Raito Bezarius
9a295f27c3
chore: repair CI under Forgejo
...
CI / rustfmt (pull_request) Successful in 16s
CI / test (pull_request) Successful in 1m57s
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-10-13 22:27:14 +02:00
Aaron Weiss
3b9ab628fd
bump minimum supported rust version to 1.71
CI / test (1.71) (push) Waiting to run
CI / test (stable) (push) Waiting to run
CI / rustfmt (push) Waiting to run
2024-03-18 16:43:36 -07:00
Aaron Weiss
b45c5fa88d
bump version to 1.0
2024-03-18 16:34:00 -07:00
Aaron Weiss
c51eaf1f0c
update some dependency versions
2024-03-18 16:32:40 -07:00
Aaron Weiss
0e5186420a
bump rust version to 1.67 since our dependencies require that
2024-03-18 16:23:57 -07:00
Aaron Weiss
8013504bbf
fix links in documentation.
2024-03-18 16:21:31 -07:00
Aaron Weiss
ab0d1dda5e
make channel-lists feature additive ( fixes #257 )
2024-03-18 16:16:46 -07:00
Aaron Weiss
ecf411cbc8
bring dangerously_accept_invalid_certs in line with the other config options
2024-03-18 16:09:03 -07:00
Aaron Weiss
f640e49571
fix mistake in Config::load and Config::save docs ( fixes #256 )
2024-03-18 16:06:39 -07:00
aaron
b5a017a58b
Merge pull request #253 from ljrk0/verbose_tls_error
...
Provide encapsulated Tls error information
2024-03-18 15:57:51 -07:00
aaron
44ef696727
Update MSRV to 1.67
...
There is surely a better way of doing this, but this is low barrier to entry.
2024-03-18 14:44:46 -07:00
aaron
3f44270bfc
Update MSRV to 1.66
2024-03-18 14:41:58 -07:00
aaron
acde3cca9c
Update MSRV to 1.65
2024-03-18 14:39:29 -07:00
aaron
2eb9bf5c2d
Merge pull request #254 from ljrk0/certfp_pkcs12_doc
...
CertFP: The file must be a PKCS #12 archive
2024-03-18 13:03:54 -07:00
aaron
831c8cb429
Merge pull request #258 from sshine/readme-updates-0.15
...
README, Getting Started: Update 0.13 to 0.15 in example
2024-03-18 13:03:08 -07:00
Simon Shine
4f2690d321
README, Getting Started: Update 0.13 to 0.15 in example
2023-08-08 13:21:54 +02:00
Janis König
5b09238788
CertFP: The file must be a PKCS #12 archive
...
While this archive is indeed DER-formatted, in contrast to `cert_path`,
a regular DER file created from some certificate/key PEM file won't work:
```
openssl x509 -outform der -in foo.pem -out foo.der
```
This will result in the following OpenSSL error through tls-native error:
```
error:068000A8:asn1 encoding routines:asn1_check_tlen:wrong tag:crypto/asn1/tasn_dec.c:1188:
error:0688010A:asn1 encoding routines:asn1_d2i_ex_primitive:nested asn1
error:crypto/asn1/tasn_dec.c:752:
error:0688010A:asn1 encoding routines:asn1_template_noexp_d2i:nested asn1
error:crypto/asn1/tasn_dec.c:685:Field=version, Type=PKCS12
```
Instead, a PKCS #12 archive must be created like so:
```
openssl pkcs12 -export -out foo.p12 -inkey fookey.pem -in foocert.pem
```
If the PEM file contains both the private key and the certificate,
the same file can be passed to `openssl` twice.
Also compare the documentation for `from_pkcs12` to `from_der` in
native-tls, as used in the `new_secured_transport` function:
https://docs.rs/native-tls/0.2.11/native_tls/struct.Identity.html#method.from_pkcs12
2023-07-11 16:39:02 +02:00
Janis König
5658fe514f
Provide encapsulated Tls error information
...
When `.to_string()` is invoked on a the crate-wide Error enum,
the error message using #[error("...")] is displayed.
Some of those wrapped internal enums also contain, possibly more
helpful, error messages. This will include the string gathered by
`.to_string()` from the encapsulated enum in the main error message.
See also
https://github.com/squidowl/halloy/pull/143
2023-07-11 15:19:27 +02:00
aaron
26ab9425bd
Merge pull request #252 from martinetd/query_mode
...
irc-proto: allow modes with no prefix
2023-06-23 22:09:31 -04:00
Dominique Martinet
709151b94d
irc-proto: allow modes with no prefix
...
irc clients can query the details of some modes (e.g. request list of
banned users) by sending a message with no plus or minus prefix,
e.g. "MODE #chan b"
2023-06-23 21:47:02 +09:00
Aaron Weiss
8eef9c5688
Merge pull request #235 from simnalamburt/clippy
...
