NOTICE" text file as part of its
- distribution, then any Derivative Works that You distribute must
- include a readable copy of the attribution notices contained
- within such NOTICE file, excluding those notices that do not
- pertain to any part of the Derivative Works, in at least one
- of the following places: within a NOTICE text file distributed
- as part of the Derivative Works; within the Source form or
- documentation, if provided along with the Derivative Works; or,
- within a display generated by the Derivative Works, if and
- wherever such third-party notices normally appear. The contents
- of the NOTICE file are for informational purposes only and
- do not modify the License. You may add Your own attribution
- notices within Derivative Works that You distribute, alongside
- or as an addendum to the NOTICE text from the Work, provided
- that such additional attribution notices cannot be construed
- as modifying the License.
-
- You may add Your own copyright statement to Your modifications and
- may provide additional or different license terms and conditions
- for use, reproduction, or distribution of Your modifications, or
- for any such Derivative Works as a whole, provided Your use,
- reproduction, and distribution of the Work otherwise complies with
- the conditions stated in this License.
-
- 5. Submission of Contributions. Unless You explicitly state otherwise,
- any Contribution intentionally submitted for inclusion in the Work
- by You to the Licensor shall be under the terms and conditions of
- this License, without any additional terms or conditions.
- Notwithstanding the above, nothing herein shall supersede or modify
- the terms of any separate license agreement you may have executed
- with Licensor regarding such Contributions.
-
- 6. Trademarks. This License does not grant permission to use the trade
- names, trademarks, service marks, or product names of the Licensor,
- except as required for reasonable and customary use in describing the
- origin of the Work and reproducing the content of the NOTICE file.
-
- 7. Disclaimer of Warranty. Unless required by applicable law or
- agreed to in writing, Licensor provides the Work (and each
- Contributor provides its Contributions) on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
- implied, including, without limitation, any warranties or conditions
- of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
- PARTICULAR PURPOSE. You are solely responsible for determining the
- appropriateness of using or redistributing the Work and assume any
- risks associated with Your exercise of permissions under this License.
-
- 8. Limitation of Liability. In no event and under no legal theory,
- whether in tort (including negligence), contract, or otherwise,
- unless required by applicable law (such as deliberate and grossly
- negligent acts) or agreed to in writing, shall any Contributor be
- liable to You for damages, including any direct, indirect, special,
- incidental, or consequential damages of any character arising as a
- result of this License or out of the use or inability to use the
- Work (including but not limited to damages for loss of goodwill,
- work stoppage, computer failure or malfunction, or any and all
- other commercial damages or losses), even if such Contributor
- has been advised of the possibility of such damages.
-
- 9. Accepting Warranty or Additional Liability. While redistributing
- the Work or Derivative Works thereof, You may choose to offer,
- and charge a fee for, acceptance of support, warranty, indemnity,
- or other liability obligations and/or rights consistent with this
- License. However, in accepting such obligations, You may act only
- on Your own behalf and on Your sole responsibility, not on behalf
- of any other Contributor, and only if You agree to indemnify,
- defend, and hold each Contributor harmless for any liability
- incurred by, or claims asserted against, such Contributor by reason
- of your accepting any such warranty or additional liability.
-
- END OF TERMS AND CONDITIONS
\ No newline at end of file
diff --git a/plugins/authenticator/LICENSE_MIT b/plugins/authenticator/LICENSE_MIT
deleted file mode 100644
index 4d7547256..000000000
--- a/plugins/authenticator/LICENSE_MIT
+++ /dev/null
@@ -1,21 +0,0 @@
-MIT License
-
-Copyright (c) 2017 - Present Tauri Apps Contributors
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in all
-copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
-SOFTWARE.
\ No newline at end of file
diff --git a/plugins/authenticator/README.md b/plugins/authenticator/README.md
deleted file mode 100644
index a41285550..000000000
--- a/plugins/authenticator/README.md
+++ /dev/null
@@ -1,143 +0,0 @@
-![plugin-authenticator](https://github.com/tauri-apps/plugins-workspace/raw/v2/plugins/authenticator/banner.png)
-
-Use hardware security-keys in your Tauri App.
-
-- Supported platforms: Windows, Linux, FreeBSD, NetBSD, OpenBSD, and macOS.
-
-## Install
-
-_This plugin requires a Rust version of at least **1.75**_
-
-There are three general methods of installation that we can recommend.
-
-1. Use crates.io and npm (easiest and requires you to trust that our publishing pipeline worked)
-2. Pull sources directly from Github using git tags / revision hashes (most secure)
-3. Git submodule install this repo in your tauri project and then use the file protocol to ingest the source (most secure, but inconvenient to use)
-
-Install the authenticator plugin by adding the following lines to your `Cargo.toml` file:
-
-`src-tauri/Cargo.toml`
-
-```toml
-# you can add the dependencies on the `[dependencies]` section if you do not target mobile
-[target."cfg(not(any(target_os = \"android\", target_os = \"ios\")))".dependencies]
-tauri-plugin-authenticator = "2.0.0-rc"
-# alternatively with Git:
-tauri-plugin-authenticator = { git = "https://github.com/tauri-apps/plugins-workspace", branch = "v2" }
-```
-
-You can install the JavaScript Guest bindings using your preferred JavaScript package manager:
-
-> Note: Since most JavaScript package managers are unable to install packages from git monorepos we provide read-only mirrors of each plugin. This makes installation option 2 more ergonomic to use.
-
-```sh
-pnpm add @tauri-apps/plugin-authenticator
-# or
-npm add @tauri-apps/plugin-authenticator
-# or
-yarn add @tauri-apps/plugin-authenticator
-```
-
-Alternatively with Git:
-
-```sh
-pnpm add https://github.com/tauri-apps/tauri-plugin-authenticator#v2
-# or
-npm add https://github.com/tauri-apps/tauri-plugin-authenticator#v2
-# or
-yarn add https://github.com/tauri-apps/tauri-plugin-authenticator#v2
-```
-
-## Usage
-
-First, you need to register the authenticator plugin with Tauri:
-
-`src-tauri/src/main.rs`
-
-```rust
-fn main() {
- tauri::Builder::default()
- .setup(|app| {
- #[cfg(desktop)]
- app.handle().plugin(tauri_plugin_authenticator::init())?;
- Ok(())
- })
- .run(tauri::generate_context!())
- .expect("error while running tauri application");
-}
-```
-
-Afterwards, all the plugin's APIs are available through the JavaScript guest bindings:
-
-```javascript
-import { Authenticator } from "@tauri-apps/plugin-authenticator";
-
-const auth = new Authenticator();
-auth.init(); // initialize transports
-
-// generate a 32-bytes long random challenge
-const arr = new Uint32Array(32);
-window.crypto.getRandomValues(arr);
-const b64 = btoa(String.fromCharCode.apply(null, arr));
-// web-safe base64
-const challenge = b64.replace(/\+/g, "-").replace(/\//g, "_");
-
-const domain = "https://tauri.app";
-
-// attempt to register with the security key
-const json = await auth.register(challenge, domain);
-const registerResult = JSON.parse(json);
-
-// verify the registration was successful
-const r2 = await auth.verifyRegistration(
- challenge,
- app,
- registerResult.registerData,
- registerResult.clientData,
-);
-const j2 = JSON.parse(r2);
-
-// sign some data
-const json = await auth.sign(challenge, app, keyHandle);
-const signData = JSON.parse(json);
-
-// verify the signature again
-const counter = await auth.verifySignature(
- challenge,
- app,
- signData.signData,
- clientData,
- keyHandle,
- pubkey,
-);
-
-if (counter && counter > 0) {
- console.log("SUCCESS!");
-}
-```
-
-## Contributing
-
-PRs accepted. Please make sure to read the Contributing Guide before making a pull request.
-
-## Partners
-
-
-
-
-
-
-
-
- |
-
-
-
-
-For the complete list of sponsors please visit our [website](https://tauri.app#sponsors) and [Open Collective](https://opencollective.com/tauri).
-
-## License
-
-Code: (c) 2015 - Present - The Tauri Programme within The Commons Conservancy.
