From b1d455b85fdaf957596c8b87daee59a7fa44f5ee Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Fri, 31 Jan 2025 14:40:49 +0100 Subject: [PATCH 1/8] feat(cloud): add cloud provider support for AWS, Azure, and Google Cloud KMS --- Cargo.lock | 3470 ++++++++++++++++++++++++++++++++++------ Cargo.toml | 10 +- src/cloud/aws/kms.rs | 75 + src/cloud/aws/mod.rs | 3 + src/cloud/azure/kms.rs | 97 ++ src/cloud/azure/mod.rs | 3 + src/cloud/error.rs | 28 + src/cloud/gcp/kms.rs | 132 ++ src/cloud/gcp/mod.rs | 3 + src/cloud/mod.rs | 28 + src/lib.rs | 7 +- 11 files changed, 3361 insertions(+), 495 deletions(-) create mode 100644 src/cloud/aws/kms.rs create mode 100644 src/cloud/aws/mod.rs create mode 100644 src/cloud/azure/kms.rs create mode 100644 src/cloud/azure/mod.rs create mode 100644 src/cloud/error.rs create mode 100644 src/cloud/gcp/kms.rs create mode 100644 src/cloud/gcp/mod.rs create mode 100644 src/cloud/mod.rs diff --git a/Cargo.lock b/Cargo.lock index 57c88ac..6a8473d 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -58,22 +58,31 @@ version = "0.1.0" dependencies = [ "aes-gcm", "async-trait", - "base64", + "aws-config", + "aws-sdk-kms", + "aws-sdk-secretsmanager", + "aws-types", + "azure_security_keyvault", + "base64 0.22.1", + "chrono", "colored", + "crc32c", "ed25519-dalek", "env_logger", "figlet-rs", + "google-cloud-googleapis", + "google-cloud-kms", "log", "parking_lot", - "rand", - "rand_chacha", - "rand_core", + "rand 0.8.5", + "rand_chacha 0.3.1", + "rand_core 0.6.4", "ring", "rsa", "serde", "serde_json", "sha2", - "thiserror", + "thiserror 2.0.11", "tokio", "windows", ] @@ -87,6 +96,21 @@ dependencies = [ "memchr", ] +[[package]] +name = "android-tzdata" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e999941b234f3131b00bc13c22d06e8c5ff726d1b6318ac7eb276997bbb4fef0" + +[[package]] +name = "android_system_properties" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "819e7219dbd41043ac279b19830f2efc897156490d7fd6ea916720117ee66311" +dependencies = [ + "libc", +] + [[package]] name = "anstream" version = "0.6.18" @@ -137,6 +161,45 @@ dependencies = [ "windows-sys 0.59.0", ] +[[package]] +name = "anyhow" +version = "1.0.95" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34ac096ce696dc2fcabef30516bb13c0a68a11d30131d3df6f04711467681b04" + +[[package]] +name = "async-channel" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "81953c529336010edd6d8e358f886d9581267795c61b19475b71314bffa46d35" +dependencies = [ + "concurrent-queue", + "event-listener", + "futures-core", +] + +[[package]] +name = "async-stream" +version = "0.3.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b5a71a6f37880a80d1d7f19efd781e4b5de42c88f0722cc13bcb6cc2cfe8476" +dependencies = [ + "async-stream-impl", + "futures-core", + "pin-project-lite", +] + +[[package]] +name = "async-stream-impl" +version = "0.3.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c7c24de15d275a1ecfd47a380fb4d5ec9bfe0933f309ed5e705b775596a3574d" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + [[package]] name = "async-trait" version = "0.1.85" @@ -148,6 +211,12 @@ dependencies = [ "syn", ] +[[package]] +name = "atomic-waker" +version = "1.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1505bd5d3d116872e7271a6d4e16d81d0c8570876c8de68093a09ac269d8aac0" + [[package]] name = "autocfg" version = "1.4.0" @@ -155,883 +224,3189 @@ source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "ace50bade8e6234aa140d9a2f552bbee1db4d353f69b8217bc503490fc1a9f26" [[package]] -name = "backtrace" -version = "0.3.74" +name = "aws-config" +version = "1.5.15" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8d82cb332cdfaed17ae235a638438ac4d4839913cc2af585c3c6746e8f8bee1a" +checksum = "dc47e70fc35d054c8fcd296d47a61711f043ac80534a10b4f741904f81e73a90" dependencies = [ - "addr2line", - "cfg-if", - "libc", - "miniz_oxide", - "object", - "rustc-demangle", - "windows-targets", + "aws-credential-types", + "aws-runtime", + "aws-sdk-sso", + "aws-sdk-ssooidc", + "aws-sdk-sts", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "fastrand 2.3.0", + "hex", + "http 0.2.12", + "ring", + "time", + "tokio", + "tracing", + "url", + "zeroize", ] [[package]] -name = "base64" -version = "0.22.1" +name = "aws-credential-types" +version = "1.2.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6" +checksum = "60e8f6b615cb5fc60a98132268508ad104310f0cfb25a1c22eee76efdf9154da" +dependencies = [ + "aws-smithy-async", + "aws-smithy-runtime-api", + "aws-smithy-types", + "zeroize", +] [[package]] -name = "base64ct" -version = "1.6.0" +name = "aws-runtime" +version = "1.5.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8c3c1a368f70d6cf7302d78f8f7093da241fb8e8807c05cc9e51a125895a6d5b" +checksum = "bee7643696e7fdd74c10f9eb42848a87fe469d35eae9c3323f80aa98f350baac" +dependencies = [ + "aws-credential-types", + "aws-sigv4", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "fastrand 2.3.0", + "http 0.2.12", + "http-body 0.4.6", + "once_cell", + "percent-encoding", + "pin-project-lite", + "tracing", + "uuid", +] [[package]] -name = "bitflags" -version = "2.8.0" +name = "aws-sdk-kms" +version = "1.57.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8f68f53c83ab957f72c32642f3868eec03eb974d1fb82e453128456482613d36" +checksum = "f7b2cd8354dcccf1ae003100a41c7b862837cfd7af14a42b1e3ed98a8c3e487b" +dependencies = [ + "aws-credential-types", + "aws-runtime", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "http 0.2.12", + "once_cell", + "regex-lite", + "tracing", +] [[package]] -name = "block-buffer" -version = "0.10.4" +name = "aws-sdk-secretsmanager" +version = "1.60.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3078c7629b62d3f0439517fa394996acacc5cbc91c5a20d8c658e77abd503a71" +checksum = "b5e6d85eec25e5dca9d94c9dc165820e11906e400e49cb3046408737b966ee78" dependencies = [ - "generic-array", + "aws-credential-types", + "aws-runtime", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "fastrand 2.3.0", + "http 0.2.12", + "once_cell", + "regex-lite", + "tracing", ] [[package]] -name = "byteorder" -version = "1.5.0" +name = "aws-sdk-sso" +version = "1.56.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" +checksum = "12e057fdcb8842de9b83592a70f5b4da0ee10bc0ad278247da1425a742a444d7" +dependencies = [ + "aws-credential-types", + "aws-runtime", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "http 0.2.12", + "once_cell", + "regex-lite", + "tracing", +] [[package]] -name = "bytes" -version = "1.9.0" +name = "aws-sdk-ssooidc" +version = "1.57.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "325918d6fe32f23b19878fe4b34794ae41fc19ddbe53b10571a4874d44ffd39b" +checksum = "a120ade4a44691b3c5c2ff2fa61b14ed331fdc218397f61ab48d66593012ae2a" +dependencies = [ + "aws-credential-types", + "aws-runtime", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-types", + "bytes", + "http 0.2.12", + "once_cell", + "regex-lite", + "tracing", +] [[package]] -name = "cc" -version = "1.2.10" +name = "aws-sdk-sts" +version = "1.57.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "13208fcbb66eaeffe09b99fffbe1af420f00a7b35aa99ad683dfc1aa76145229" +checksum = "115fd4fb663817ed595a5ee4f1649d7aacd861d47462323cb37576ce89271b93" dependencies = [ - "shlex", + "aws-credential-types", + "aws-runtime", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-json", + "aws-smithy-query", + "aws-smithy-runtime", + "aws-smithy-runtime-api", + "aws-smithy-types", + "aws-smithy-xml", + "aws-types", + "http 0.2.12", + "once_cell", + "regex-lite", + "tracing", ] [[package]] -name = "cfg-if" -version = "1.0.0" +name = "aws-sigv4" +version = "1.2.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" +checksum = "690118821e46967b3c4501d67d7d52dd75106a9c54cf36cefa1985cedbe94e05" +dependencies = [ + "aws-credential-types", + "aws-smithy-http", + "aws-smithy-runtime-api", + "aws-smithy-types", + "bytes", + "form_urlencoded", + "hex", + "hmac", + "http 0.2.12", + "http 1.2.0", + "once_cell", + "percent-encoding", + "sha2", + "time", + "tracing", +] [[package]] -name = "cipher" -version = "0.4.4" +name = "aws-smithy-async" +version = "1.2.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "773f3b9af64447d2ce9850330c473515014aa235e6a783b02db81ff39e4a3dad" +checksum = "fa59d1327d8b5053c54bf2eaae63bf629ba9e904434d0835a28ed3c0ed0a614e" dependencies = [ - "crypto-common", - "inout", + "futures-util", + "pin-project-lite", + "tokio", ] [[package]] -name = "colorchoice" -version = "1.0.3" +name = "aws-smithy-http" +version = "0.60.