mirror of
https://github.com/nukesor/pueue
synced 2024-09-30 04:53:37 +00:00
Merge pull request #535 from Nukesor/updates
chore: Bump and update dependencies
This commit is contained in:
commit
b620e53edb
554
Cargo.lock
generated
554
Cargo.lock
generated
File diff suppressed because it is too large
Load diff
|
@ -14,7 +14,9 @@ edition = "2021"
|
|||
rust-version = "1.67"
|
||||
|
||||
[workspace.dependencies]
|
||||
chrono = { version = "0.4", features = ["serde"] }
|
||||
# Chrono version is hard pinned to a specific version.
|
||||
# See https://github.com/Nukesor/pueue/issues/534
|
||||
chrono = { version = "=0.4.35", features = ["serde"] }
|
||||
command-group = "5"
|
||||
log = "0.4"
|
||||
serde = "1.0"
|
||||
|
|
|
@ -50,7 +50,7 @@ better-panic = { workspace = true }
|
|||
# nextest run --no-capture`)
|
||||
env_logger = "0.11"
|
||||
pretty_assertions = { workspace = true }
|
||||
rstest = "0.18"
|
||||
rstest = "0.19"
|
||||
serde_yaml = { workspace = true }
|
||||
similar-asserts = "1"
|
||||
test-log = "0.2"
|
||||
|
|
|
@ -18,13 +18,13 @@ maintenance = { status = "actively-developed" }
|
|||
anyhow = "1.0"
|
||||
async-trait = "0.1"
|
||||
byteorder = "1.5"
|
||||
chrono = { version = "0.4", features = ["serde"] }
|
||||
chrono = { workspace = true }
|
||||
command-group = { workspace = true }
|
||||
dirs = "5.0"
|
||||
handlebars = { workspace = true }
|
||||
log = { workspace = true }
|
||||
rand = "0.8"
|
||||
rcgen = "0.12"
|
||||
rcgen = "0.13"
|
||||
rev_buf_reader = "0.3"
|
||||
rustls = { version = "0.23", features = [
|
||||
"ring",
|
||||
|
@ -59,7 +59,7 @@ tokio = { workspace = true }
|
|||
[target.'cfg(windows)'.dependencies]
|
||||
winapi = { version = "0.3", features = [
|
||||
"tlhelp32",
|
||||
"handleapi",
|
||||
"errhandlingapi",
|
||||
"processthreadsapi",
|
||||
"minwindef",
|
||||
"impl-default",
|
||||
|
|
|
@ -3,7 +3,7 @@ use std::io::Write;
|
|||
use std::path::Path;
|
||||
|
||||
use log::info;
|
||||
use rcgen::generate_simple_self_signed;
|
||||
use rcgen::{generate_simple_self_signed, CertifiedKey};
|
||||
|
||||
use crate::error::Error;
|
||||
use crate::settings::Shared;
|
||||
|
@ -29,14 +29,15 @@ pub fn create_certificates(shared_settings: &Shared) -> Result<(), Error> {
|
|||
|
||||
let subject_alt_names = vec!["pueue.local".to_string(), "localhost".to_string()];
|
||||
|
||||
let cert = generate_simple_self_signed(subject_alt_names).unwrap();
|
||||
let CertifiedKey { cert, key_pair } =
|
||||
generate_simple_self_signed(subject_alt_names).map_err(|_| {
|
||||
Error::CertificateFailure("Failed to generate self-signed daemon certificate.".into())
|
||||
})?;
|
||||
// The certificate is now valid for localhost and the domain "hello.world.example"
|
||||
let ca_cert = cert
|
||||
.serialize_pem()
|
||||
.map_err(|_| Error::CertificateFailure("Failed to serialize daemon certificate.".into()))?;
|
||||
let ca_cert = cert.pem();
|
||||
write_file(ca_cert, "daemon cert", &daemon_cert_path)?;
|
||||
|
||||
let ca_key = cert.serialize_private_key_pem();
|
||||
let ca_key = key_pair.serialize_pem();
|
||||
write_file(ca_key, "daemon key", &daemon_key_path)?;
|
||||
|
||||
Ok(())
|
||||
|
|
Loading…
Reference in a new issue