fix: Rename freeflowuniverse to incubaid

This commit is contained in:
Mahmoud-Emad
2025-10-12 12:30:19 +03:00
parent 801c4abb43
commit 8f2d187b17
1593 changed files with 8753 additions and 8300 deletions

View File

@@ -1,6 +1,6 @@
module crpgp
import freeflowuniverse.herolib.ui.console
import incubaid.herolib.ui.console
pub fn new_secret_key_param_builder() !SecretKeyParamsBuilder {
builder := C.params_builder_new()

View File

@@ -1,6 +1,6 @@
module herocrypt
import freeflowuniverse.herolib.core.redisclient
import incubaid.herolib.core.redisclient
// HeroCrypt provides a client for HeroDB's AGE cryptography features.
pub struct HeroCrypt {

View File

@@ -11,13 +11,12 @@ HeroDB is a high-performance, Redis-compatible database that offers built-in sup
- **Encryption & Decryption**: Securely encrypt and decrypt data.
- **Digital Signatures**: Sign and verify messages to ensure their integrity and authenticity.
- **Flexible Key Management**: Choose between two modes for managing your cryptographic keys:
1. **Key-Managed (Server-Side)**: Let HeroDB manage your keys. Keys are stored securely within the database and are referenced by a name. This is the recommended approach for simplicity and centralized key management.
2. **Stateless (Client-Side)**: Manage your own keys on the client side. You pass the key material with every cryptographic operation. This mode is for advanced users who require full control over their keys.
1. **Key-Managed (Server-Side)**: Let HeroDB manage your keys. Keys are stored securely within the database and are referenced by a name. This is the recommended approach for simplicity and centralized key management.
2. **Stateless (Client-Side)**: Manage your own keys on the client side. You pass the key material with every cryptographic operation. This mode is for advanced users who require full control over their keys.
## To start a db see
https://git.ourworld.tf/herocode/herodb
<https://git.ourworld.tf/herocode/herodb>
to do:
@@ -33,7 +32,7 @@ In this mode, HeroDB generates and stores the keypairs for you. You only need to
### Encryption
```v
import freeflowuniverse.herolib.crypt.herocrypt
import incubaid.herolib.crypt.herocrypt
mut client := herocrypt.new_default()!
@@ -52,7 +51,7 @@ assert decrypted_message == message
### Signing
```v
import freeflowuniverse.herolib.crypt.herocrypt
import incubaid.herolib.crypt.herocrypt
mut client := herocrypt.new_default()!
@@ -75,7 +74,7 @@ In this mode, you are responsible for generating and managing your own keys.
### Encryption
```v
import freeflowuniverse.herolib.crypt.herocrypt
import incubaid.herolib.crypt.herocrypt
mut client := herocrypt.new_default()!
@@ -96,7 +95,7 @@ assert decrypted_message == message
### Signing
```v
import freeflowuniverse.herolib.crypt.herocrypt
import incubaid.herolib.crypt.herocrypt
mut client := herocrypt.new_default()!
@@ -113,4 +112,4 @@ signature := client.sign(sign_sec_b64, message)!
is_valid := client.verify(verify_pub_b64, message, signature)!
assert is_valid
```
```

View File

@@ -1,6 +1,6 @@
module openssl
import freeflowuniverse.herolib.builder
import incubaid.herolib.builder
import json
@[params]

View File

@@ -1,6 +1,6 @@
module openssl
import freeflowuniverse.herolib.builder
import incubaid.herolib.builder
import json
@[params]

View File

@@ -1,6 +1,6 @@
module openssl
import freeflowuniverse.herolib.core.pathlib { Path }
import incubaid.herolib.core.pathlib { Path }
import json
pub struct OpenSSLKey {

View File

@@ -1,6 +1,6 @@
module openssl
import freeflowuniverse.herolib.core.pathlib { Path }
import incubaid.herolib.core.pathlib { Path }
pub struct OpenSSL {
certpath Path

View File

@@ -1,6 +1,6 @@
module pgp
// import freeflowuniverse.herolib.builder
// import incubaid.herolib.builder
import os
pub enum PGPFactoryStatus {

View File

@@ -1,6 +1,6 @@
module pgp
// import freeflowuniverse.herolib.builder
// import incubaid.herolib.builder
import os
// list all instances

View File

@@ -1,6 +1,6 @@
module pgp
// import freeflowuniverse.herolib.builder
// import incubaid.herolib.builder
import os
@[heap]

View File

@@ -1,6 +1,6 @@
module pgp
// import freeflowuniverse.herolib.builder
// import incubaid.herolib.builder
import os
pub struct Pubkey {

View File

@@ -1,9 +1,9 @@
module secrets
import rand
import freeflowuniverse.herolib.ui.console
import freeflowuniverse.herolib.ui
import freeflowuniverse.herolib.crypt.aes_symmetric
import incubaid.herolib.ui.console
import incubaid.herolib.ui
import incubaid.herolib.crypt.aes_symmetric
import crypto.md5
import regex
import os

View File

@@ -1,6 +1,6 @@
module secrets
import freeflowuniverse.herolib.ui.console
import incubaid.herolib.ui.console
pub struct SecretBox {
pub mut:

View File

@@ -3,7 +3,7 @@
Some tools to work with encryption/decryption (symmetric)
```go
import freeflowuniverse.herolib.crypt.secrets
import incubaid.herolib.crypt.secrets
mut box:=secrets.get(secret:"mysecret")!
@@ -28,7 +28,7 @@ some utils to manage secret keys and easily change them in text, ideal for confi
```go
#!/usr/bin/env -S v -n -cg -w -enable-globals run
import freeflowuniverse.herolib.crypt.secrets
import incubaid.herolib.crypt.secrets
mut box:=secrets.get()!
box.delete("myapp.something")! //make sure we remove all previous keys
@@ -43,7 +43,6 @@ test_string1:=box.replace(txt:test_string)!
println(test_string1) -->
test_string2:=box.replace(txt:test_string,defaults:{"MYAPP.SOMETHING.A":secrets.DefaultSecretArgs{secret:"AAA"}})!
println(test_string2)

View File

@@ -1,9 +1,9 @@
module secrets
import rand
// import freeflowuniverse.herolib.ui.console
// import freeflowuniverse.herolib.ui
// import freeflowuniverse.herolib.crypt.aes_symmetric
// import incubaid.herolib.ui.console
// import incubaid.herolib.ui
// import incubaid.herolib.crypt.aes_symmetric
// import crypto.md5
import crypto.sha256
import os

View File

@@ -1,6 +1,6 @@
module secrets
import freeflowuniverse.herolib.ui.console
import incubaid.herolib.ui.console
fn test_check() {
mut box := get(secret: 'mysecret')!