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5b63caa9aa9397e2d9480a9b13673856c78d8ac123288526c37d7839f2a86990" +checksum = "7809c27ad8da6a6a68c454e651d4962479e81472aa19ae99e59f9aba1f9713cc" +dependencies = [ + "aws-smithy-runtime-api", + "aws-smithy-types", + "bytes", + "bytes-utils", + "futures-core", + "http 0.2.12", + "http-body 0.4.6", + "once_cell", + "percent-encoding", + "pin-project-lite", + "pin-utils", + "tracing", +] [[package]] -name = "colored" -version = "3.0.0" +name = "aws-smithy-json" +version = "0.61.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "fde0e0ec90c9dfb3b4b1a0891a7dcd0e2bffde2f7efed5fe7c9bb00e5bfb915e" +checksum = "623a51127f24c30776c8b374295f2df78d92517386f77ba30773f15a30ce1422" dependencies = [ - "windows-sys 0.59.0", + "aws-smithy-types", ] [[package]] -name = "const-oid" -version = "0.9.6" +name = "aws-smithy-query" +version = "0.60.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c2459377285ad874054d797f3ccebf984978aa39129f6eafde5cdc8315b612f8" +checksum = "f2fbd61ceb3fe8a1cb7352e42689cec5335833cd9f94103a61e98f9bb61c64bb" +dependencies = [ + "aws-smithy-types", + "urlencoding", +] [[package]] -name = "cpufeatures" -version = "0.2.16" +name = "aws-smithy-runtime" +version = "1.7.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "16b80225097f2e5ae4e7179dd2266824648f3e2f49d9134d584b76389d31c4c3" +checksum = "865f7050bbc7107a6c98a397a9fcd9413690c27fa718446967cf03b2d3ac517e" dependencies = [ - "libc", + "aws-smithy-async", + "aws-smithy-http", + "aws-smithy-runtime-api", + "aws-smithy-types", + "bytes", + "fastrand 2.3.0", + "h2 0.3.26", + "http 0.2.12", + "http-body 0.4.6", + "http-body 1.0.1", + "httparse", + "hyper 0.14.32", + "hyper-rustls", + "once_cell", + "pin-project-lite", + "pin-utils", + "rustls 0.21.12", + "tokio", + "tracing", ] [[package]] -name = "crypto-common" -version = "0.1.6" +name = "aws-smithy-runtime-api" +version = "1.7.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1bfb12502f3fc46cca1bb51ac28df9d618d813cdc3d2f25b9fe775a34af26bb3" +checksum = "92165296a47a812b267b4f41032ff8069ab7ff783696d217f0994a0d7ab585cd" dependencies = [ - "generic-array", - "rand_core", - "typenum", + "aws-smithy-async", + "aws-smithy-types", + "bytes", + "http 0.2.12", + "http 1.2.0", + "pin-project-lite", + "tokio", + "tracing", + "zeroize", ] [[package]] -name = "ctr" -version = "0.9.2" +name = "aws-smithy-types" +version = "1.2.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0369ee1ad671834580515889b80f2ea915f23b8be8d0daa4bbaf2ac5c7590835" +checksum = "a28f6feb647fb5e0d5b50f0472c19a7db9462b74e2fec01bb0b44eedcc834e97" dependencies = [ - "cipher", + "base64-simd", + "bytes", + "bytes-utils", + "futures-core", + "http 0.2.12", + "http 1.2.0", + "http-body 0.4.6", + "http-body 1.0.1", + "http-body-util", + "itoa", + "num-integer", + "pin-project-lite", + "pin-utils", + "ryu", + "serde", + "time", + "tokio", + "tokio-util", ] [[package]] -name = "curve25519-dalek" -version = "4.1.3" +name = "aws-smithy-xml" +version = "0.60.9" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "97fb8b7c4503de7d6ae7b42ab72a5a59857b4c937ec27a3d4539dba95b5ab2be" +checksum = "ab0b0166827aa700d3dc519f72f8b3a91c35d0b8d042dc5d643a91e6f80648fc" dependencies = [ - "cfg-if", - "cpufeatures", - "curve25519-dalek-derive", - "digest", - "fiat-crypto", - "rustc_version", - "subtle", - "zeroize", + "xmlparser", ] [[package]] -name = "curve25519-dalek-derive" -version = "0.1.1" +name = "aws-types" +version = "1.3.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f46882e17999c6cc590af592290432be3bce0428cb0d5f8b6715e4dc7b383eb3" +checksum = "b0df5a18c4f951c645300d365fec53a61418bcf4650f604f85fe2a665bfaa0c2" dependencies = [ - "proc-macro2", - "quote", - "syn", + "aws-credential-types", + "aws-smithy-async", + "aws-smithy-runtime-api", + "aws-smithy-types", + "rustc_version", + "tracing", ] [[package]] -name = "der" +name = "axum" version = "0.7.9" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f55bf8e7b65898637379c1b74eb1551107c8294ed26d855ceb9fd1a09cfc9bc0" +checksum = "edca88bc138befd0323b20752846e6587272d3b03b0343c8ea28a6f819e6e71f" dependencies = [ - "const-oid", - "pem-rfc7468", - "zeroize", + "async-trait", + "axum-core", + "bytes", + "futures-util", + "http 1.2.0", + "http-body 1.0.1", + "http-body-util", + "itoa", + "matchit", + "memchr", + "mime", + "percent-encoding", + "pin-project-lite", + "rustversion", + "serde", + "sync_wrapper", + "tower 0.5.2", + "tower-layer", + "tower-service", ] [[package]] -name = "digest" -version = "0.10.7" +name = "axum-core" +version = "0.4.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" +checksum = "09f2bd6146b97ae3359fa0cc6d6b376d9539582c7b4220f041a33ec24c226199" dependencies = [ - "block-buffer", - "const-oid", - "crypto-common", + "async-trait", + "bytes", + "futures-util", + "http 1.2.0", + "http-body 1.0.1", + "http-body-util", + "mime", + "pin-project-lite", + "rustversion", + "sync_wrapper", + "tower-layer", + "tower-service", ] [[package]] -name = "ed25519" -version = "2.2.3" +name = "azure_core" +version = "0.21.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "115531babc129696a58c64a4fef0a8bf9e9698629fb97e9e40767d235cfbcd53" +checksum = "7b552ad43a45a746461ec3d3a51dfb6466b4759209414b439c165eb6a6b7729e" dependencies = [ - "pkcs8", - "signature", + "async-trait", + "base64 0.22.1", + "bytes", + "dyn-clone", + "futures", + "getrandom 0.2.15", + "http-types", + "once_cell", + "paste", + "pin-project", + "rand 0.8.5", + "reqwest", + "rustc_version", + "serde", + "serde_json", + "time", + "tracing", + "url", + "uuid", ] [[package]] -name = "ed25519-dalek" -version = "2.1.1" +name = "azure_security_keyvault" +version = "0.21.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4a3daa8e81a3963a60642bcc1f90a670680bd4a77535faa384e9d1c79d620871" +checksum = "bd94f507b75349a0e381c0a23bd77cc654fb509f0e6797ce4f99dd959d9e2d68" dependencies = [ - "curve25519-dalek", - "ed25519", + "async-trait", + "azure_core", + "futures", "serde", - "sha2", - "subtle", - "zeroize", + "serde_json", + "time", ] [[package]] -name = "env_filter" -version = "0.1.3" +name = "backtrace" +version = "0.3.74" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "186e05a59d4c50738528153b83b0b0194d3a29507dfec16eccd4b342903397d0" +checksum = "8d82cb332cdfaed17ae235a638438ac4d4839913cc2af585c3c6746e8f8bee1a" dependencies = [ - "log", - "regex", + "addr2line", + "cfg-if", + "libc", + "miniz_oxide", + "object", + "rustc-demangle", + "windows-targets", ] [[package]] -name = "env_logger" -version = "0.11.6" +name = "base64" +version = "0.13.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dcaee3d8e3cfc3fd92428d477bc97fc29ec8716d180c0d74c643bb26166660e0" -dependencies = [ - "anstream", - "anstyle", - "env_filter", - "humantime", - "log", -] +checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8" [[package]] -name = "fiat-crypto" -version = "0.2.9" +name = "base64" +version = "0.21.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "28dea519a9695b9977216879a3ebfddf92f1c08c05d984f8996aecd6ecdc811d" +checksum = "9d297deb1925b89f2ccc13d7635fa0714f12c87adce1c75356b39ca9b7178567" [[package]] -name = "figlet-rs" -version = "0.1.5" +name = "base64" +version = "0.22.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4742a071cd9694fc86f9fa1a08fa3e53d40cc899d7ee532295da2d085639fbc5" +checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6" [[package]] -name = "generic-array" -version = "0.14.7" +name = "base64-simd" +version = "0.8.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "85649ca51fd72272d7821adaf274ad91c288277713d9c18820d8499a7ff69e9a" +checksum = "339abbe78e73178762e23bea9dfd08e697eb3f3301cd4be981c0f78ba5859195" dependencies = [ + "outref", + "vsimd", +] + +[[package]] +name = "base64ct" +version = "1.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8c3c1a368f70d6cf7302d78f8f7093da241fb8e8807c05cc9e51a125895a6d5b" + +[[package]] +name = "bitflags" +version = "2.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f68f53c83ab957f72c32642f3868eec03eb974d1fb82e453128456482613d36" + +[[package]] +name = "block-buffer" +version = "0.10.