Skip to content

Commit 6868a6d

Browse files
authored
Merge pull request #122 from auths-dev/dev-sdkRefactor
refactor: organize auths-sdk into domain directory
2 parents 2474358 + e980f1c commit 6868a6d

61 files changed

Lines changed: 5254 additions & 3240 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

crates/auths-cli/src/commands/artifact/sign.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ use std::sync::Arc;
55
use auths_core::config::EnvironmentConfig;
66
use auths_core::signing::PassphraseProvider;
77
use auths_core::storage::keychain::KeyAlias;
8-
use auths_sdk::signing::{ArtifactSigningParams, SigningKeyMaterial, sign_artifact};
8+
use auths_sdk::domains::signing::service::{
9+
ArtifactSigningParams, SigningKeyMaterial, sign_artifact,
10+
};
911

1012
use super::file::FileArtifact;
1113
use crate::factories::storage::build_auths_context;

crates/auths-cli/src/commands/device/authorization.rs

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -273,7 +273,7 @@ pub fn handle_device(
273273
Some(Arc::clone(&passphrase_provider)),
274274
)?;
275275

276-
let result = auths_sdk::device::link_device(
276+
let result = auths_sdk::domains::device::service::link_device(
277277
link_config,
278278
&ctx,
279279
&auths_core::ports::clock::SystemClock,
@@ -300,7 +300,7 @@ pub fn handle_device(
300300
)?;
301301

302302
let identity_key_alias = KeyAlias::new_unchecked(key);
303-
auths_sdk::device::revoke_device(
303+
auths_sdk::domains::device::service::revoke_device(
304304
&device_did,
305305
&identity_key_alias,
306306
&ctx,
@@ -449,11 +449,12 @@ fn handle_extend(
449449
};
450450
let ctx = build_auths_context(repo_path, env_config, Some(passphrase_provider))?;
451451

452-
let result =
453-
auths_sdk::device::extend_device(config, &ctx, &auths_core::ports::clock::SystemClock)
454-
.with_context(|| {
455-
format!("Failed to extend device authorization for '{}'", device_did)
456-
})?;
452+
let result = auths_sdk::domains::device::service::extend_device(
453+
config,
454+
&ctx,
455+
&auths_core::ports::clock::SystemClock,
456+
)
457+
.with_context(|| format!("Failed to extend device authorization for '{}'", device_did))?;
457458

458459
println!(
459460
"Successfully extended expiration for {} to {}",

crates/auths-cli/src/commands/id/register.rs

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ use auths_id::ports::registry::RegistryBackend;
99
use auths_id::storage::attestation::AttestationSource;
1010
use auths_id::storage::identity::IdentityStorage;
1111
use auths_infra_http::HttpRegistryClient;
12-
use auths_sdk::error::RegistrationError;
13-
pub use auths_sdk::registration::DEFAULT_REGISTRY_URL;
14-
use auths_sdk::result::RegistrationOutcome;
12+
use auths_sdk::domains::identity::error::RegistrationError;
13+
pub use auths_sdk::domains::identity::registration::DEFAULT_REGISTRY_URL;
14+
use auths_sdk::domains::identity::types::RegistrationOutcome;
1515
use auths_storage::git::{
1616
GitRegistryBackend, RegistryAttestationStorage, RegistryConfig, RegistryIdentityStorage,
1717
};
@@ -48,14 +48,16 @@ pub fn handle_register(repo_path: &Path, registry: &str) -> Result<()> {
4848

4949
let registry_client = HttpRegistryClient::new();
5050

51-
match rt.block_on(auths_sdk::registration::register_identity(
52-
identity_storage,
53-
backend,
54-
attestation_source,
55-
registry,
56-
None,
57-
&registry_client,
58-
)) {
51+
match rt.block_on(
52+
auths_sdk::domains::identity::registration::register_identity(
53+
identity_storage,
54+
backend,
55+
attestation_source,
56+
registry,
57+
None,
58+
&registry_client,
59+
),
60+
) {
5961
Ok(outcome) => display_registration_result(&outcome),
6062
Err(RegistrationError::AlreadyRegistered) => {
6163
bail!("Identity already registered at this registry.");

crates/auths-cli/src/commands/init/gather.rs

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -155,14 +155,16 @@ pub(crate) fn submit_registration(
155155