-
-MIT or MIT/Apache 2.0 where applicable.
diff --git a/plugins/authenticator/SECURITY.md b/plugins/authenticator/SECURITY.md
deleted file mode 100644
index 67d831fc9..000000000
--- a/plugins/authenticator/SECURITY.md
+++ /dev/null
@@ -1,23 +0,0 @@
-# Security Policy
-
-**Do not report security vulnerabilities through public GitHub issues.**
-
-**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
-
-Include as much of the following information:
-
-- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
-- The location of the affected source code (tag/branch/commit or direct URL)
-- Any special configuration required to reproduce the issue
-- The distribution affected or used to help us with reproduction of the issue
-- Step-by-step instructions to reproduce the issue
-- Ideally a reproduction repository
-- Impact of the issue, including how an attacker might exploit the issue
-
-We prefer to receive reports in English.
-
-## Contact
-
-Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
-
-Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
\ No newline at end of file
diff --git a/plugins/authenticator/api-iife.js b/plugins/authenticator/api-iife.js
deleted file mode 100644
index 7732dcff9..000000000
--- a/plugins/authenticator/api-iife.js
+++ /dev/null
@@ -1 +0,0 @@
-if("__TAURI__"in window){var __TAURI_PLUGIN_AUTHENTICATOR__=function(t){"use strict";async function i(t,i={},a){return window.__TAURI_INTERNALS__.invoke(t,i,a)}"function"==typeof SuppressedError&&SuppressedError;return t.Authenticator=class{async init(){await i("plugin:authenticator|init_auth")}async register(t,a){return await i("plugin:authenticator|register",{timeout:1e4,challenge:t,application:a})}async verifyRegistration(t,a,e,n){return await i("plugin:authenticator|verify_registration",{challenge:t,application:a,registerData:e,clientData:n})}async sign(t,a,e){return await i("plugin:authenticator|sign",{timeout:1e4,challenge:t,application:a,keyHandle:e})}async verifySignature(t,a,e,n,r,u){return await i("plugin:authenticator|verify_signature",{challenge:t,application:a,signData:e,clientData:n,keyHandle:r,pubkey:u})}},t}({});Object.defineProperty(window.__TAURI__,"authenticator",{value:__TAURI_PLUGIN_AUTHENTICATOR__})}
diff --git a/plugins/authenticator/banner.png b/plugins/authenticator/banner.png
deleted file mode 100644
index 405dc6018..000000000
Binary files a/plugins/authenticator/banner.png and /dev/null differ
diff --git a/plugins/authenticator/build.rs b/plugins/authenticator/build.rs
deleted file mode 100644
index 8b4c860e3..000000000
--- a/plugins/authenticator/build.rs
+++ /dev/null
@@ -1,17 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-const COMMANDS: &[&str] = &[
- "init_auth",
- "register",
- "verify_registration",
- "sign",
- "verify_signature",
-];
-
-fn main() {
- tauri_plugin::Builder::new(COMMANDS)
- .global_api_script_path("./api-iife.js")
- .build();
-}
diff --git a/plugins/authenticator/guest-js/index.ts b/plugins/authenticator/guest-js/index.ts
deleted file mode 100644
index bbd45e9ff..000000000
--- a/plugins/authenticator/guest-js/index.ts
+++ /dev/null
@@ -1,64 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-import { invoke } from "@tauri-apps/api/core";
-
-export class Authenticator {
- async init(): Promise {
- await invoke("plugin:authenticator|init_auth");
- }
-
- async register(challenge: string, application: string): Promise {
- return await invoke("plugin:authenticator|register", {
- timeout: 10000,
- challenge,
- application,
- });
- }
-
- async verifyRegistration(
- challenge: string,
- application: string,
- registerData: string,
- clientData: string,
- ): Promise {
- return await invoke("plugin:authenticator|verify_registration", {
- challenge,
- application,
- registerData,
- clientData,
- });
- }
-
- async sign(
- challenge: string,
- application: string,
- keyHandle: string,
- ): Promise {
- return await invoke("plugin:authenticator|sign", {
- timeout: 10000,
- challenge,
- application,
- keyHandle,
- });
- }
-
- async verifySignature(
- challenge: string,
- application: string,
- signData: string,
- clientData: string,
- keyHandle: string,
- pubkey: string,
- ): Promise {
- return await invoke("plugin:authenticator|verify_signature", {
- challenge,
- application,
- signData,
- clientData,
- keyHandle,
- pubkey,
- });
- }
-}
diff --git a/plugins/authenticator/package.json b/plugins/authenticator/package.json
deleted file mode 100644
index a6ceb9252..000000000
--- a/plugins/authenticator/package.json
+++ /dev/null
@@ -1,30 +0,0 @@
-{
- "name": "@tauri-apps/plugin-authenticator",
- "version": "2.0.0-rc.1",
- "description": "Use hardware security-keys in your Tauri App.",
- "license": "MIT or APACHE-2.0",
- "authors": [
- "Tauri Programme within The Commons Conservancy"
- ],
- "repository": "https://github.com/tauri-apps/plugins-workspace",
- "type": "module",
- "types": "./dist-js/index.d.ts",
- "main": "./dist-js/index.cjs",
- "module": "./dist-js/index.js",
- "exports": {
- "types": "./dist-js/index.d.ts",
- "import": "./dist-js/index.js",
- "require": "./dist-js/index.cjs"
- },
- "scripts": {
- "build": "rollup -c"
- },
- "files": [
- "dist-js",
- "README.md",
- "LICENSE"
- ],
- "dependencies": {
- "@tauri-apps/api": "^2.0.0-rc.4"
- }
-}
diff --git a/plugins/authenticator/permissions/autogenerated/commands/init_auth.toml b/plugins/authenticator/permissions/autogenerated/commands/init_auth.toml
deleted file mode 100644
index 4781773e3..000000000
--- a/plugins/authenticator/permissions/autogenerated/commands/init_auth.toml
+++ /dev/null
@@ -1,13 +0,0 @@
-# Automatically generated - DO NOT EDIT!
-
-"$schema" = "../../schemas/schema.json"
-
-[[permission]]
-identifier = "allow-init-auth"
-description = "Enables the init_auth command without any pre-configured scope."
-commands.allow = ["init_auth"]
-
-[[permission]]
-identifier = "deny-init-auth"
-description = "Denies the init_auth command without any pre-configured scope."
-commands.deny = ["init_auth"]
diff --git a/plugins/authenticator/permissions/autogenerated/commands/register.toml b/plugins/authenticator/permissions/autogenerated/commands/register.toml
deleted file mode 100644
index 4eec17dc7..000000000
--- a/plugins/authenticator/permissions/autogenerated/commands/register.toml
+++ /dev/null
@@ -1,13 +0,0 @@
-# Automatically generated - DO NOT EDIT!
-
-"$schema" = "../../schemas/schema.json"
-
-[[permission]]
-identifier = "allow-register"
-description = "Enables the register command without any pre-configured scope."
-commands.allow = ["register"]
-
-[[permission]]
-identifier = "deny-register"
-description = "Denies the register command without any pre-configured scope."
-commands.deny = ["register"]
diff --git a/plugins/authenticator/permissions/autogenerated/commands/sign.toml b/plugins/authenticator/permissions/autogenerated/commands/sign.toml
deleted file mode 100644
index f8b6a778d..000000000
--- a/plugins/authenticator/permissions/autogenerated/commands/sign.toml
+++ /dev/null
@@ -1,13 +0,0 @@
-# Automatically generated - DO NOT EDIT!
-
-"$schema" = "../../schemas/schema.json"
-
-[[permission]]
-identifier = "allow-sign"
-description = "Enables the sign command without any pre-configured scope."
-commands.allow = ["sign"]
-
-[[permission]]
-identifier = "deny-sign"
-description = "Denies the sign command without any pre-configured scope."
-commands.deny = ["sign"]
diff --git a/plugins/authenticator/permissions/autogenerated/commands/verify_registration.toml b/plugins/authenticator/permissions/autogenerated/commands/verify_registration.toml
deleted file mode 100644
index f6b15d58b..000000000
--- a/plugins/authenticator/permissions/autogenerated/commands/verify_registration.toml
+++ /dev/null
@@ -1,13 +0,0 @@
-# Automatically generated - DO NOT EDIT!
-
-"$schema" = "../../schemas/schema.json"
-
-[[permission]]
-identifier = "allow-verify-registration"
-description = "Enables the verify_registration command without any pre-configured scope."
-commands.allow = ["verify_registration"]
-
-[[permission]]
-identifier = "deny-verify-registration"
-description = "Denies the verify_registration command without any pre-configured scope."