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3078c7629b62d3f0439517fa394996acacc5cbc91c5a20d8c658e77abd503a71" +dependencies = [ + "generic-array", +] + +[[package]] +name = "bumpalo" +version = "3.16.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "79296716171880943b8470b5f8d03aa55eb2e645a4874bdbb28adb49162e012c" + +[[package]] +name = "byteorder" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" + +[[package]] +name = "bytes" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "325918d6fe32f23b19878fe4b34794ae41fc19ddbe53b10571a4874d44ffd39b" + +[[package]] +name = "bytes-utils" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7dafe3a8757b027e2be6e4e5601ed563c55989fcf1546e933c66c8eb3a058d35" +dependencies = [ + "bytes", + "either", +] + +[[package]] +name = "cc" +version = "1.2.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13208fcbb66eaeffe09b99fffbe1af420f00a7b35aa99ad683dfc1aa76145229" +dependencies = [ + "shlex", +] + +[[package]] +name = "cfg-if" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" + +[[package]] +name = "chrono" +version = "0.4.39" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7e36cc9d416881d2e24f9a963be5fb1cd90966419ac844274161d10488b3e825" +dependencies = [ + "android-tzdata", + "iana-time-zone", + "js-sys", + "num-traits", + "wasm-bindgen", + "windows-targets", +] + +[[package]] +name = "cipher" +version = "0.4.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "773f3b9af64447d2ce9850330c473515014aa235e6a783b02db81ff39e4a3dad" +dependencies = [ + "crypto-common", + "inout", +] + +[[package]] +name = "colorchoice" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b63caa9aa9397e2d9480a9b13673856c78d8ac123288526c37d7839f2a86990" + +[[package]] +name = "colored" +version = "3.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fde0e0ec90c9dfb3b4b1a0891a7dcd0e2bffde2f7efed5fe7c9bb00e5bfb915e" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "concurrent-queue" +version = "2.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4ca0197aee26d1ae37445ee532fefce43251d24cc7c166799f4d46817f1d3973" +dependencies = [ + "crossbeam-utils", +] + +[[package]] +name = "const-oid" +version = "0.9.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c2459377285ad874054d797f3ccebf984978aa39129f6eafde5cdc8315b612f8" + +[[package]] +name = "core-foundation" +version = "0.9.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "91e195e091a93c46f7102ec7818a2aa394e1e1771c3ab4825963fa03e45afb8f" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "core-foundation-sys" +version = "0.8.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "773648b94d0e5d620f64f280777445740e61fe701025087ec8b57f45c791888b" + +[[package]] +name = "cpufeatures" +version = "0.2.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "16b80225097f2e5ae4e7179dd2266824648f3e2f49d9134d584b76389d31c4c3" +dependencies = [ + "libc", +] + +[[package]] +name = "crc32c" +version = "0.6.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3a47af21622d091a8f0fb295b88bc886ac74efcc613efc19f5d0b21de5c89e47" +dependencies = [ + "rustc_version", +] + +[[package]] +name = "crc32fast" +version = "1.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a97769d94ddab943e4510d138150169a2758b5ef3eb191a9ee688de3e23ef7b3" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "crossbeam-utils" +version = "0.8.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0a5c400df2834b80a4c3327b3aad3a4c4cd4de0629063962b03235697506a28" + +[[package]] +name = "crypto-common" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1bfb12502f3fc46cca1bb51ac28df9d618d813cdc3d2f25b9fe775a34af26bb3" +dependencies = [ + "generic-array", + "rand_core 0.6.4", "typenum", - "version_check", ] [[package]] -name = "getrandom" -version = "0.2.15" +name = "ctr" +version = "0.9.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0369ee1ad671834580515889b80f2ea915f23b8be8d0daa4bbaf2ac5c7590835" +dependencies = [ + "cipher", +] + +[[package]] +name = "curve25519-dalek" +version = "4.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "97fb8b7c4503de7d6ae7b42ab72a5a59857b4c937ec27a3d4539dba95b5ab2be" +dependencies = [ + "cfg-if", + "cpufeatures", + "curve25519-dalek-derive", + "digest", + "fiat-crypto", + "rustc_version", + "subtle", + "zeroize", +] + +[[package]] +name = "curve25519-dalek-derive" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f46882e17999c6cc590af592290432be3bce0428cb0d5f8b6715e4dc7b383eb3" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "der" +version = "0.7.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f55bf8e7b65898637379c1b74eb1551107c8294ed26d855ceb9fd1a09cfc9bc0" +dependencies = [ + "const-oid", + "pem-rfc7468", + "zeroize", +] + +[[package]] +name = "deranged" +version = "0.3.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b42b6fa04a440b495c8b04d0e71b707c585f83cb9cb28cf8cd0d976c315e31b4" +dependencies = [ + "powerfmt", + "serde", +] + +[[package]] +name = "digest" +version = "0.10.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" +dependencies = [ + "block-buffer", + "const-oid", + "crypto-common", + "subtle", +] + +[[package]] +name = "displaydoc" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "97369cbbc041bc366949bc74d34658d6cda5621039731c6310521892a3a20ae0" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "dyn-clone" +version = "1.0.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0d6ef0072f8a535281e4876be788938b528e9a1d43900b82c2569af7da799125" + +[[package]] +name = "ed25519" +version = "2.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "115531babc129696a58c64a4fef0a8bf9e9698629fb97e9e40767d235cfbcd53" +dependencies = [ + "pkcs8", + "signature", +] + +[[package]] +name = "ed25519-dalek" +version = "2.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4a3daa8e81a3963a60642bcc1f90a670680bd4a77535faa384e9d1c79d620871" +dependencies = [ + "curve25519-dalek", + "ed25519", + "serde", + "sha2", + "subtle", + "zeroize", +] + +[[package]] +name = "either" +version = "1.13.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "60b1af1c220855b6ceac025d3f6ecdd2b7c4894bfe9cd9bda4fbb4bc7c0d4cf0" + +[[package]] +name = "encoding_rs" +version = "0.8.35" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "75030f3c4f45dafd7586dd6780965a8c7e8e285a5ecb86713e63a79c5b2766f3" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "env_filter" +version = "0.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "186e05a59d4c50738528153b83b0b0194d3a29507dfec16eccd4b342903397d0" +dependencies = [ + "log", + "regex", +] + +[[package]] +name = "env_logger" +version = "0.11.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dcaee3d8e3cfc3fd92428d477bc97fc29ec8716d180c0d74c643bb26166660e0" +dependencies = [ + "anstream", + "anstyle", + "env_filter", + "humantime", + "log", +] + +[[package]] +name = "equivalent" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5443807d6dff69373d433ab9ef5378ad8df50ca6298caf15de6e52e24aaf54d5" + +[[package]] +name = "errno" +version = "0.3.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "33d852cb9b869c2a9b3df2f71a3074817f01e1844f839a144f5fcef059a4eb5d" +dependencies = [ + "libc", + "windows-sys 0.59.0", +] + +[[package]] +name = "event-listener" +version = "2.5.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0206175f82b8d6bf6652ff7d71a1e27fd2e4efde587fd368662814d6ec1d9ce0" + +[[package]] +name = "fastrand" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e51093e27b0797c359783294ca4f0a911c270184cb10f85783b118614a1501be" +dependencies = [ + "instant", +] + +[[package]] +name = "fastrand" +version = "2.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "37909eebbb50d72f9059c3b6d82c0463f2ff062c9e95845c43a6c9c0355411be" + +[[package]] +name = "fiat-crypto" +version = "0.2.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "28dea519a9695b9977216879a3ebfddf92f1c08c05d984f8996aecd6ecdc811d" + +[[package]] +name = "figlet-rs" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4742a071cd9694fc86f9fa1a08fa3e53d40cc899d7ee532295da2d085639fbc5" + +[[package]] +name = "flate2" +version = "1.0.35" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c936bfdafb507ebbf50b8074c54fa31c5be9a1e7e5f467dd659697041407d07c" +dependencies = [ + "crc32fast", + "miniz_oxide", +] + +[[package]] +name = "fnv" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" + +[[package]] +name = "foreign-types" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f6f339eb8adc052cd2ca78910fda869aefa38d22d5cb648e6485e4d3fc06f3b1" +dependencies = [ + "foreign-types-shared", +] + +[[package]] +name = "foreign-types-shared" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "00b0228411908ca8685dba7fc2cdd70ec9990a6e753e89b6ac91a84c40fbaf4b" + +[[package]] +name = "form_urlencoded" +version = "1.