156156
let registry_client = HttpRegistryClient::new();
157157

158-
match rt.block_on(auths_sdk::registration::register_identity(
159-
identity_storage,
160-
backend,
161-
attestation_source,
162-
registry_url,
163-
proof_url,
164-
&registry_client,
165-
)) {
158+
match rt.block_on(
159+
auths_sdk::domains::identity::registration::register_identity(
160+
identity_storage,
161+
backend,
162+
attestation_source,
163+
registry_url,
164+
proof_url,
165+
&registry_client,
166+
),
167+
) {
166168
Ok(outcome) => {
167169
out.print_success(&format!("Identity registered at {}", outcome.registry));
168170
Some(outcome.registry)
@@ -216,7 +218,7 @@ pub(crate) fn ensure_registry_dir(registry_path: &Path) -> Result<()> {
216218
)
217219
})?;
218220
}
219-
auths_sdk::setup::install_registry_hook(registry_path);
221+
auths_sdk::domains::identity::service::install_registry_hook(registry_path);
220222
Ok(())
221223
}
222224

crates/auths-cli/src/commands/init/mod.rs

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,12 @@ use std::sync::Arc;
1717
use auths_core::PrefilledPassphraseProvider;
1818
use auths_core::signing::StorageSigner;
1919
use auths_core::storage::keychain::KeyStorage;
20+
use auths_sdk::domains::identity::registration::DEFAULT_REGISTRY_URL;
21+
use auths_sdk::domains::identity::service::initialize;
22+
use auths_sdk::domains::identity::types::IdentityConfig;
23+
use auths_sdk::domains::identity::types::InitializeResult;
24+
use auths_sdk::domains::signing::types::GitSigningScope;
2025
use auths_sdk::ports::git_config::GitConfigProvider;
21-
use auths_sdk::registration::DEFAULT_REGISTRY_URL;
22-
use auths_sdk::result::InitializeResult;
23-
use auths_sdk::setup::initialize;
24-
use auths_sdk::types::{GitSigningScope, IdentityConfig};
2526

2627
use crate::adapters::git_config::SystemGitConfigProvider;
2728
use crate::config::CliConfig;

crates/auths-cli/src/commands/namespace.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ use auths_crypto::AuthsErrorInfo;
1212
use auths_id::storage::identity::IdentityStorage;
1313
use auths_id::storage::layout;
1414
use auths_infra_http::resolve_verified_platform_context;
15+
use auths_sdk::domains::identity::registration::DEFAULT_REGISTRY_URL;
1516
use auths_sdk::namespace_registry::NamespaceVerifierRegistry;
16-
use auths_sdk::registration::DEFAULT_REGISTRY_URL;
1717
use auths_sdk::workflows::namespace::{
1818
DelegateNamespaceCommand, TransferNamespaceCommand, initiate_namespace_claim,
1919
parse_claim_response, parse_lookup_response, sign_namespace_delegate, sign_namespace_transfer,

crates/auths-cli/src/errors/renderer.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
use anyhow::Error;
22
use auths_core::error::{AgentError, AuthsErrorInfo};
3+
use auths_sdk::domains::signing::service::{ArtifactSigningError, SigningError};
34
use auths_sdk::error::{
45
ApprovalError, DeviceError, DeviceExtensionError, McpAuthError, OrgError, RegistrationError,
56
RotationError, SetupError,
67
};
7-
use auths_sdk::signing::{ArtifactSigningError, SigningError};
88
use auths_sdk::workflows::allowed_signers::AllowedSignersError;
99
use auths_verifier::AttestationError;
1010
use colored::Colorize;

0 commit comments

Comments
 (0)