-commands.deny = ["verify_registration"]
diff --git a/plugins/authenticator/permissions/autogenerated/commands/verify_signature.toml b/plugins/authenticator/permissions/autogenerated/commands/verify_signature.toml
deleted file mode 100644
index 90b24095a..000000000
--- a/plugins/authenticator/permissions/autogenerated/commands/verify_signature.toml
+++ /dev/null
@@ -1,13 +0,0 @@
-# Automatically generated - DO NOT EDIT!
-
-"$schema" = "../../schemas/schema.json"
-
-[[permission]]
-identifier = "allow-verify-signature"
-description = "Enables the verify_signature command without any pre-configured scope."
-commands.allow = ["verify_signature"]
-
-[[permission]]
-identifier = "deny-verify-signature"
-description = "Denies the verify_signature command without any pre-configured scope."
-commands.deny = ["verify_signature"]
diff --git a/plugins/authenticator/permissions/autogenerated/reference.md b/plugins/authenticator/permissions/autogenerated/reference.md
deleted file mode 100644
index 1df292f1a..000000000
--- a/plugins/authenticator/permissions/autogenerated/reference.md
+++ /dev/null
@@ -1,140 +0,0 @@
-
-## Permission Table
-
-
-
-Identifier |
-Description |
-
-
-
-
-
-
-`authenticator:allow-init-auth`
-
- |
-
-
-Enables the init_auth command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:deny-init-auth`
-
- |
-
-
-Denies the init_auth command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:allow-register`
-
- |
-
-
-Enables the register command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:deny-register`
-
- |
-
-
-Denies the register command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:allow-sign`
-
- |
-
-
-Enables the sign command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:deny-sign`
-
- |
-
-
-Denies the sign command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:allow-verify-registration`
-
- |
-
-
-Enables the verify_registration command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:deny-verify-registration`
-
- |
-
-
-Denies the verify_registration command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:allow-verify-signature`
-
- |
-
-
-Enables the verify_signature command without any pre-configured scope.
-
- |
-
-
-
-
-
-`authenticator:deny-verify-signature`
-
- |
-
-
-Denies the verify_signature command without any pre-configured scope.
-
- |
-
-
diff --git a/plugins/authenticator/permissions/schemas/schema.json b/plugins/authenticator/permissions/schemas/schema.json
deleted file mode 100644
index 423ed72f5..000000000
--- a/plugins/authenticator/permissions/schemas/schema.json
+++ /dev/null
@@ -1,370 +0,0 @@
-{
- "$schema": "http://json-schema.org/draft-07/schema#",
- "title": "PermissionFile",
- "description": "Permission file that can define a default permission, a set of permissions or a list of inlined permissions.",
- "type": "object",
- "properties": {
- "default": {
- "description": "The default permission set for the plugin",
- "anyOf": [
- {
- "$ref": "#/definitions/DefaultPermission"
- },
- {
- "type": "null"
- }
- ]
- },
- "set": {
- "description": "A list of permissions sets defined",
- "type": "array",
- "items": {
- "$ref": "#/definitions/PermissionSet"
- }
- },
- "permission": {
- "description": "A list of inlined permissions",
- "default": [],
- "type": "array",
- "items": {
- "$ref": "#/definitions/Permission"
- }
- }
- },
- "definitions": {
- "DefaultPermission": {
- "description": "The default permission set of the plugin.\n\nWorks similarly to a permission with the \"default\" identifier.",
- "type": "object",
- "required": [
- "permissions"
- ],
- "properties": {
- "version": {
- "description": "The version of the permission.",
- "type": [
- "integer",
- "null"
- ],
- "format": "uint64",
- "minimum": 1.0
- },
- "description": {
- "description": "Human-readable description of what the permission does. Tauri convention is to use headings in markdown content for Tauri documentation generation purposes.",
- "type": [
- "string",
- "null"
- ]
- },
- "permissions": {
- "description": "All permissions this set contains.",
- "type": "array",
- "items": {
- "type": "string"
- }
- }
- }
- },
- "PermissionSet": {
- "description": "A set of direct permissions grouped together under a new name.",
- "type": "object",
- "required": [
- "description",
- "identifier",
- "permissions"
- ],
- "properties": {
- "identifier": {
- "description": "A unique identifier for the permission.",
- "type": "string"
- },
- "description": {
- "description": "Human-readable description of what the permission does.",
- "type": "string"
- },
- "permissions": {
- "description": "All permissions this set contains.",
- "type": "array",
- "items": {
- "$ref": "#/definitions/PermissionKind"
- }
- }
- }
- },
- "Permission": {
- "description": "Descriptions of explicit privileges of commands.\n\nIt can enable commands to be accessible in the frontend of the application.\n\nIf the scope is defined it can be used to fine grain control the access of individual or multiple commands.",
- "type": "object",
- "required": [
- "identifier"
- ],
- "properties": {
- "version": {
- "description": "The version of the permission.",
- "type": [
- "integer",
- "null"
- ],
- "format": "uint64",
- "minimum": 1.0
- },
- "identifier": {
- "description": "A unique identifier for the permission.",
- "type": "string"
- },
- "description": {
- "description": "Human-readable description of what the permission does. Tauri internal convention is to use headings in markdown content for Tauri documentation generation purposes.",
- "type": [
- "string",
- "null"
- ]
- },
- "commands": {
- "description": "Allowed or denied commands when using this permission.",
- "default": {
- "allow": [],
- "deny": []
- },
- "allOf": [
- {
- "$ref": "#/definitions/Commands"
- }
- ]
- },
- "scope": {
- "description": "Allowed or denied scoped when using this permission.",
- "allOf": [
- {
- "$ref": "#/definitions/Scopes"
- }
- ]
- },
- "platforms": {
- "description": "Target platforms this permission applies. By default all platforms are affected by this permission.",
- "type": [
- "array",
- "null"
- ],
- "items": {
- "$ref": "#/definitions/Target"
- }
- }
- }
- },
- "Commands": {
- "description": "Allowed and denied commands inside a permission.\n\nIf two commands clash inside of `allow` and `deny`, it should be denied by default.",
- "type": "object",
- "properties": {
- "allow": {
- "description": "Allowed command.",
- "default": [],
- "type": "array",
- "items": {
- "type": "string"
- }
- },
- "deny": {
- "description": "Denied command, which takes priority.",
- "default": [],
- "type": "array",
- "items": {
- "type": "string"
- }
- }
- }
- },
- "Scopes": {
- "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```",
- "type": "object",
- "properties": {
- "allow": {
- "description": "Data that defines what is allowed by the scope.",
- "type": [
- "array",
- "null"
- ],
- "items": {
- "$ref": "#/definitions/Value"
- }
- },
- "deny": {
- "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.",
- "type": [
- "array",
- "null"
- ],
- "items": {
- "$ref": "#/definitions/Value"
- }
- }
- }
- },
- "Value": {
- "description": "All supported ACL values.",
- "anyOf": [
- {
- "description": "Represents a null JSON value.",
- "type": "null"
- },
- {
- "description": "Represents a [`bool`].",
- "type": "boolean"
- },
- {
- "description": "Represents a valid ACL [`Number`].",
- "allOf": [
- {
- "$ref": "#/definitions/Number"
- }
- ]
- },
- {
- "description": "Represents a [`String`].",
- "type": "string"
- },
- {
- "description": "Represents a list of other [`Value`]s.",
- "type": "array",
- "items": {
- "$ref": "#/definitions/Value"
- }
- },
- {
- "description": "Represents a map of [`String`] keys to [`Value`]s.",
- "type": "object",
- "additionalProperties": {
- "$ref": "#/definitions/Value"
- }
- }
- ]
- },
- "Number": {
- "description": "A valid ACL number.",
- "anyOf": [
- {
- "description": "Represents an [`i64`].",
- "type": "integer",
- "format": "int64"
- },
- {
- "description": "Represents a [`f64`].",
- "type": "number",
- "format": "double"
- }
- ]
- },
- "Target": {
- "description": "Platform target.",
- "oneOf": [
- {
- "description": "MacOS.",
- "type": "string",
- "enum": [
- "macOS"
- ]
- },
- {
- "description": "Windows.",
- "type": "string",
- "enum": [
- "windows"
- ]
- },
- {
- "description": "Linux.",
- "type": "string",
- "enum": [
- "linux"
- ]
- },
- {
- "description": "Android.",
- "type": "string",
- "enum": [
- "android"
- ]
- },
- {
- "description": "iOS.",
- "type": "string",
- "enum": [
- "iOS"
- ]
- }
- ]
- },
- "PermissionKind": {
- "type": "string",
- "oneOf": [
- {
- "description": "allow-init-auth -> Enables the init_auth command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "allow-init-auth"
- ]