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e13624c2627564efccf4934284bdd98cbaa14e79b0b5a141218e507b3a823456" +dependencies = [ + "percent-encoding", +] + +[[package]] +name = "futures" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "65bc07b1a8bc7c85c5f2e110c476c7389b4554ba72af57d8445ea63a576b0876" +dependencies = [ + "futures-channel", + "futures-core", + "futures-executor", + "futures-io", + "futures-sink", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-channel" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2dff15bf788c671c1934e366d07e30c1814a8ef514e1af724a602e8a2fbe1b10" +dependencies = [ + "futures-core", + "futures-sink", +] + +[[package]] +name = "futures-core" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "05f29059c0c2090612e8d742178b0580d2dc940c837851ad723096f87af6663e" + +[[package]] +name = "futures-executor" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e28d1d997f585e54aebc3f97d39e72338912123a67330d723fdbb564d646c9f" +dependencies = [ + "futures-core", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-io" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9e5c1b78ca4aae1ac06c48a526a655760685149f0d465d21f37abfe57ce075c6" + +[[package]] +name = "futures-lite" +version = "1.13.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49a9d51ce47660b1e808d3c990b4709f2f415d928835a17dfd16991515c46bce" +dependencies = [ + "fastrand 1.9.0", + "futures-core", + "futures-io", + "memchr", + "parking", + "pin-project-lite", + "waker-fn", +] + +[[package]] +name = "futures-macro" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "162ee34ebcb7c64a8abebc059ce0fee27c2262618d7b60ed8faf72fef13c3650" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "futures-sink" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e575fab7d1e0dcb8d0c7bcf9a63ee213816ab51902e6d244a95819acacf1d4f7" + +[[package]] +name = "futures-task" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f90f7dce0722e95104fcb095585910c0977252f286e354b5e3bd38902cd99988" + +[[package]] +name = "futures-util" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9fa08315bb612088cc391249efdc3bc77536f16c91f6cf495e6fbe85b20a4a81" +dependencies = [ + "futures-channel", + "futures-core", + "futures-io", + "futures-macro", + "futures-sink", + "futures-task", + "memchr", + "pin-project-lite", + "pin-utils", + "slab", +] + +[[package]] +name = "generic-array" +version = "0.14.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85649ca51fd72272d7821adaf274ad91c288277713d9c18820d8499a7ff69e9a" +dependencies = [ + "typenum", + "version_check", +] + +[[package]] +name = "getrandom" +version = "0.1.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8fc3cb4d91f53b50155bdcfd23f6a4c39ae1969c2ae85982b135750cccaf5fce" +dependencies = [ + "cfg-if", + "libc", + "wasi 0.9.0+wasi-snapshot-preview1", +] + +[[package]] +name = "getrandom" +version = "0.2.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4567c8db10ae91089c99af84c68c38da3ec2f087c3f82960bcdbf3656b6f4d7" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "wasi 0.11.0+wasi-snapshot-preview1", + "wasm-bindgen", +] + +[[package]] +name = "ghash" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f0d8a4362ccb29cb0b265253fb0a2728f592895ee6854fd9bc13f2ffda266ff1" +dependencies = [ + "opaque-debug", + "polyval", +] + +[[package]] +name = "gimli" +version = "0.31.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07e28edb80900c19c28f1072f2e8aeca7fa06b23cd4169cefe1af5aa3260783f" + +[[package]] +name = "google-cloud-auth" +version = "0.17.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e57a13fbacc5e9c41ded3ad8d0373175a6b7a6ad430d99e89d314ac121b7ab06" +dependencies = [ + "async-trait", + "base64 0.21.7", + "google-cloud-metadata", + "google-cloud-token", + "home", + "jsonwebtoken", + "reqwest", + "serde", + "serde_json", + "thiserror 1.0.69", + "time", + "tokio", + "tracing", + "urlencoding", +] + +[[package]] +name = "google-cloud-gax" +version = "0.19.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de13e62d7e0ffc3eb40a0113ddf753cf6ec741be739164442b08893db4f9bfca" +dependencies = [ + "google-cloud-token", + "http 1.2.0", + "thiserror 1.0.69", + "tokio", + "tokio-retry2", + "tonic", + "tower 0.4.13", + "tracing", +] + +[[package]] +name = "google-cloud-googleapis" +version = "0.16.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0edfdfb507593d47605b3bb2fb36628b391e3d397e520b85852dea2412c8e2d1" +dependencies = [ + "prost", + "prost-types", + "tonic", +] + +[[package]] +name = "google-cloud-kms" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e8842723521d34b9bf43305c84fd469c4d1858c42a630e1cb8c0d9c53781551" +dependencies = [ + "google-cloud-auth", + "google-cloud-gax", + "google-cloud-googleapis", + "google-cloud-token", + "prost-types", + "serde", + "serde_json", + "thiserror 1.0.69", + "tracing", +] + +[[package]] +name = "google-cloud-metadata" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "04f945a208886a13d07636f38fb978da371d0abc3e34bad338124b9f8c135a8f" +dependencies = [ + "reqwest", + "thiserror 1.0.69", + "tokio", +] + +[[package]] +name = "google-cloud-token" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f49c12ba8b21d128a2ce8585955246977fbce4415f680ebf9199b6f9d6d725f" +dependencies = [ + "async-trait", +] + +[[package]] +name = "h2" +version = "0.3.26" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "81fe527a889e1532da5c525686d96d4c2e74cdd345badf8dfef9f6b39dd5f5e8" +dependencies = [ + "bytes", + "fnv", + "futures-core", + "futures-sink", + "futures-util", + "http 0.2.12", + "indexmap 2.7.1", + "slab", + "tokio", + "tokio-util", + "tracing", +] + +[[package]] +name = "h2" +version = "0.4.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ccae279728d634d083c00f6099cb58f01cc99c145b84b8be2f6c74618d79922e" +dependencies = [ + "atomic-waker", + "bytes", + "fnv", + "futures-core", + "futures-sink", + "http 1.2.0", + "indexmap 2.7.1", + "slab", + "tokio", + "tokio-util", + "tracing", +] + +[[package]] +name = "hashbrown" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8a9ee70c43aaf417c914396645a0fa852624801b24ebb7ae78fe8272889ac888" + +[[package]] +name = "hashbrown" +version = "0.15.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bf151400ff0baff5465007dd2f3e717f3fe502074ca563069ce3a6629d07b289" + +[[package]] +name = "hex" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70" + +[[package]] +name = "hmac" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6c49c37c09c17a53d937dfbb742eb3a961d65a994e6bcdcf37e7399d0cc8ab5e" +dependencies = [ + "digest", +] + +[[package]] +name = "home" +version = "0.5.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589533453244b0995c858700322199b2becb13b627df2851f64a2775d024abcf" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "http" +version = "0.2.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "601cbb57e577e2f5ef5be8e7b83f0f63994f25aa94d673e54a92d5c516d101f1" +dependencies = [ + "bytes", + "fnv", + "itoa", +] + +[[package]] +name = "http" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f16ca2af56261c99fba8bac40a10251ce8188205a4c448fbb745a2e4daa76fea" +dependencies = [ + "bytes", + "fnv", + "itoa", +] + +[[package]] +name = "http-body" +version = "0.4.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7ceab25649e9960c0311ea418d17bee82c0dcec1bd053b5f9a66e265a693bed2" +dependencies = [ + "bytes", + "http 0.2.12", + "pin-project-lite", +] + +[[package]] +name = "http-body" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1efedce1fb8e6913f23e0c92de8e62cd5b772a67e7b3946df930a62566c93184" +dependencies = [ + "bytes", + "http 1.2.0", +] + +[[package]] +name = "http-body-util" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "793429d76616a256bcb62c2a2ec2bed781c8307e797e2598c50010f2bee2544f" +dependencies = [ + "bytes", + "futures-util", + "http 1.2.0", + "http-body 1.0.1", + "pin-project-lite", +] + +[[package]] +name = "http-types" +version = "2.