chore: cargo update

Signed-off-by: Harald Hoyer <harald@matterlabs.dev>
This commit is contained in:
Harald Hoyer 2024-12-20 11:27:04 +01:00
parent 68805b10a8
commit 0b67a14cd1
Signed by: harald
GPG key ID: F519A1143B3FBE32
9 changed files with 740 additions and 502 deletions

View file

@ -95,7 +95,7 @@ async fn main() -> Result<()> {
.service(web::resource(SignRequest::URL).route(web::post().to(post_sign)))
.service(web::resource(DIGEST_URL).route(web::get().to(get_digest)))
})
.bind_rustls_0_22((Ipv6Addr::UNSPECIFIED, args.port), config)
.bind_rustls_0_23((Ipv6Addr::UNSPECIFIED, args.port), config)
{
Ok(c) => c,
Err(e) => {

View file

@ -186,7 +186,7 @@ async fn main() -> Result<()> {
.service(web::resource(Init::URL).route(web::post().to(post_init)))
.service(web::resource(Unseal::URL).route(web::post().to(post_unseal)))
})
.bind_rustls_0_22((Ipv6Addr::UNSPECIFIED, args.port), config)
.bind_rustls_0_23((Ipv6Addr::UNSPECIFIED, args.port), config)
{
Ok(c) => c,
Err(e) => {

View file

@ -3,23 +3,25 @@
use anyhow::{anyhow, bail, Context, Result};
use clap::{Args, Parser, Subcommand};
use pgp::types::KeyTrait;
use pgp::{Deserializable, SignedPublicKey};
use pgp::{types::PublicKeyTrait, Deserializable, SignedPublicKey};
use serde_json::Value;
use std::default::Default;
use std::fs::{File, OpenOptions};
use std::io::{Read, Write};
use std::path::{Path, PathBuf};
use teepot::client::{AttestationArgs, TeeConnection};
use teepot::json::http::{
SignRequest, SignRequestData, SignResponse, VaultCommandRequest, VaultCommands,
VaultCommandsResponse, DIGEST_URL,
use std::{
default::Default,
fs::{File, OpenOptions},
io::{Read, Write},
path::{Path, PathBuf},
};
use teepot::log::{setup_logging, LogLevelParser};
use teepot::server::signatures::verify_sig;
use teepot::sgx::sign::Signature;
use tracing::level_filters::LevelFilter;
use tracing::{error, info};
use teepot::{
client::{AttestationArgs, TeeConnection},
json::http::{
SignRequest, SignRequestData, SignResponse, VaultCommandRequest, VaultCommands,
VaultCommandsResponse, DIGEST_URL,
},
log::{setup_logging, LogLevelParser},
server::signatures::verify_sig,
sgx::sign::Signature,
};
use tracing::{error, info, level_filters::LevelFilter};
#[derive(Args, Debug)]
struct SendArgs {
@ -190,7 +192,7 @@ fn verify(
let ident_pos = verify_sig(&sig, &cmd_buf, &idents)?;
println!(
"Verified signature for `{}`",
hex::encode_upper(idents.get(ident_pos).unwrap().fingerprint())
hex::encode_upper(idents.get(ident_pos).unwrap().fingerprint().as_bytes())
);
// Remove the identity from the list of identities to verify
idents.remove(ident_pos);