- },
- {
- "description": "deny-init-auth -> Denies the init_auth command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "deny-init-auth"
- ]
- },
- {
- "description": "allow-register -> Enables the register command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "allow-register"
- ]
- },
- {
- "description": "deny-register -> Denies the register command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "deny-register"
- ]
- },
- {
- "description": "allow-sign -> Enables the sign command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "allow-sign"
- ]
- },
- {
- "description": "deny-sign -> Denies the sign command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "deny-sign"
- ]
- },
- {
- "description": "allow-verify-registration -> Enables the verify_registration command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "allow-verify-registration"
- ]
- },
- {
- "description": "deny-verify-registration -> Denies the verify_registration command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "deny-verify-registration"
- ]
- },
- {
- "description": "allow-verify-signature -> Enables the verify_signature command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "allow-verify-signature"
- ]
- },
- {
- "description": "deny-verify-signature -> Denies the verify_signature command without any pre-configured scope.",
- "type": "string",
- "enum": [
- "deny-verify-signature"
- ]
- }
- ]
- }
- }
-}
\ No newline at end of file
diff --git a/plugins/authenticator/rollup.config.js b/plugins/authenticator/rollup.config.js
deleted file mode 100644
index 977dfac83..000000000
--- a/plugins/authenticator/rollup.config.js
+++ /dev/null
@@ -1,7 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-import { createConfig } from "../../shared/rollup.config.js";
-
-export default createConfig();
diff --git a/plugins/authenticator/src/auth.rs b/plugins/authenticator/src/auth.rs
deleted file mode 100644
index 34bc332b5..000000000
--- a/plugins/authenticator/src/auth.rs
+++ /dev/null
@@ -1,212 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use authenticator::{
- authenticatorservice::AuthenticatorService, statecallback::StateCallback,
- AuthenticatorTransports, KeyHandle, RegisterFlags, SignFlags, StatusUpdate,
-};
-use base64::{engine::general_purpose::URL_SAFE_NO_PAD, Engine};
-use once_cell::sync::Lazy;
-use serde::Serialize;
-use sha2::{Digest, Sha256};
-use std::io;
-use std::sync::mpsc::channel;
-use std::{convert::Into, sync::Mutex};
-
-static MANAGER: Lazy> = Lazy::new(|| {
- let manager = AuthenticatorService::new().expect("The auth service should initialize safely");
- Mutex::new(manager)
-});
-
-pub fn init_usb() {
- let mut manager = MANAGER.lock().unwrap();
- // theres also "add_detected_transports()" in the docs?
- manager.add_u2f_usb_hid_platform_transports();
-}
-
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct Registration {
- pub key_handle: String,
- pub pubkey: String,
- pub register_data: String,
- pub client_data: String,
-}
-
-pub fn register(application: String, timeout: u64, challenge: String) -> crate::Result {
- let (chall_bytes, app_bytes, client_data_string) =
- format_client_data(application.as_str(), challenge.as_str());
-
- // log the status rx?
- let (status_tx, _status_rx) = channel::();
-
- let mut manager = MANAGER.lock().unwrap();
-
- let (register_tx, register_rx) = channel();
- let callback = StateCallback::new(Box::new(move |rv| {
- register_tx.send(rv).unwrap();
- }));
-
- let res = manager.register(
- RegisterFlags::empty(),
- timeout,
- chall_bytes,
- app_bytes,
- vec![],
- status_tx,
- callback,
- );
-
- match res {
- Ok(_r) => {
- let register_result = register_rx
- .recv()
- .expect("Problem receiving, unable to continue");
-
- if let Err(e) = register_result {
- return Err(e.into());
- }
-
- let (register_data, device_info) = register_result.unwrap(); // error already has been checked
-
- // println!("Register result: {}", base64::encode(®ister_data));
- println!("Device info: {}", &device_info);
-
- let (key_handle, public_key) =
- _u2f_get_key_handle_and_public_key_from_register_response(®ister_data).unwrap();
- let key_handle_base64 = URL_SAFE_NO_PAD.encode(key_handle);
- let public_key_base64 = URL_SAFE_NO_PAD.encode(public_key);
- let register_data_base64 = URL_SAFE_NO_PAD.encode(®ister_data);
- println!("Key Handle: {}", &key_handle_base64);
- println!("Public Key: {}", &public_key_base64);
-
- // Ok(base64::encode(®ister_data))
- // Ok(key_handle_base64)
- let res = serde_json::to_string(&Registration {
- key_handle: key_handle_base64,
- pubkey: public_key_base64,
- register_data: register_data_base64,
- client_data: client_data_string,
- })?;
- Ok(res)
- }
- Err(e) => Err(e.into()),
- }
-}
-
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct Signature {
- pub key_handle: String,
- pub sign_data: String,
-}
-
-pub fn sign(
- application: String,
- timeout: u64,
- challenge: String,
- key_handle: String,
-) -> crate::Result {
- let credential = match URL_SAFE_NO_PAD.decode(key_handle) {
- Ok(v) => v,
- Err(e) => {
- return Err(e.into());
- }
- };
- let key_handle = KeyHandle {
- credential,
- transports: AuthenticatorTransports::empty(),
- };
-
- let (chall_bytes, app_bytes, _) = format_client_data(application.as_str(), challenge.as_str());
-
- let (sign_tx, sign_rx) = channel();
- let callback = StateCallback::new(Box::new(move |rv| {
- sign_tx.send(rv).unwrap();
- }));
-
- // log the status rx?
- let (status_tx, _status_rx) = channel::();
-
- let mut manager = MANAGER.lock().unwrap();
-
- let res = manager.sign(
- SignFlags::empty(),
- timeout,
- chall_bytes,
- vec![app_bytes],
- vec![key_handle],
- status_tx,
- callback,
- );
- match res {
- Ok(_v) => {
- let sign_result = sign_rx
- .recv()
- .expect("Problem receiving, unable to continue");
-
- if let Err(e) = sign_result {
- return Err(e.into());
- }
-
- let (_, handle_used, sign_data, device_info) = sign_result.unwrap();
-
- let sig = URL_SAFE_NO_PAD.encode(sign_data);
-
- println!("Sign result: {sig}");
- println!("Key handle used: {}", URL_SAFE_NO_PAD.encode(&handle_used));
- println!("Device info: {}", &device_info);
- println!("Done.");
-
- let res = serde_json::to_string(&Signature {
- sign_data: sig,
- key_handle: URL_SAFE_NO_PAD.encode(&handle_used),
- })?;
- Ok(res)
- }
- Err(e) => Err(e.into()),
- }
-}
-
-fn format_client_data(application: &str, challenge: &str) -> (Vec, Vec, String) {
- let d =
- format!(r#"{{"challenge": "{challenge}", "version": "U2F_V2", "appId": "{application}"}}"#);
- let mut challenge = Sha256::new();
- challenge.update(d.as_bytes());
- let chall_bytes = challenge.finalize().to_vec();
-
- let mut app = Sha256::new();
- app.update(application.as_bytes());
- let app_bytes = app.finalize().to_vec();
-
- (chall_bytes, app_bytes, d)
-}
-
-fn _u2f_get_key_handle_and_public_key_from_register_response(
- register_response: &[u8],
-) -> io::Result<(Vec, Vec)> {
- if register_response[0] != 0x05 {
- return Err(io::Error::new(
- io::ErrorKind::InvalidData,
- "Reserved byte not set correctly",
- ));
- }
-
- // 1: reserved
- // 65: public key
- // 1: key handle length
- // key handle
- // x.509 cert
- // sig
-
- let key_handle_len = register_response[66] as usize;
- let mut public_key = register_response.to_owned();
- let mut key_handle = public_key.split_off(67);
- let _attestation = key_handle.split_off(key_handle_len);
-
- // remove fist (reserved) and last (handle len) bytes
- let pk: Vec = public_key[1..public_key.len() - 1].to_vec();
-
- Ok((key_handle, pk))
-}
diff --git a/plugins/authenticator/src/error.rs b/plugins/authenticator/src/error.rs
deleted file mode 100644
index 214706e6a..000000000
--- a/plugins/authenticator/src/error.rs
+++ /dev/null
@@ -1,26 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use serde::{Serialize, Serializer};
-
-#[derive(Debug, thiserror::Error)]
-pub enum Error {
- #[error(transparent)]
- Base64Decode(#[from] base64::DecodeError),
- #[error(transparent)]
- JSON(#[from] serde_json::Error),
- #[error(transparent)]
- U2F(#[from] crate::u2f_crate::u2ferror::U2fError),
- #[error(transparent)]
- Auth(#[from] authenticator::errors::AuthenticatorError),
-}
-
-impl Serialize for Error {
- fn serialize(&self, serializer: S) -> std::result::Result
- where
- S: Serializer,
- {
- serializer.serialize_str(self.to_string().as_ref())
- }
-}
diff --git a/plugins/authenticator/src/lib.rs b/plugins/authenticator/src/lib.rs
deleted file mode 100644
index 0e3e9f057..000000000
--- a/plugins/authenticator/src/lib.rs
+++ /dev/null
@@ -1,89 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-//! [![](https://github.com/tauri-apps/plugins-workspace/raw/v2/plugins/authenticator/banner.png)](https://github.com/tauri-apps/plugins-workspace/tree/v2/plugins/authenticator)
-//!