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e9b187a72d63adbfba487f48095306ac823049cb504ee195541e91c7775f5ad" +dependencies = [ + "anyhow", + "async-channel", + "base64 0.13.1", + "futures-lite", + "infer", + "pin-project-lite", + "rand 0.7.3", + "serde", + "serde_json", + "serde_qs", + "serde_urlencoded", + "url", +] + +[[package]] +name = "httparse" +version = "1.9.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7d71d3574edd2771538b901e6549113b4006ece66150fb69c0fb6d9a2adae946" + +[[package]] +name = "httpdate" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df3b46402a9d5adb4c86a0cf463f42e19994e3ee891101b1841f30a545cb49a9" + +[[package]] +name = "humantime" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9a3a5bfb195931eeb336b2a7b4d761daec841b97f947d34394601737a7bba5e4" + +[[package]] +name = "hyper" +version = "0.14.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "41dfc780fdec9373c01bae43289ea34c972e40ee3c9f6b3c8801a35f35586ce7" +dependencies = [ + "bytes", + "futures-channel", + "futures-core", + "futures-util", + "h2 0.3.26", + "http 0.2.12", + "http-body 0.4.6", + "httparse", + "httpdate", + "itoa", + "pin-project-lite", + "socket2", + "tokio", + "tower-service", + "tracing", + "want", +] + +[[package]] +name = "hyper" +version = "1.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "256fb8d4bd6413123cc9d91832d78325c48ff41677595be797d90f42969beae0" +dependencies = [ + "bytes", + "futures-channel", + "futures-util", + "h2 0.4.7", + "http 1.2.0", + "http-body 1.0.1", + "httparse", + "httpdate", + "itoa", + "pin-project-lite", + "smallvec", + "tokio", + "want", +] + +[[package]] +name = "hyper-rustls" +version = "0.24.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec3efd23720e2049821a693cbc7e65ea87c72f1c58ff2f9522ff332b1491e590" +dependencies = [ + "futures-util", + "http 0.2.12", + "hyper 0.14.32", + "log", + "rustls 0.21.12", + "rustls-native-certs", + "tokio", + "tokio-rustls 0.24.1", +] + +[[package]] +name = "hyper-timeout" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b90d566bffbce6a75bd8b09a05aa8c2cb1fabb6cb348f8840c9e4c90a0d83b0" +dependencies = [ + "hyper 1.5.2", + "hyper-util", + "pin-project-lite", + "tokio", + "tower-service", +] + +[[package]] +name = "hyper-tls" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "70206fc6890eaca9fde8a0bf71caa2ddfc9fe045ac9e5c70df101a7dbde866e0" +dependencies = [ + "bytes", + "http-body-util", + "hyper 1.5.2", + "hyper-util", + "native-tls", + "tokio", + "tokio-native-tls", + "tower-service", +] + +[[package]] +name = "hyper-util" +version = "0.1.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df2dcfbe0677734ab2f3ffa7fa7bfd4706bfdc1ef393f2ee30184aed67e631b4" +dependencies = [ + "bytes", + "futures-channel", + "futures-util", + "http 1.2.0", + "http-body 1.0.1", + "hyper 1.5.2", + "pin-project-lite", + "socket2", + "tokio", + "tower-service", + "tracing", +] + +[[package]] +name = "iana-time-zone" +version = "0.1.61" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "235e081f3925a06703c2d0117ea8b91f042756fd6e7a6e5d901e8ca1a996b220" +dependencies = [ + "android_system_properties", + "core-foundation-sys", + "iana-time-zone-haiku", + "js-sys", + "wasm-bindgen", + "windows-core", +] + +[[package]] +name = "iana-time-zone-haiku" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f31827a206f56af32e590ba56d5d2d085f558508192593743f16b2306495269f" +dependencies = [ + "cc", +] + +[[package]] +name = "icu_collections" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "db2fa452206ebee18c4b5c2274dbf1de17008e874b4dc4f0aea9d01ca79e4526" +dependencies = [ + "displaydoc", + "yoke", + "zerofrom", + "zerovec", +] + +[[package]] +name = "icu_locid" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13acbb8371917fc971be86fc8057c41a64b521c184808a698c02acc242dbf637" +dependencies = [ + "displaydoc", + "litemap", + "tinystr", + "writeable", + "zerovec", +] + +[[package]] +name = "icu_locid_transform" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "01d11ac35de8e40fdeda00d9e1e9d92525f3f9d887cdd7aa81d727596788b54e" +dependencies = [ + "displaydoc", + "icu_locid", + "icu_locid_transform_data", + "icu_provider", + "tinystr", + "zerovec", +] + +[[package]] +name = "icu_locid_transform_data" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fdc8ff3388f852bede6b579ad4e978ab004f139284d7b28715f773507b946f6e" + +[[package]] +name = "icu_normalizer" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "19ce3e0da2ec68599d193c93d088142efd7f9c5d6fc9b803774855747dc6a84f" +dependencies = [ + "displaydoc", + "icu_collections", + "icu_normalizer_data", + "icu_properties", + "icu_provider", + "smallvec", + "utf16_iter", + "utf8_iter", + "write16", + "zerovec", +] + +[[package]] +name = "icu_normalizer_data" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f8cafbf7aa791e9b22bec55a167906f9e1215fd475cd22adfcf660e03e989516" + +[[package]] +name = "icu_properties" +version = "1.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "93d6020766cfc6302c15dbbc9c8778c37e62c14427cb7f6e601d849e092aeef5" +dependencies = [ + "displaydoc", + "icu_collections", + "icu_locid_transform", + "icu_properties_data", + "icu_provider", + "tinystr", + "zerovec", +] + +[[package]] +name = "icu_properties_data" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67a8effbc3dd3e4ba1afa8ad918d5684b8868b3b26500753effea8d2eed19569" + +[[package]] +name = "icu_provider" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6ed421c8a8ef78d3e2dbc98a973be2f3770cb42b606e3ab18d6237c4dfde68d9" +dependencies = [ + "displaydoc", + "icu_locid", + "icu_provider_macros", + "stable_deref_trait", + "tinystr", + "writeable", + "yoke", + "zerofrom", + "zerovec", +] + +[[package]] +name = "icu_provider_macros" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ec89e9337638ecdc08744df490b221a7399bf8d164eb52a665454e60e075ad6" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "idna" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "686f825264d630750a544639377bae737628043f20d38bbc029e8f29ea968a7e" +dependencies = [ + "idna_adapter", + "smallvec", + "utf8_iter", +] + +[[package]] +name = "idna_adapter" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "daca1df1c957320b2cf139ac61e7bd64fed304c5040df000a745aa1de3b4ef71" +dependencies = [ + "icu_normalizer", + "icu_properties", +] + +[[package]] +name = "indexmap" +version = "1.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bd070e393353796e801d209ad339e89596eb4c8d430d18ede6a1cced8fafbd99" +dependencies = [ + "autocfg", + "hashbrown 0.12.3", +] + +[[package]] +name = "indexmap" +version = "2.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8c9c992b02b5b4c94ea26e32fe5bccb7aa7d9f390ab5c1221ff895bc7ea8b652" +dependencies = [ + "equivalent", + "hashbrown 0.15.2", +] + +[[package]] +name = "infer" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "64e9829a50b42bb782c1df523f78d332fe371b10c661e78b7a3c34b0198e9fac" + +[[package]] +name = "inout" +version = "0.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a0c10553d664a4d0bcff9f4215d0aac67a639cc68ef660840afe309b807bc9f5" +dependencies = [ + "generic-array", +] + +[[package]] +name = "instant" +version = "0.1.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e0242819d153cba4b4b05a5a8f2a7e9bbf97b6055b2a002b395c96b5ff3c0222" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "ipnet" +version = "2.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "469fb0b9cefa57e3ef31275ee7cacb78f2fdca44e4765491884a2b119d4eb130" + +[[package]] +name = "is_terminal_polyfill" +version = "1.70.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7943c866cc5cd64cbc25b2e01621d07fa8eb2a1a23160ee81ce38704e97b8ecf" + +[[package]] +name = "itertools" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ba291022dbbd398a455acf126c1e341954079855bc60dfdda641363bd6922569" +dependencies = [ + "either", +] + +[[package]] +name = "itoa" +version = "1.0.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d75a2a4b1b190afb6f5425f10f6a8f959d2ea0b9c2b1d79553551850539e4674" + +[[package]] +name = "js-sys" +version = "0.3.77" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1cfaf33c695fc6e08064efbc1f72ec937429614f25eef83af942d0e227c3a28f" +dependencies = [ + "once_cell", + "wasm-bindgen", +] + +[[package]] +name = "jsonwebtoken" +version = "9.