1
0
mirror of https://github.com/nukesor/pueue synced 2024-07-01 07:04:26 +00:00

chore: Bump and update dependencies

This commit is contained in:
Arne Beer 2024-05-28 18:46:12 +02:00
parent 4b03972f1c
commit d2d53d5867
No known key found for this signature in database
GPG Key ID: CC9408F679023B65
5 changed files with 347 additions and 232 deletions

554
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@ -14,7 +14,9 @@ edition = "2021"
rust-version = "1.67"
[workspace.dependencies]
chrono = { version = "0.4", features = ["serde"] }
# Chrono version is hard pinned to a specific version.
# See https://github.com/Nukesor/pueue/issues/534
chrono = { version = "=0.4.35", features = ["serde"] }
command-group = "5"
log = "0.4"
serde = "1.0"

View File

@ -50,7 +50,7 @@ better-panic = { workspace = true }
# nextest run --no-capture`)
env_logger = "0.11"
pretty_assertions = { workspace = true }
rstest = "0.18"
rstest = "0.19"
serde_yaml = { workspace = true }
similar-asserts = "1"
test-log = "0.2"

View File

@ -18,13 +18,13 @@ maintenance = { status = "actively-developed" }
anyhow = "1.0"
async-trait = "0.1"
byteorder = "1.5"
chrono = { version = "0.4", features = ["serde"] }
chrono = { workspace = true }
command-group = { workspace = true }
dirs = "5.0"
handlebars = { workspace = true }
log = { workspace = true }
rand = "0.8"
rcgen = "0.12"
rcgen = "0.13"
rev_buf_reader = "0.3"
rustls = { version = "0.23", features = [
"ring",
@ -59,7 +59,7 @@ tokio = { workspace = true }
[target.'cfg(windows)'.dependencies]
winapi = { version = "0.3", features = [
"tlhelp32",
"handleapi",
"errhandlingapi",
"processthreadsapi",
"minwindef",
"impl-default",

View File

@ -3,7 +3,7 @@ use std::io::Write;
use std::path::Path;
use log::info;
use rcgen::generate_simple_self_signed;
use rcgen::{generate_simple_self_signed, CertifiedKey};
use crate::error::Error;
use crate::settings::Shared;
@ -29,14 +29,15 @@ pub fn create_certificates(shared_settings: &Shared) -> Result<(), Error> {
let subject_alt_names = vec!["pueue.local".to_string(), "localhost".to_string()];
let cert = generate_simple_self_signed(subject_alt_names).unwrap();
let CertifiedKey { cert, key_pair } =
generate_simple_self_signed(subject_alt_names).map_err(|_| {
Error::CertificateFailure("Failed to generate self-signed daemon certificate.".into())
})?;
// The certificate is now valid for localhost and the domain "hello.world.example"
let ca_cert = cert
.serialize_pem()
.map_err(|_| Error::CertificateFailure("Failed to serialize daemon certificate.".into()))?;
let ca_cert = cert.pem();
write_file(ca_cert, "daemon cert", &daemon_cert_path)?;
let ca_key = cert.serialize_private_key_pem();
let ca_key = key_pair.serialize_pem();
write_file(ca_key, "daemon key", &daemon_key_path)?;
Ok(())