-//! Use hardware security-keys in your Tauri App.
-//!
-//! - Supported platforms: Windows, Linux, FreeBSD, NetBSD, OpenBSD, and macOS.
-
-#![doc(
- html_logo_url = "https://github.com/tauri-apps/tauri/raw/dev/app-icon.png",
- html_favicon_url = "https://github.com/tauri-apps/tauri/raw/dev/app-icon.png"
-)]
-#![cfg(not(any(target_os = "android", target_os = "ios")))]
-
-mod auth;
-mod error;
-mod u2f;
-mod u2f_crate;
-
-use tauri::{
- plugin::{Builder as PluginBuilder, TauriPlugin},
- Runtime,
-};
-
-pub use error::Error;
-type Result = std::result::Result;
-
-#[tauri::command]
-fn init_auth() {
- auth::init_usb();
-}
-
-#[tauri::command]
-fn register(timeout: u64, challenge: String, application: String) -> crate::Result {
- auth::register(application, timeout, challenge)
-}
-
-#[tauri::command]
-fn verify_registration(
- challenge: String,
- application: String,
- register_data: String,
- client_data: String,
-) -> crate::Result {
- u2f::verify_registration(application, challenge, register_data, client_data)
-}
-
-#[tauri::command]
-fn sign(
- timeout: u64,
- challenge: String,
- application: String,
- key_handle: String,
-) -> crate::Result {
- auth::sign(application, timeout, challenge, key_handle)
-}
-
-#[tauri::command]
-fn verify_signature(
- challenge: String,
- application: String,
- sign_data: String,
- client_data: String,
- key_handle: String,
- pubkey: String,
-) -> crate::Result {
- u2f::verify_signature(
- application,
- challenge,
- sign_data,
- client_data,
- key_handle,
- pubkey,
- )
-}
-
-pub fn init() -> TauriPlugin {
- PluginBuilder::new("authenticator")
- .invoke_handler(tauri::generate_handler![
- init_auth,
- register,
- verify_registration,
- sign,
- verify_signature
- ])
- .build()
-}
diff --git a/plugins/authenticator/src/u2f.rs b/plugins/authenticator/src/u2f.rs
deleted file mode 100644
index 9e246094e..000000000
--- a/plugins/authenticator/src/u2f.rs
+++ /dev/null
@@ -1,105 +0,0 @@
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use crate::u2f_crate::messages::*;
-use crate::u2f_crate::protocol::*;
-use crate::u2f_crate::register::*;
-use base64::{engine::general_purpose::URL_SAFE_NO_PAD, Engine};
-use chrono::prelude::*;
-use serde::Serialize;
-use std::convert::Into;
-
-static VERSION: &str = "U2F_V2";
-
-pub fn make_challenge(app_id: &str, challenge_bytes: Vec) -> Challenge {
- let utc: DateTime = Utc::now();
- Challenge {
- challenge: URL_SAFE_NO_PAD.encode(challenge_bytes),
- timestamp: format!("{utc:?}"),
- app_id: app_id.to_string(),
- }
-}
-
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct RegistrationVerification {
- pub key_handle: String,
- pub pubkey: String,
- pub device_name: Option,
-}
-
-pub fn verify_registration(
- app_id: String,
- challenge: String,
- register_data: String,
- client_data: String,
-) -> crate::Result {
- let challenge_bytes = URL_SAFE_NO_PAD.decode(challenge)?;
- let challenge = make_challenge(&app_id, challenge_bytes);
- let client_data_bytes: Vec = client_data.as_bytes().into();
- let client_data_base64 = URL_SAFE_NO_PAD.encode(client_data_bytes);
- let client = U2f::new(app_id);
- match client.register_response(
- challenge,
- RegisterResponse {
- registration_data: register_data,
- client_data: client_data_base64,
- version: VERSION.to_string(),
- },
- ) {
- Ok(v) => {
- let rv = RegistrationVerification {
- key_handle: URL_SAFE_NO_PAD.encode(&v.key_handle),
- pubkey: URL_SAFE_NO_PAD.encode(&v.pub_key),
- device_name: v.device_name,
- };
- Ok(serde_json::to_string(&rv)?)
- }
- Err(e) => Err(e.into()),
- }
-}
-
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct SignatureVerification {
- pub counter: u8,
-}
-
-pub fn verify_signature(
- app_id: String,
- challenge: String,
- sign_data: String,
- client_data: String,
- key_handle: String,
- pub_key: String,
-) -> crate::Result {
- let challenge_bytes = URL_SAFE_NO_PAD.decode(challenge)?;
- let chal = make_challenge(&app_id, challenge_bytes);
- let client_data_bytes: Vec = client_data.as_bytes().into();
- let client_data_base64 = URL_SAFE_NO_PAD.encode(client_data_bytes);
- let key_handle_bytes = URL_SAFE_NO_PAD.decode(&key_handle)?;
- let pubkey_bytes = URL_SAFE_NO_PAD.decode(pub_key)?;
- let client = U2f::new(app_id);
- let mut _counter: u32 = 0;
- match client.sign_response(
- chal,
- Registration {
- // here only needs pubkey and keyhandle
- key_handle: key_handle_bytes,
- pub_key: pubkey_bytes,
- attestation_cert: None,
- device_name: None,
- },
- SignResponse {
- // here needs client data and sig data and key_handle
- signature_data: sign_data,
- client_data: client_data_base64,
- key_handle,
- },
- _counter,
- ) {
- Ok(v) => Ok(v),
- Err(e) => Err(e.into()),
- }
-}
diff --git a/plugins/authenticator/src/u2f_crate/LICENSE b/plugins/authenticator/src/u2f_crate/LICENSE
deleted file mode 100644
index d26d5f6c0..000000000
--- a/plugins/authenticator/src/u2f_crate/LICENSE
+++ /dev/null
@@ -1,8 +0,0 @@
-Copyright (c) 2017
-
-Licensed under either of
-
- * Apache License, Version 2.0, (http://www.apache.org/licenses/LICENSE-2.0)
- * MIT license (http://opensource.org/licenses/MIT)
-
-at your option.
\ No newline at end of file
diff --git a/plugins/authenticator/src/u2f_crate/authorization.rs b/plugins/authenticator/src/u2f_crate/authorization.rs
deleted file mode 100644
index 0e667ea6c..000000000
--- a/plugins/authenticator/src/u2f_crate/authorization.rs
+++ /dev/null
@@ -1,66 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use bytes::{Buf, BufMut};
-use openssl::sha::sha256;
-use serde::Serialize;
-use std::io::Cursor;
-
-use crate::u2f_crate::u2ferror::U2fError;
-
-/// The `Result` type used in this crate.
-type Result = ::std::result::Result;
-
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct Authorization {
- pub counter: u32,
- pub user_presence: bool,
-}
-
-pub fn parse_sign_response(
- app_id: String,
- client_data: Vec,
- public_key: Vec,
- sign_data: Vec,
-) -> Result {
- if sign_data.len() <= 5 {
- return Err(U2fError::InvalidSignatureData);
- }
-
- let user_presence_flag = &sign_data[0];
- let counter = &sign_data[1..=4];
- let signature = &sign_data[5..];
-
- // Let's build the msg to verify the signature
- let app_id_hash = sha256(&app_id.into_bytes());
- let client_data_hash = sha256(&client_data[..]);
-
- let mut msg = vec![];
- msg.put(app_id_hash.as_ref());
- msg.put_u8(*user_presence_flag);
- msg.put(counter);
- msg.put(client_data_hash.as_ref());
-
- let public_key = super::crypto::NISTP256Key::from_bytes(&public_key)?;
-
- // The signature is to be verified by the relying party using the public key obtained during registration.