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9ae10193d25051e74945f1ea2d0b42e03cc3b890f7e4cc5faa44997d808193f" +dependencies = [ + "base64 0.21.7", + "js-sys", + "pem", + "ring", + "serde", + "serde_json", + "simple_asn1", +] + +[[package]] +name = "lazy_static" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe" +dependencies = [ + "spin", +] + +[[package]] +name = "libc" +version = "0.2.169" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b5aba8db14291edd000dfcc4d620c7ebfb122c613afb886ca8803fa4e128a20a" + +[[package]] +name = "libm" +version = "0.2.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8355be11b20d696c8f18f6cc018c4e372165b1fa8126cef092399c9951984ffa" + +[[package]] +name = "linux-raw-sys" +version = "0.4.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d26c52dbd32dccf2d10cac7725f8eae5296885fb5703b261f7d0a0739ec807ab" + +[[package]] +name = "litemap" +version = "0.7.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4ee93343901ab17bd981295f2cf0026d4ad018c7c31ba84549a4ddbb47a45104" + +[[package]] +name = "lock_api" +version = "0.4.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07af8b9cdd281b7915f413fa73f29ebd5d55d0d3f0155584dade1ff18cea1b17" +dependencies = [ + "autocfg", + "scopeguard", +] + +[[package]] +name = "log" +version = "0.4.25" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "04cbf5b083de1c7e0222a7a51dbfdba1cbe1c6ab0b15e29fff3f6c077fd9cd9f" + +[[package]] +name = "matchit" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0e7465ac9959cc2b1404e8e2367b43684a6d13790fe23056cc8c6c5a6b7bcb94" + +[[package]] +name = "memchr" +version = "2.7.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" + +[[package]] +name = "mime" +version = "0.3.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6877bb514081ee2a7ff5ef9de3281f14a4dd4bceac4c09388074a6b5df8a139a" + +[[package]] +name = "miniz_oxide" +version = "0.8.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b8402cab7aefae129c6977bb0ff1b8fd9a04eb5b51efc50a70bea51cda0c7924" +dependencies = [ + "adler2", +] + +[[package]] +name = "mio" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2886843bf800fba2e3377cff24abf6379b4c4d5c6681eaf9ea5b0d15090450bd" +dependencies = [ + "libc", + "wasi 0.11.0+wasi-snapshot-preview1", + "windows-sys 0.52.0", +] + +[[package]] +name = "native-tls" +version = "0.2.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a8614eb2c83d59d1c8cc974dd3f920198647674a0a035e1af1fa58707e317466" +dependencies = [ + "libc", + "log", + "openssl", + "openssl-probe", + "openssl-sys", + "schannel", + "security-framework", + "security-framework-sys", + "tempfile", +] + +[[package]] +name = "num-bigint" +version = "0.4.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a5e44f723f1133c9deac646763579fdb3ac745e418f2a7af9cd0c431da1f20b9" +dependencies = [ + "num-integer", + "num-traits", +] + +[[package]] +name = "num-bigint-dig" +version = "0.8.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc84195820f291c7697304f3cbdadd1cb7199c0efc917ff5eafd71225c136151" +dependencies = [ + "byteorder", + "lazy_static", + "libm", + "num-integer", + "num-iter", + "num-traits", + "rand 0.8.5", + "smallvec", + "zeroize", +] + +[[package]] +name = "num-conv" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "51d515d32fb182ee37cda2ccdcb92950d6a3c2893aa280e540671c2cd0f3b1d9" + +[[package]] +name = "num-integer" +version = "0.1.46" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7969661fd2958a5cb096e56c8e1ad0444ac2bbcd0061bd28660485a44879858f" +dependencies = [ + "num-traits", +] + +[[package]] +name = "num-iter" +version = "0.1.45" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1429034a0490724d0075ebb2bc9e875d6503c3cf69e235a8941aa757d83ef5bf" +dependencies = [ + "autocfg", + "num-integer", + "num-traits", +] + +[[package]] +name = "num-traits" +version = "0.2.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841" +dependencies = [ + "autocfg", + "libm", +] + +[[package]] +name = "object" +version = "0.36.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "62948e14d923ea95ea2c7c86c71013138b66525b86bdc08d2dcc262bdb497b87" +dependencies = [ + "memchr", +] + +[[package]] +name = "once_cell" +version = "1.20.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1261fe7e33c73b354eab43b1273a57c8f967d0391e80353e51f764ac02cf6775" + +[[package]] +name = "opaque-debug" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c08d65885ee38876c4f86fa503fb49d7b507c2b62552df7c70b2fce627e06381" + +[[package]] +name = "openssl" +version = "0.10.68" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6174bc48f102d208783c2c84bf931bb75927a617866870de8a4ea85597f871f5" +dependencies = [ + "bitflags", + "cfg-if", + "foreign-types", + "libc", + "once_cell", + "openssl-macros", + "openssl-sys", +] + +[[package]] +name = "openssl-macros" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a948666b637a0f465e8564c73e89d4dde00d72d4d473cc972f390fc3dcee7d9c" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "openssl-probe" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d05e27ee213611ffe7d6348b942e8f942b37114c00cc03cec254295a4a17852e" + +[[package]] +name = "openssl-sys" +version = "0.9.104" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "45abf306cbf99debc8195b66b7346498d7b10c210de50418b5ccd7ceba08c741" +dependencies = [ + "cc", + "libc", + "pkg-config", + "vcpkg", +] + +[[package]] +name = "outref" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1a80800c0488c3a21695ea981a54918fbb37abf04f4d0720c453632255e2ff0e" + +[[package]] +name = "parking" +version = "2.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f38d5652c16fde515bb1ecef450ab0f6a219d619a7274976324d5e377f7dceba" + +[[package]] +name = "parking_lot" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f1bf18183cf54e8d6059647fc3063646a1801cf30896933ec2311622cc4b9a27" +dependencies = [ + "lock_api", + "parking_lot_core", +] + +[[package]] +name = "parking_lot_core" +version = "0.9.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e401f977ab385c9e4e3ab30627d6f26d00e2c73eef317493c4ec6d468726cf8" +dependencies = [ + "cfg-if", + "libc", + "redox_syscall", + "smallvec", + "windows-targets", +] + +[[package]] +name = "paste" +version = "1.0.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "57c0d7b74b563b49d38dae00a0c37d4d6de9b432382b2892f0574ddcae73fd0a" + +[[package]] +name = "pem" +version = "3.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e459365e590736a54c3fa561947c84837534b8e9af6fc5bf781307e82658fae" +dependencies = [ + "base64 0.22.1", + "serde", +] + +[[package]] +name = "pem-rfc7468" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "88b39c9bfcfc231068454382784bb460aae594343fb030d46e9f50a645418412" +dependencies = [ + "base64ct", +] + +[[package]] +name = "percent-encoding" +version = "2.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3148f5046208a5d56bcfc03053e3ca6334e51da8dfb19b6cdc8b306fae3283e" + +[[package]] +name = "pin-project" +version = "1.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e2ec53ad785f4d35dac0adea7f7dc6f1bb277ad84a680c7afefeae05d1f5916" +dependencies = [ + "pin-project-internal", +] + +[[package]] +name = "pin-project-internal" +version = "1.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d56a66c0c55993aa927429d0f8a0abfd74f084e4d9c192cffed01e418d83eefb" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "pin-project-lite" +version = "0.2.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3b3cff922bd51709b605d9ead9aa71031d81447142d828eb4a6eba76fe619f9b" + +[[package]] +name = "pin-utils" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184" + +[[package]] +name = "pkcs1" +version = "0.7.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c8ffb9f10fa047879315e6625af03c164b16962a5368d724ed16323b68ace47f" +dependencies = [ + "der", + "pkcs8", + "spki", +] + +[[package]] +name = "pkcs8" +version = "0.10.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f950b2377845cebe5cf8b5165cb3cc1a5e0fa5cfa3e1f7f55707d8fd82e0a7b7" +dependencies = [ + "der", + "spki", +] + +[[package]] +name = "pkg-config" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "953ec861398dccce10c670dfeaf3ec4911ca479e9c02154b3a215178c5f566f2" + +[[package]] +name = "polyval" +version = "0.6.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9d1fe60d06143b2430aa532c94cfe9e29783047f06c0d7fd359a9a51b729fa25" +dependencies = [ + "cfg-if", + "cpufeatures", + "opaque-debug", + "universal-hash", +] + +[[package]] +name = "powerfmt" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "439ee305def115ba05938db6eb1644ff94165c5ab5e9420d1c1bcedbba909391" + +[[package]] +name = "ppv-lite86" +version = "0.2.