- Jul 13, 2024
-
-
Do not open merge requests for patch level updates of dependencies, since we are mostly interested in integrating against major and minor version updates of dependencies in a lib crate. Adjust reuse configuration to assign CC0-1.0 for the renovate.json file. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Update all dependencies and add a CHANGELOG.md. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
The `.reuse/dep5` configuration file already covers the README.md with the correct CC-BY-SA-4.0 license, so there is no need to add attribution separately. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
List all README.md and CHANGELOG.md files under CC-BY-SA-4.0 and only auto-generated files such as Cargo.lock under CC0-1.0. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Since we are no longer using the aws-lc-rs feature for rustls, there is no longer the need to build OpenSSL. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- Jul 12, 2024
-
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Add the just target `test-readme` to run per project tangler based tests. This ensures that examples in `bash` code environments are executed and end-to-end tested. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Tangler is required to execute workflows in the README.md of the crates, providing essential integration test runs. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Add documentation and examples for the nethsm-cli crate. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As further documentation is going to be licensed under CC-BY-SA-4.0, we need to reflect this in the available license files. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Update all dependencies, add a CHANGELOG.md entry and raise the version to 0.3.0. Also raise the version requirements of rustls (as otherwise issues arise due to 0.22.0 vs. 0.23.0 incompatibilities), ureq and reqwest to circumvent duplicate versions as much as possible. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As aws-lc-rs pulls in a boatload of dependencies, we switch to ring. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Explain how the returned data depends on the chosen `SignatureType` and add links to relevant RFCs and Wikipedia pages. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- Jul 11, 2024
-
-
David Runge authored
Per key type specific lists of key mechanisms allow for easier reuse in user-facing documentation and centralize the access in well-defined functions, which can be reused when matching key types with key mechanisms. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As `ConnectionSecurity`'s `ToString` implementation will promote e.g. "Unsafe" and "Native", the `FromStr` impl should also cover that. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As `BootMode`, `DecryptMode`, `EncryptMode`, `KeyType`, `LogLevel`, `SignatureType`, `TlsKeyType` and `UserRole` may be constructed from string, it is useful to represent their variants as static string references (e.g. for documentation purposes in CLIs). Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
When using `BootMode`, `DecryptMode`, `EncryptMode`, `KeyMechanism`, `LogLevel`, `SignatureType` and `TlsKeyType` it is sometimes useful to iterate over the variants (e.g. when listing available options in a CLI). Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- Jul 07, 2024
-
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- Jun 05, 2024
-
-
David Runge authored
Add recipe to only update cargo index and use it as precondition for check-dependencies. This is useful, because cargo-deny should use the latest cargo index. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Since 0.2.154 has been yanked, we now rely on 0.2.155. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Use the `CARGO_PKGNAME` and `CARGO_PKG_VERSION` environment variables to define the user agent string when creating a connection configuration, instead of hardcoding the value. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Instead of using stacked fixtures for the containers and accompanying `NetHsm` instances, use dedicated fixtures. This prevents containers hanging during tests, as the `NetHsm` reuses the same connection properties if more than one container is used per test. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Defer the creation of the connection `Configuration` to right before when it is used, so that `Credentials` are only ever passed in at that point in time. This prevents the `Passphrase` from being turned into a `String` for the lifetime of the `NetHsm`. Consequently we are now storing all available `Credentials` in a `HashMap` and refer to the current `Credentials` by `String` (matching a key in the `HashMap`). The required `Agent` and `Url` are now also members of the `NetHsm` struct and the latter can be set using the `NetHsm::set_url` function. As a drive-by change the `NetHsm::set_url` function now takes a `nethsm::Url` instead of a `String`. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Use a dedicated `Passphrase` type which wraps `secrecy::SecretString`, so that passphrases can be handled safely and only be passed as plain `String` when really required. Introduce a `Credentials` type which carries a user ID and passphrase for API connections. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- May 11, 2024
-
-
David Runge authored
To allow users of the library to work with relevant in- and output of all functions, we re-export all needed models from the nethsm-sdk-rs publicly. Fixes archlinux/signstar#10 Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
The use of `TestResult` allows us to forego all `unwrap` calls. Fixes archlinux/signstar#9 Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- May 10, 2024
-
-
David Runge authored
Update lock file, changelog and version. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Replace the `KeyImportData` struct with a more data safe approach using the `PrivateKeyImport` struct. With it we now rely on PKCS#8 private keys in ASN.1 DER-encoded format when importing private key material, which is more specific/ standardized in regards to the input data format. The `nethsm::import_key` function signature changes due to this as providing a dedicated `KeyType` is no longer necessary. Fixes archlinux/signstar#12 Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
- May 09, 2024
-
-
David Runge authored
Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Add `matches_mechanisms` function to `KeyType`, which replaces the functionality of `match_key_type_and_mechanisms`. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
Rely on a simpler approach for `FromStr` implementations provided via strum macros by using "ASCII, case insensitive" for all members of the `SignatureType` enum. This approach is in line with all other custom enum types. Add documentation for all members of `SignatureType`. Update documentation of `SignatureType` to correctly reflect the ECDSA type members of the enum. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sdk_rs::models::LogLevel` does not implement `FromStr`, we provide our own `LogLevel` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sdk_rs::models::EncryptMode` does not implement `FromStr`, we provide our own `EncryptMode` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sd_rs::models::DecryptMode` does not implement `FromStr`, we provide our own `DecryptMode` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sdk_rs::models::KeyMechanism` does not implement `FromStr`, we provide our own `KeyMechanism` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sd_rs::models::TlsKeyType` does not implement `FromStr`, we provide our own `TlsKeyType` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-
David Runge authored
As the auto-generated `nethsm_sdk_rs::models::KeyType` does not implement `FromStr`, we provide our own `KeyType` to be more flexible. This allows direct use by a CLI parser. Signed-off-by:
David Runge <dvzrv@archlinux.org>
-