- let verified = public_key.verify_signature(signature, msg.as_ref())?;
- if !verified {
- return Err(U2fError::BadSignature);
- }
-
- let authorization = Authorization {
- counter: get_counter(counter),
- user_presence: true,
- };
-
- Ok(authorization)
-}
-
-fn get_counter(counter: &[u8]) -> u32 {
- let mut buf = Cursor::new(counter);
- buf.get_u32()
-}
diff --git a/plugins/authenticator/src/u2f_crate/crypto.rs b/plugins/authenticator/src/u2f_crate/crypto.rs
deleted file mode 100644
index ddcdf1b63..000000000
--- a/plugins/authenticator/src/u2f_crate/crypto.rs
+++ /dev/null
@@ -1,157 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-//! Cryptographic operation wrapper for Webauthn. This module exists to
-//! allow ease of auditing, safe operation wrappers for the webauthn library,
-//! and cryptographic provider abstraction. This module currently uses OpenSSL
-//! as the cryptographic primitive provider.
-
-// Source can be found here: https://github.com/Firstyear/webauthn-rs/blob/master/src/crypto.rs
-
-#![allow(non_camel_case_types)]
-
-use openssl::{bn, ec, hash, nid, sign, x509};
-use std::convert::TryFrom;
-
-// use super::constants::*;
-use crate::u2f_crate::u2ferror::U2fError;
-use openssl::pkey::Public;
-
-// use super::proto::*;
-
-// Why OpenSSL over another rust crate?
-// - Well, the openssl crate allows us to reconstruct a public key from the
-// x/y group coords, where most others want a pkcs formatted structure. As
-// a result, it's easiest to use openssl as it gives us exactly what we need
-// for these operations, and despite it's many challenges as a library, it
-// has resources and investment into it's maintenance, so we can a least
-// assert a higher level of confidence in it that .
-
-// Object({Integer(-3): Bytes([48, 185, 178, 204, 113, 186, 105, 138, 190, 33, 160, 46, 131, 253, 100, 177, 91, 243, 126, 128, 245, 119, 209, 59, 186, 41, 215, 196, 24, 222, 46, 102]), Integer(-2): Bytes([158, 212, 171, 234, 165, 197, 86, 55, 141, 122, 253, 6, 92, 242, 242, 114, 158, 221, 238, 163, 127, 214, 120, 157, 145, 226, 232, 250, 144, 150, 218, 138]), Integer(-1): U64(1), Integer(1): U64(2), Integer(3): I64(-7)})
-//
-
-/// An X509PublicKey. This is what is otherwise known as a public certificate
-/// which comprises a public key and other signed metadata related to the issuer
-/// of the key.
-pub struct X509PublicKey {
- pubk: x509::X509,
-}
-
-impl std::fmt::Debug for X509PublicKey {
- fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
- write!(f, "X509PublicKey")
- }
-}
-
-impl TryFrom<&[u8]> for X509PublicKey {
- type Error = U2fError;
-
- // Must be DER bytes. If you have PEM, base64decode first!
- fn try_from(d: &[u8]) -> Result {
- let pubk = x509::X509::from_der(d)?;
- Ok(X509PublicKey { pubk })
- }
-}
-
-impl X509PublicKey {
- pub(crate) fn common_name(&self) -> Option {
- let cert = &self.pubk;
-
- let subject = cert.subject_name();
- let common = subject
- .entries_by_nid(openssl::nid::Nid::COMMONNAME)
- .next()
- .map(|b| b.data().as_slice());
-
- if let Some(common) = common {
- std::str::from_utf8(common).ok().map(|s| s.to_string())
- } else {
- None
- }
- }
-
- pub(crate) fn is_secp256r1(&self) -> Result {
- // Can we get the public key?
- let pk = self.pubk.public_key()?;
-
- let ec_key = pk.ec_key()?;
-
- ec_key.check_key()?;
-
- let ec_grpref = ec_key.group();
-
- let ec_curve = ec_grpref.curve_name().ok_or(U2fError::OpenSSLNoCurveName)?;
-
- Ok(ec_curve == nid::Nid::X9_62_PRIME256V1)
- }
-
- pub(crate) fn verify_signature(
- &self,
- signature: &[u8],
- verification_data: &[u8],
- ) -> Result {
- let pkey = self.pubk.public_key()?;
-
- // TODO: Should this determine the hash type from the x509 cert? Or other?
- let mut verifier = sign::Verifier::new(hash::MessageDigest::sha256(), &pkey)?;
- verifier.update(verification_data)?;
- Ok(verifier.verify(signature)?)
- }
-}
-
-pub struct NISTP256Key {
- /// The key's public X coordinate.
- pub x: [u8; 32],
- /// The key's public Y coordinate.
- pub y: [u8; 32],
-}
-
-impl NISTP256Key {
- pub fn from_bytes(public_key_bytes: &[u8]) -> Result {
- if public_key_bytes.len() != 65 {
- return Err(U2fError::InvalidPublicKey);
- }
-
- if public_key_bytes[0] != 0x04 {
- return Err(U2fError::InvalidPublicKey);
- }
-
- let mut x: [u8; 32] = Default::default();
- x.copy_from_slice(&public_key_bytes[1..=32]);
-
- let mut y: [u8; 32] = Default::default();
- y.copy_from_slice(&public_key_bytes[33..=64]);
-
- Ok(NISTP256Key { x, y })
- }
-
- fn get_key(&self) -> Result, U2fError> {
- let ec_group = ec::EcGroup::from_curve_name(openssl::nid::Nid::X9_62_PRIME256V1)?;
-
- let xbn = bn::BigNum::from_slice(&self.x)?;
- let ybn = bn::BigNum::from_slice(&self.y)?;
-
- let ec_key = openssl::ec::EcKey::from_public_key_affine_coordinates(&ec_group, &xbn, &ybn)?;
-
- // Validate the key is sound. IIRC this actually checks the values
- // are correctly on the curve as specified
- ec_key.check_key()?;
-
- Ok(ec_key)
- }
-
- pub fn verify_signature(
- &self,
- signature: &[u8],
- verification_data: &[u8],
- ) -> Result {
- let pkey = self.get_key()?;
-
- let signature = openssl::ecdsa::EcdsaSig::from_der(signature)?;
- let hash = openssl::sha::sha256(verification_data);
-
- Ok(signature.verify(hash.as_ref(), &pkey)?)
- }
-}
diff --git a/plugins/authenticator/src/u2f_crate/messages.rs b/plugins/authenticator/src/u2f_crate/messages.rs
deleted file mode 100644
index fbae95111..000000000
--- a/plugins/authenticator/src/u2f_crate/messages.rs
+++ /dev/null
@@ -1,56 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-// As defined by FIDO U2F Javascript API.