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77957b295656769bb8ad2b6a6b09d897d94f05c41b069aede1fcdaa675eaea04" +dependencies = [ + "zerocopy", +] + +[[package]] +name = "proc-macro2" +version = "1.0.93" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "60946a68e5f9d28b0dc1c21bb8a97ee7d018a8b322fa57838ba31cc878e22d99" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "prost" +version = "0.13.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2c0fef6c4230e4ccf618a35c59d7ede15dea37de8427500f50aff708806e42ec" +dependencies = [ + "bytes", + "prost-derive", +] + +[[package]] +name = "prost-derive" +version = "0.13.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "157c5a9d7ea5c2ed2d9fb8f495b64759f7816c7eaea54ba3978f0d63000162e3" +dependencies = [ + "anyhow", + "itertools", + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "prost-types" +version = "0.13.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cc2f1e56baa61e93533aebc21af4d2134b70f66275e0fcdf3cbe43d77ff7e8fc" +dependencies = [ + "prost", +] + +[[package]] +name = "quote" +version = "1.0.38" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0e4dccaaaf89514f546c693ddc140f729f958c247918a13380cccc6078391acc" +dependencies = [ + "proc-macro2", +] + +[[package]] +name = "rand" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03" +dependencies = [ + "getrandom 0.1.16", + "libc", + "rand_chacha 0.2.2", + "rand_core 0.5.1", + "rand_hc", +] + +[[package]] +name = "rand" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" +dependencies = [ + "libc", + "rand_chacha 0.3.1", + "rand_core 0.6.4", +] + +[[package]] +name = "rand_chacha" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402" +dependencies = [ + "ppv-lite86", + "rand_core 0.5.1", +] + +[[package]] +name = "rand_chacha" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e6c10a63a0fa32252be49d21e7709d4d4baf8d231c2dbce1eaa8141b9b127d88" +dependencies = [ + "ppv-lite86", + "rand_core 0.6.4", +] + +[[package]] +name = "rand_core" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19" +dependencies = [ + "getrandom 0.1.16", +] + +[[package]] +name = "rand_core" +version = "0.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec0be4795e2f6a28069bec0b5ff3e2ac9bafc99e6a9a7dc3547996c5c816922c" +dependencies = [ + "getrandom 0.2.15", +] + +[[package]] +name = "rand_hc" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c" +dependencies = [ + "rand_core 0.5.1", +] + +[[package]] +name = "redox_syscall" +version = "0.5.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "03a862b389f93e68874fbf580b9de08dd02facb9a788ebadaf4a3fd33cf58834" +dependencies = [ + "bitflags", +] + +[[package]] +name = "regex" +version = "1.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b544ef1b4eac5dc2db33ea63606ae9ffcfac26c1416a2806ae0bf5f56b201191" +dependencies = [ + "aho-corasick", + "memchr", + "regex-automata", + "regex-syntax", +] + +[[package]] +name = "regex-automata" +version = "0.4.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "809e8dc61f6de73b46c85f4c96486310fe304c434cfa43669d7b40f711150908" +dependencies = [ + "aho-corasick", + "memchr", + "regex-syntax", +] + +[[package]] +name = "regex-lite" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "53a49587ad06b26609c52e423de037e7f57f20d53535d66e08c695f347df952a" + +[[package]] +name = "regex-syntax" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b15c43186be67a4fd63bee50d0303afffcef381492ebe2c5d87f324e1b8815c" + +[[package]] +name = "reqwest" +version = "0.12.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "43e734407157c3c2034e0258f5e4473ddb361b1e85f95a66690d67264d7cd1da" +dependencies = [ + "base64 0.22.1", + "bytes", + "encoding_rs", + "futures-core", + "futures-util", + "http 1.2.0", + "http-body 1.0.1", + "http-body-util", + "hyper 1.5.2", + "hyper-tls", + "hyper-util", + "ipnet", + "js-sys", + "log", + "mime", + "native-tls", + "once_cell", + "percent-encoding", + "pin-project-lite", + "rustls-pemfile 2.2.0", + "serde", + "serde_json", + "serde_urlencoded", + "sync_wrapper", + "tokio", + "tokio-native-tls", + "tokio-util", + "tower 0.5.2", + "tower-service", + "url", + "wasm-bindgen", + "wasm-bindgen-futures", + "wasm-streams", + "web-sys", + "windows-registry", +] + +[[package]] +name = "ring" +version = "0.17.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c17fa4cb658e3583423e915b9f3acc01cceaee1860e33d59ebae66adc3a2dc0d" +dependencies = [ + "cc", + "cfg-if", + "getrandom 0.2.15", + "libc", + "spin", + "untrusted", + "windows-sys 0.52.0", +] + +[[package]] +name = "rsa" +version = "0.9.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "47c75d7c5c6b673e58bf54d8544a9f432e3a925b0e80f7cd3602ab5c50c55519" +dependencies = [ + "const-oid", + "digest", + "num-bigint-dig", + "num-integer", + "num-traits", + "pkcs1", + "pkcs8", + "rand_core 0.6.4", + "sha2", + "signature", + "spki", + "subtle", + "zeroize", +] + +[[package]] +name = "rustc-demangle" +version = "0.1.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c4567c8db10ae91089c99af84c68c38da3ec2f087c3f82960bcdbf3656b6f4d7" +checksum = "719b953e2095829ee67db738b3bfa9fa368c94900df327b3f07fe6e794d2fe1f" + +[[package]] +name = "rustc_version" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cfcb3a22ef46e85b45de6ee7e79d063319ebb6594faafcf1c225ea92ab6e9b92" dependencies = [ - "cfg-if", + "semver", +] + +[[package]] +name = "rustix" +version = "0.38.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fdb5bc1ae2baa591800df16c9ca78619bf65c0488b41b96ccec5d11220d8c154" +dependencies = [ + "bitflags", + "errno", "libc", - "wasi", + "linux-raw-sys", + "windows-sys 0.59.0", ] [[package]] -name = "ghash" -version = "0.5.1" +name = "rustls" +version = "0.21.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f0d8a4362ccb29cb0b265253fb0a2728f592895ee6854fd9bc13f2ffda266ff1" +checksum = "3f56a14d1f48b391359b22f731fd4bd7e43c97f3c50eee276f3aa09c94784d3e" dependencies = [ - "opaque-debug", - "polyval", + "log", + "ring", + "rustls-webpki 0.101.7", + "sct", ] [[package]] -name = "gimli" -version = "0.31.1" +name = "rustls" +version = "0.23.21" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "07e28edb80900c19c28f1072f2e8aeca7fa06b23cd4169cefe1af5aa3260783f" +checksum = "8f287924602bf649d949c63dc8ac8b235fa5387d394020705b80c4eb597ce5b8" +dependencies = [ + "log", + "once_cell", + "ring", + "rustls-pki-types", + "rustls-webpki 0.102.8", + "subtle", + "zeroize", +] [[package]] -name = "humantime" -version = "2.1.0" +name = "rustls-native-certs" +version = "0.6.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9a3a5bfb195931eeb336b2a7b4d761daec841b97f947d34394601737a7bba5e4" +checksum = "a9aace74cb666635c918e9c12bc0d348266037aa8eb599b5cba565709a8dff00" +dependencies = [ + "openssl-probe", + "rustls-pemfile 1.0.4", + "schannel", + "security-framework", +] [[package]] -name = "inout" -version = "0.1.3" +name = "rustls-pemfile" +version = "1.0.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a0c10553d664a4d0bcff9f4215d0aac67a639cc68ef660840afe309b807bc9f5" +checksum = "1c74cae0a4cf6ccbbf5f359f08efdf8ee7e1dc532573bf0db71968cb56b1448c" dependencies = [ - "generic-array", + "base64 0.21.7", ] [[package]] -name = "is_terminal_polyfill" -version = "1.70.1" +name = "rustls-pemfile" +version = "2.2.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7943c866cc5cd64cbc25b2e01621d07fa8eb2a1a23160ee81ce38704e97b8ecf" +checksum = "dce314e5fee3f39953d46bb63bb8a46d40c2f8fb7cc5a3b6cab2bde9721d6e50" +dependencies = [ + "rustls-pki-types", +] [[package]] -name = "itoa" -version = "1.0.14" +name = "rustls-pki-types" +version = "1.10.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d75a2a4b1b190afb6f5425f10f6a8f959d2ea0b9c2b1d79553551850539e4674" +checksum = "d2bf47e6ff922db3825eb750c4e2ff784c6ff8fb9e13046ef6a1d1c5401b0b37" [[package]] -name = "lazy_static" -version = "1.5.0" +name = "rustls-webpki" +version = "0.101.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe" +checksum = "8b6275d1ee7a1cd780b64aca7726599a1dbc893b1e64144529e55c3c2f745765" dependencies = [ - "spin", + "ring", + "untrusted", ] [[package]] -name = "libc" -version = "0.2.169" +name = "rustls-webpki" +version = "0.102.8" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "b5aba8db14291edd000dfcc4d620c7ebfb122c613afb886ca8803fa4e128a20a" +checksum = "64ca1bc8749bd4cf37b5ce386cc146580777b4e8572c7b97baf22c83f444bee9" +dependencies = [ + "ring", + "rustls-pki-types", + "untrusted", +] [[package]] -name = "libm" -version = "0.2.11" +name = "rustversion" +version = "1.0.