Fix all `cargo clippy` warnings.
2023-06-05 15:28:33 -04:00
Hyeon Kim
66f18c2044
examples: Fix all clippy warnings
2023-06-04 01:26:54 +09:00
Hyeon Kim
82387576a0
client/mod.rs: Fix mistake
2023-06-04 01:26:54 +09:00
Hyeon Kim
a9b1ea3946
Run cargo fmt
2023-06-04 01:26:15 +09:00
Hyeon Kim
781cbab4a4
Fix all trivial clippy warnings using cargo clippy --fix
2023-06-04 01:26:15 +09:00
Hyeon Kim
a8d6df4e31
Remove redundant uses of format!()
2023-06-04 01:26:12 +09:00
Hyeon Kim
af6ef9eec2
irc-proto: Run cargo fmt
2023-06-04 01:24:25 +09:00
Hyeon Kim
956025c222
irc-proto: Fix a nontrivial clippy warning
...
References:
https://rust-lang.github.io/rust-clippy/master/index.html#inherent_to_string_shadow_display
2023-06-04 01:24:24 +09:00
Hyeon Kim
467efb9eba
irc-proto: Misc refactoring
2023-06-04 01:00:25 +09:00
Hyeon Kim
b0c5f1fe90
irc-proto: Fix all trivial clippy warnings using cargo clippy --fix
2023-06-04 01:00:22 +09:00
Aaron Weiss
3d037df761
Merge pull request #237 from yancyribbens/fix/readme-example
...
Update the readme example
2023-05-22 10:57:17 -07:00
Aaron Weiss
d74e0117e7
Update README.md with fixed CI link
2023-05-22 13:47:33 -04:00
Aaron Weiss
c533c49e9f
Update ci.yml for MSV 1.64
2023-05-22 13:34:12 -04:00
Aaron Weiss
34aae72edc
Merge pull request #249 from udoprog/develop
...
Bump dependencies, set rust-version, and some more maintenance work
2023-05-22 10:30:09 -07:00
John-John Tedro
aacba7fef1
Add Github workflow
2023-04-12 17:50:47 +02:00
John-John Tedro
3e396f8577
Bump dependencies, set rust-version
2023-04-12 17:50:47 +02:00
Aaron Weiss
d40e3ce844
Merge pull request #248 from Bytekeeper/develop
...
Fix to allow stripping of 0-prefixed color codes
2023-03-28 13:15:48 -07:00
Dennis Waldherr
7ee6dfd4dc
Fix to allow stripping of 0-prefixed color codes and filter characters
...
when switching back to Text
2023-03-27 18:36:34 +02:00
Aaron Weiss
71610a8a8e
Merge pull request #247 from kpcyrd/chrono-cve-2020-26235
...
Reconfigure chrono to remove CVE-2020-26235/RUSTSEC-2020-0159
2023-03-02 13:26:02 -05:00
kpcyrd
a4d789a74c
Reconfigure chrono to remove CVE-2020-26235
2023-03-02 11:54:50 +01:00
Aaron Weiss
78216d601c
Merge pull request #243 from seam345/develop
...
remove reference to for_each_incoming
2022-08-15 13:09:32 -07:00
sean borg
1e2a03d327
remove reference to for_each_incoming
2022-08-12 19:59:33 +01:00
Aaron Weiss
925651cd02
Merge pull request #236 from simnalamburt/dangerously-accept-invalid-certs
...
New option: dangerously_accept_invalid_certs
2022-02-25 17:20:22 -05:00
yancy
38008c66ca
Update the readme example to reflect the current API and include an example Cargo.toml as well
2021-12-09 17:41:28 +01:00
Daniel Lublin
bcc6479d22
New option: dangerously_accept_invalid_certs
...
This patch adds an option to dangerously ignore all ceritificate
verifications. This option must be used with extreme caution and should
only be used as a last resort.
Closes #209 , #230
Co-authored-by: Hyeon Kim <simnalamburt@gmail.com>
2021-11-15 05:52:15 +09:00
Aaron Weiss
f254b10fca
Merge pull request #233 from yancyribbens/fix/link-rot
...
Update broken link location to rfc 2812
2021-08-04 12:32:01 -04:00
yancy
b87b1f37e8
Update broken link location to rfc 2812
2021-07-29 14:47:39 +02:00
Aaron Weiss
f76c845979
Merge pull request #232 from maugier/fix/develop/colon_in_suffix
...
Fix stringification of command suffixes with a leading colon
2021-05-04 18:18:41 -04:00
Maxime Augier
1e6824a1a5
Fix incorrect stringification of suffix with leading colon
2021-05-04 19:37:03 +02:00
Maxime Augier
b64a71e2fa
Add tests for messages with a leading colon in the suffix
2021-05-04 19:35:36 +02:00