-// https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-javascript-api.html#registration
-
-use serde::{Deserialize, Serialize};
-
-#[derive(Serialize)]
-#[serde(rename_all = "camelCase")]
-pub struct U2fRegisterRequest {
- pub app_id: String,
- pub register_requests: Vec,
- pub registered_keys: Vec,
-}
-
-#[derive(Serialize)]
-pub struct RegisterRequest {
- pub version: String,
- pub challenge: String,
-}
-
-#[derive(Serialize)]
-#[serde(rename_all = "camelCase")]
-pub struct RegisteredKey {
- pub version: String,
- pub key_handle: Option,
- pub app_id: String,
-}
-
-#[derive(Deserialize)]
-#[serde(rename_all = "camelCase")]
-pub struct RegisterResponse {
- pub registration_data: String,
- #[allow(unused)]
- pub version: String,
- pub client_data: String,
-}
-
-#[derive(Serialize)]
-#[serde(rename_all = "camelCase")]
-pub struct U2fSignRequest {
- pub app_id: String,
- pub challenge: String,
- pub registered_keys: Vec,
-}
-
-#[derive(Clone, Deserialize)]
-#[serde(rename_all = "camelCase")]
-pub struct SignResponse {
- pub key_handle: String,
- pub signature_data: String,
- pub client_data: String,
-}
diff --git a/plugins/authenticator/src/u2f_crate/mod.rs b/plugins/authenticator/src/u2f_crate/mod.rs
deleted file mode 100644
index ab2a1e0cf..000000000
--- a/plugins/authenticator/src/u2f_crate/mod.rs
+++ /dev/null
@@ -1,13 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-mod util;
-
-pub mod authorization;
-mod crypto;
-pub mod messages;
-pub mod protocol;
-pub mod register;
-pub mod u2ferror;
diff --git a/plugins/authenticator/src/u2f_crate/protocol.rs b/plugins/authenticator/src/u2f_crate/protocol.rs
deleted file mode 100644
index aa4259e9f..000000000
--- a/plugins/authenticator/src/u2f_crate/protocol.rs
+++ /dev/null
@@ -1,194 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use crate::u2f_crate::authorization::*;
-use crate::u2f_crate::messages::*;
-use crate::u2f_crate::register::*;
-use crate::u2f_crate::u2ferror::U2fError;
-use crate::u2f_crate::util::*;
-
-use base64::{engine::general_purpose::URL_SAFE_NO_PAD, Engine};
-use chrono::prelude::*;
-use chrono::Duration;
-use serde::{Deserialize, Serialize};
-
-type Result = ::std::result::Result;
-
-#[derive(Clone)]
-pub struct U2f {
- app_id: String,
-}
-
-#[derive(Deserialize, Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct Challenge {
- pub app_id: String,
- pub challenge: String,
- pub timestamp: String,
-}
-
-impl Challenge {
- // Not used in this plugin.
- #[allow(dead_code)]
- pub fn new() -> Self {
- Challenge {
- app_id: String::new(),
- challenge: String::new(),
- timestamp: String::new(),
- }
- }
-}
-
-impl U2f {
- // The app ID is a string used to uniquely identify an U2F app
- pub fn new(app_id: String) -> Self {
- U2f { app_id }
- }
-
- // Not used in this plugin.
- #[allow(dead_code)]
- pub fn generate_challenge(&self) -> Result {
- let utc: DateTime = Utc::now();
-
- let challenge_bytes = generate_challenge(32)?;
- let challenge = Challenge {
- challenge: URL_SAFE_NO_PAD.encode(challenge_bytes),
- timestamp: format!("{:?}", utc),
- app_id: self.app_id.clone(),
- };
-
- Ok(challenge.clone())
- }
-
- // Not used in this plugin.
- #[allow(dead_code)]
- pub fn request(
- &self,
- challenge: Challenge,
- registrations: Vec,
- ) -> Result {
- let u2f_request = U2fRegisterRequest {
- app_id: self.app_id.clone(),
- register_requests: self.register_request(challenge),
- registered_keys: self.registered_keys(registrations),
- };
-
- Ok(u2f_request)
- }
-
- fn register_request(&self, challenge: Challenge) -> Vec {
- let mut requests: Vec = vec![];
-
- let request = RegisterRequest {
- version: U2F_V2.into(),
- challenge: challenge.challenge,
- };
- requests.push(request);
-
- requests
- }
-
- pub fn register_response(
- &self,
- challenge: Challenge,
- response: RegisterResponse,
- ) -> Result {
- // Safe to unwrap since 300 is within the constraints of Duration::try_seconds
- if expiration(challenge.timestamp) > Duration::try_seconds(300).unwrap() {
- return Err(U2fError::ChallengeExpired);
- }
-
- let registration_data: Vec = URL_SAFE_NO_PAD
- .decode(&response.registration_data[..])
- .unwrap();
- let client_data: Vec = URL_SAFE_NO_PAD.decode(&response.client_data[..]).unwrap();
-
- parse_registration(challenge.app_id, client_data, registration_data)
- }
-
- fn registered_keys(&self, registrations: Vec) -> Vec {
- let mut keys: Vec = vec![];
-
- for registration in registrations {
- keys.push(get_registered_key(
- self.app_id.clone(),
- registration.key_handle,
- ));
- }
-
- keys
- }
-
- // Not used in this plugin.
- #[allow(dead_code)]
- pub fn sign_request(
- &self,
- challenge: Challenge,
- registrations: Vec,
- ) -> U2fSignRequest {
- let mut keys: Vec = vec![];
-
- for registration in registrations {
- keys.push(get_registered_key(
- self.app_id.clone(),
- registration.key_handle,
- ));
- }
-
- let signed_request = U2fSignRequest {
- app_id: self.app_id.clone(),
- challenge: URL_SAFE_NO_PAD.encode(challenge.challenge.as_bytes()),
- registered_keys: keys,
- };
-
- signed_request
- }
-
- pub fn sign_response(
- &self,
- challenge: Challenge,
- reg: Registration,
- sign_resp: SignResponse,
- counter: u32,
- ) -> Result {
- // Safe to unwrap since 300 is within the constraints of Duration::try_seconds
- if expiration(challenge.timestamp) > Duration::try_seconds(300).unwrap() {
- return Err(U2fError::ChallengeExpired);
- }
-
- if sign_resp.key_handle != get_encoded(®.key_handle[..]) {
- return Err(U2fError::WrongKeyHandler);
- }
-
- let client_data: Vec = URL_SAFE_NO_PAD
- .decode(&sign_resp.client_data[..])
- .map_err(|_e| U2fError::InvalidClientData)?;
- let sign_data: Vec = URL_SAFE_NO_PAD
- .decode(&sign_resp.signature_data[..])
- .map_err(|_e| U2fError::InvalidSignatureData)?;
-
- let public_key = reg.pub_key;
-
- let auth = parse_sign_response(
- self.app_id.clone(),
- client_data.clone(),
- public_key,
- sign_data.clone(),
- );
-
- match auth {
- Ok(ref res) => {
- // CounterTooLow is raised when the counter value received from the device is
- // lower than last stored counter value.
- if res.counter < counter {
- Err(U2fError::CounterTooLow)
- } else {
- Ok(res.counter)
- }
- }
- Err(e) => Err(e),
- }
- }
-}
diff --git a/plugins/authenticator/src/u2f_crate/register.rs b/plugins/authenticator/src/u2f_crate/register.rs
deleted file mode 100644
index 6b47817d1..000000000
--- a/plugins/authenticator/src/u2f_crate/register.rs
+++ /dev/null
@@ -1,102 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use byteorder::{BigEndian, ByteOrder};
-use bytes::{BufMut, Bytes};
-use openssl::sha::sha256;
-use serde::Serialize;
-
-use crate::u2f_crate::messages::RegisteredKey;
-use crate::u2f_crate::u2ferror::U2fError;
-use crate::u2f_crate::util::*;
-use std::convert::TryFrom;
-
-/// The `Result` type used in this crate.
-type Result = ::std::result::Result;
-
-// Single enrolment or pairing between an application and a token.
-#[derive(Serialize, Clone)]
-#[serde(rename_all = "camelCase")]
-pub struct Registration {
- pub key_handle: Vec,
- pub pub_key: Vec,
-
- // AttestationCert can be null for Authenticate requests.
- pub attestation_cert: Option>,
- pub device_name: Option,
-}
-
-pub fn parse_registration(
- app_id: String,
- client_data: Vec,
- registration_data: Vec,
-) -> Result {
- let reserved_byte = registration_data[0];
- if reserved_byte != 0x05 {
- return Err(U2fError::InvalidReservedByte);
- }
-
- let mut mem = Bytes::from(registration_data);
-
- //Start parsing ... advance the reserved byte.
- let _ = mem.split_to(1);
-
- // P-256 NIST elliptic curve
- let public_key = mem.split_to(65);
-
- // Key Handle
- let key_handle_size = mem.split_to(1);
- let key_len = BigEndian::read_uint(&key_handle_size[..], 1);
- let key_handle = mem.split_to(key_len as usize);
-
- // The certificate length needs to be inferred by parsing.
- let cert_len = asn_length(mem.clone()).unwrap();
- let attestation_certificate = mem.split_to(cert_len);
-
- // Remaining data corresponds to the signature
- let signature = mem;
-
- // Let's build the msg to verify the signature
- let app_id_hash = sha256(&app_id.into_bytes());
- let client_data_hash = sha256(&client_data[..]);
-
- let mut msg = vec![0x00]; // A byte reserved for future use [1 byte] with the value 0x00
- msg.put(app_id_hash.as_ref());
- msg.put(client_data_hash.as_ref());
- msg.put(key_handle.clone());
- msg.put(public_key.clone());
-
- // The signature is to be verified by the relying party using the public key certified
- // in the attestation certificate.
- let cerificate_public_key =
- super::crypto::X509PublicKey::try_from(&attestation_certificate[..])?;
-
- if !(cerificate_public_key.is_secp256r1()?) {
- return Err(U2fError::BadCertificate);
- }
-
- let verified = cerificate_public_key.verify_signature(&signature[..], &msg[..])?;
-
- if !verified {
- return Err(U2fError::BadCertificate);
- }
-
- let registration = Registration {
- key_handle: key_handle[..].to_vec(),
- pub_key: public_key[..].to_vec(),
- attestation_cert: Some(attestation_certificate[..].to_vec()),
- device_name: cerificate_public_key.common_name(),
- };
-
- Ok(registration)
-}
-
-pub fn get_registered_key(app_id: String, key_handle: Vec) -> RegisteredKey {
- RegisteredKey {
- app_id,
- version: U2F_V2.into(),
- key_handle: Some(get_encoded(key_handle.as_slice())),
- }
-}
diff --git a/plugins/authenticator/src/u2f_crate/u2ferror.rs b/plugins/authenticator/src/u2f_crate/u2ferror.rs
deleted file mode 100644
index 377af9d8d..000000000
--- a/plugins/authenticator/src/u2f_crate/u2ferror.rs
+++ /dev/null
@@ -1,40 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use thiserror::Error;
-
-#[derive(Debug, Error)]
-pub enum U2fError {
- #[error("ASM1 Decoder error")]
- Asm1DecoderError,
- #[error("Not able to verify signature")]
- BadSignature,
- #[error("Not able to generate random bytes")]
- RandomSecureBytesError,
- #[error("Invalid Reserved Byte")]
- InvalidReservedByte,
- #[error("Challenge Expired")]
- ChallengeExpired,
- #[error("Wrong Key Handler")]
- WrongKeyHandler,
- #[error("Invalid Client Data")]
- InvalidClientData,
- #[error("Invalid Signature Data")]
- InvalidSignatureData,
- #[error("Invalid User Presence Byte")]
- InvalidUserPresenceByte,
- #[error("Failed to parse certificate")]
- BadCertificate,
- #[error("Not Trusted Anchor")]
- NotTrustedAnchor,
- #[error("Counter too low")]
- CounterTooLow,
- #[error("Invalid public key")]
- OpenSSLNoCurveName,
- #[error("OpenSSL no curve name")]
- InvalidPublicKey,
- #[error(transparent)]
- OpenSSLError(#[from] openssl::error::ErrorStack),
-}
diff --git a/plugins/authenticator/src/u2f_crate/util.rs b/plugins/authenticator/src/u2f_crate/util.rs
deleted file mode 100644
index 6a7e3fbd2..000000000
--- a/plugins/authenticator/src/u2f_crate/util.rs
+++ /dev/null
@@ -1,67 +0,0 @@
-// Copyright 2021 Flavio Oliveira
-// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
-// SPDX-License-Identifier: Apache-2.0
-// SPDX-License-Identifier: MIT
-
-use crate::u2f_crate::u2ferror::U2fError;
-use base64::{engine::general_purpose::URL_SAFE_NO_PAD, Engine};
-use bytes::Bytes;
-use chrono::prelude::*;
-use chrono::Duration;
-use openssl::rand;
-
-/// The `Result` type used in this crate.
-type Result = ::std::result::Result;
-
-pub const U2F_V2: &str = "U2F_V2";
-
-// Generates a challenge from a secure, random source.
-pub fn generate_challenge(size: usize) -> Result> {
- let mut bytes: Vec = vec![0; size];
- rand::rand_bytes(&mut bytes).map_err(|_e| U2fError::RandomSecureBytesError)?;
- Ok(bytes)
-}
-
-pub fn expiration(timestamp: String) -> Duration {
- let now: DateTime = Utc::now();
-
- let ts = timestamp.parse::>();
-
- now.signed_duration_since(ts.unwrap())
-}
-
-// Decode initial bytes of buffer as ASN and return the length of the encoded structure.
-// http://en.wikipedia.org/wiki/X.690
-pub fn asn_length(mem: Bytes) -> Result {
- let buffer: &[u8] = &mem[..];
-
- if mem.len() < 2 || buffer[0] != 0x30 {
- // Type
- return Err(U2fError::Asm1DecoderError);
- }
-
- let len = buffer[1]; // Len
- if len & 0x80 == 0 {
- return Ok((len & 0x7f) as usize);
- }
-
- let numbem_of_bytes = len & 0x7f;
- if numbem_of_bytes == 0 {
- return Err(U2fError::Asm1DecoderError);
- }
-
- let mut length: usize = 0;
- for num in 0..numbem_of_bytes {
- length = length * 0x100 + (buffer[(2 + num) as usize] as usize);
- }
-
- length += numbem_of_bytes as usize;
-
- Ok(length + 2) // Add the 2 initial bytes: type and length.
-}
-
-pub fn get_encoded(data: &[u8]) -> String {
- let encoded: String = URL_SAFE_NO_PAD.encode(data);
-
- encoded.trim_end_matches('=').to_string()
-}
diff --git a/plugins/authenticator/tsconfig.json b/plugins/authenticator/tsconfig.json
deleted file mode 100644
index 5098169aa..000000000
--- a/plugins/authenticator/tsconfig.json
+++ /dev/null
@@ -1,4 +0,0 @@
-{
- "extends": "../../tsconfig.base.json",
- "include": ["guest-js/*.ts"]
-}
diff --git a/plugins/mirrors.txt b/plugins/mirrors.txt
index 73f0816e4..d346da18d 100644
--- a/plugins/mirrors.txt
+++ b/plugins/mirrors.txt
@@ -1,4 +1,3 @@
-authenticator
autostart
cli
clipboard-manager
diff --git a/pnpm-lock.yaml b/pnpm-lock.yaml
index 548b87ecf..d4d7f65ac 100644
--- a/pnpm-lock.yaml
+++ b/pnpm-lock.yaml
@@ -135,12 +135,6 @@ importers:
specifier: ^5.0.13
version: 5.4.0(terser@5.31.5)
- plugins/authenticator:
- dependencies:
- '@tauri-apps/api':
- specifier: ^2.0.0-rc.4
- version: 2.0.0-rc.4
-
plugins/autostart:
dependencies:
'@tauri-apps/api':
@@ -2772,18 +2766,17 @@ snapshots:
picocolors: 1.0.1
sisteransi: 1.0.5
- '@covector/apply@0.10.0(mocha@10.7.3)':
+ '@covector/apply@0.10.0':
dependencies:
'@covector/files': 0.8.0
effection: 2.0.8(mocha@10.7.3)
semver: 7.6.3
transitivePeerDependencies:
- encoding
- - mocha
- '@covector/assemble@0.12.0':
+ '@covector/assemble@0.12.0(mocha@10.7.3)':
dependencies:
- '@covector/command': 0.8.0
+ '@covector/command': 0.8.0(mocha@10.7.3)
'@covector/files': 0.8.0
effection: 2.0.8(mocha@10.7.3)
js-yaml: 4.1.0
@@ -2794,6 +2787,7 @@ snapshots:
unified: 9.2.2
transitivePeerDependencies:
- encoding
+ - mocha
- supports-color
'@covector/changelog@0.12.0':
@@ -2808,12 +2802,13 @@ snapshots:
- encoding
- supports-color
- '@covector/command@0.8.0':
+ '@covector/command@0.8.0(mocha@10.7.3)':
dependencies:
'@effection/process': 2.1.4
effection: 2.0.8(mocha@10.7.3)
transitivePeerDependencies:
- encoding
+ - mocha
'@covector/files@0.8.0':
dependencies:
@@ -3711,10 +3706,10 @@ snapshots:
covector@0.12.3(mocha@10.7.3):
dependencies:
'@clack/prompts': 0.7.0
- '@covector/apply': 0.10.0(mocha@10.7.3)
- '@covector/assemble': 0.12.0
+ '@covector/apply': 0.10.0
+ '@covector/assemble': 0.12.0(mocha@10.7.3)
'@covector/changelog': 0.12.0
- '@covector/command': 0.8.0
+ '@covector/command': 0.8.0(mocha@10.7.3)
'@covector/files': 0.8.0
effection: 2.0.8(mocha@10.7.3)
globby: 11.1.0