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8355be11b20d696c8f18f6cc018c4e372165b1fa8126cef092399c9951984ffa" +checksum = "f7c45b9784283f1b2e7fb61b42047c2fd678ef0960d4f6f1eba131594cc369d4" [[package]] -name = "lock_api" -version = "0.4.12" +name = "ryu" +version = "1.0.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "07af8b9cdd281b7915f413fa73f29ebd5d55d0d3f0155584dade1ff18cea1b17" +checksum = "f3cb5ba0dc43242ce17de99c180e96db90b235b8a9fdc9543c96d2209116bd9f" + +[[package]] +name = "schannel" +version = "0.1.27" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f29ebaa345f945cec9fbbc532eb307f0fdad8161f281b6369539c8d84876b3d" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "scopeguard" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49" + +[[package]] +name = "sct" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "da046153aa2352493d6cb7da4b6e5c0c057d8a1d0a9aa8560baffdd945acd414" +dependencies = [ + "ring", + "untrusted", +] + +[[package]] +name = "security-framework" +version = "2.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "897b2245f0b511c87893af39b033e5ca9cce68824c4d7e7630b5a1d339658d02" +dependencies = [ + "bitflags", + "core-foundation", + "core-foundation-sys", + "libc", + "security-framework-sys", +] + +[[package]] +name = "security-framework-sys" +version = "2.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49db231d56a190491cb4aeda9527f1ad45345af50b0851622a7adb8c03b01c32" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "semver" +version = "1.0.24" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3cb6eb87a131f756572d7fb904f6e7b68633f09cca868c5df1c4b8d1a694bbba" + +[[package]] +name = "serde" +version = "1.0.217" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "02fc4265df13d6fa1d00ecff087228cc0a2b5f3c0e87e258d8b94a156e984c70" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_derive" +version = "1.0.217" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a9bf7cf98d04a2b28aead066b7496853d4779c9cc183c440dbac457641e19a0" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "serde_json" +version = "1.0.135" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b0d7ba2887406110130a978386c4e1befb98c674b4fba677954e4db976630d9" +dependencies = [ + "itoa", + "memchr", + "ryu", + "serde", +] + +[[package]] +name = "serde_qs" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c7715380eec75f029a4ef7de39a9200e0a63823176b759d055b613f5a87df6a6" +dependencies = [ + "percent-encoding", + "serde", + "thiserror 1.0.69", +] + +[[package]] +name = "serde_urlencoded" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3491c14715ca2294c4d6a88f15e84739788c1d030eed8c110436aafdaa2f3fd" +dependencies = [ + "form_urlencoded", + "itoa", + "ryu", + "serde", +] + +[[package]] +name = "sha2" +version = "0.10.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "793db75ad2bcafc3ffa7c68b215fee268f537982cd901d132f89c6343f3a3dc8" +dependencies = [ + "cfg-if", + "cpufeatures", + "digest", +] + +[[package]] +name = "shlex" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64" + +[[package]] +name = "signal-hook-registry" +version = "1.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a9e9e0b4211b72e7b8b6e85c807d36c212bdb33ea8587f7569562a84df5465b1" +dependencies = [ + "libc", +] + +[[package]] +name = "signature" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77549399552de45a898a580c1b41d445bf730df867cc44e6c0233bbc4b8329de" +dependencies = [ + "digest", + "rand_core 0.6.4", +] + +[[package]] +name = "simple_asn1" +version = "0.6.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "297f631f50729c8c99b84667867963997ec0b50f32b2a7dbcab828ef0541e8bb" +dependencies = [ + "num-bigint", + "num-traits", + "thiserror 2.0.11", + "time", +] + +[[package]] +name = "slab" +version = "0.4.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f92a496fb766b417c996b9c5e57daf2f7ad3b0bebe1ccfca4856390e3d3bb67" dependencies = [ "autocfg", - "scopeguard", ] [[package]] -name = "log" -version = "0.4.25" +name = "smallvec" +version = "1.13.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67" + +[[package]] +name = "socket2" +version = "0.5.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c970269d99b64e60ec3bd6ad27270092a5394c4e309314b18ae3fe575695fbe8" +dependencies = [ + "libc", + "windows-sys 0.52.0", +] + +[[package]] +name = "spin" +version = "0.9.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6980e8d7511241f8acf4aebddbb1ff938df5eebe98691418c4468d0b72a96a67" + +[[package]] +name = "spki" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d91ed6c858b01f942cd56b37a94b3e0a1798290327d1236e4d9cf4eaca44d29d" +dependencies = [ + "base64ct", + "der", +] + +[[package]] +name = "stable_deref_trait" +version = "1.2.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "04cbf5b083de1c7e0222a7a51dbfdba1cbe1c6ab0b15e29fff3f6c077fd9cd9f" +checksum = "a8f112729512f8e442d81f95a8a7ddf2b7c6b8a1a6f509a95864142b30cab2d3" [[package]] -name = "memchr" -version = "2.7.4" +name = "subtle" +version = "2.6.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" +checksum = "13c2bddecc57b384dee18652358fb23172facb8a2c51ccc10d74c157bdea3292" [[package]] -name = "miniz_oxide" -version = "0.8.3" +name = "syn" +version = "2.0.96" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "b8402cab7aefae129c6977bb0ff1b8fd9a04eb5b51efc50a70bea51cda0c7924" +checksum = "d5d0adab1ae378d7f53bdebc67a39f1f151407ef230f0ce2883572f5d8985c80" dependencies = [ - "adler2", + "proc-macro2", + "quote", + "unicode-ident", ] [[package]] -name = "mio" -version = "1.0.3" +name = "sync_wrapper" +version = "1.0.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2886843bf800fba2e3377cff24abf6379b4c4d5c6681eaf9ea5b0d15090450bd" +checksum = "0bf256ce5efdfa370213c1dabab5935a12e49f2c58d15e9eac2870d3b4f27263" dependencies = [ - "libc", - "wasi", - "windows-sys 0.52.0", + "futures-core", ] [[package]] -name = "num-bigint-dig" -version = "0.8.4" +name = "synstructure" +version = "0.13.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dc84195820f291c7697304f3cbdadd1cb7199c0efc917ff5eafd71225c136151" +checksum = "c8af7666ab7b6390ab78131fb5b0fce11d6b7a6951602017c35fa82800708971" dependencies = [ - "byteorder", - "lazy_static", - "libm", - "num-integer", - "num-iter", - "num-traits", - "rand", - "smallvec", - "zeroize", + "proc-macro2", + "quote", + "syn", ] [[package]] -name = "num-integer" -version = "0.1.46" +name = "tempfile" +version = "3.15.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7969661fd2958a5cb096e56c8e1ad0444ac2bbcd0061bd28660485a44879858f" +checksum = "9a8a559c81686f576e8cd0290cd2a24a2a9ad80c98b3478856500fcbd7acd704" dependencies = [ - "num-traits", + "cfg-if", + "fastrand 2.3.0", + "getrandom 0.2.15", + "once_cell", + "rustix", + "windows-sys 0.59.0", ] [[package]] -name = "num-iter" -version = "0.1.45" +name = "thiserror" +version = "1.0.69" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1429034a0490724d0075ebb2bc9e875d6503c3cf69e235a8941aa757d83ef5bf" +checksum = "b6aaf5339b578ea85b50e080feb250a3e8ae8cfcdff9a461c9ec2904bc923f52" dependencies = [ - "autocfg", - "num-integer", - "num-traits", + "thiserror-impl 1.0.69", ] [[package]] -name = "num-traits" -version = "0.2.19" +name = "thiserror" +version = "2.0.11" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841" +checksum = "d452f284b73e6d76dd36758a0c8684b1d5be31f92b89d07fd5822175732206fc" dependencies = [ - "autocfg", - "libm", + "thiserror-impl 2.0.11", ] [[package]] -name = "object" -version = "0.36.7" +name = "thiserror-impl" +version = "1.0.69" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "62948e14d923ea95ea2c7c86c71013138b66525b86bdc08d2dcc262bdb497b87" +checksum = "4fee6c4efc90059e10f81e6d42c60a18f76588c3d74cb83a0b242a2b6c7504c1" dependencies = [ - "memchr", + "proc-macro2", + "quote", + "syn", ] [[package]] -name = "once_cell" -version = "1.20.2" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1261fe7e33c73b354eab43b1273a57c8f967d0391e80353e51f764ac02cf6775" - -[[package]] -name = "opaque-debug" -version = "0.3.1" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c08d65885ee38876c4f86fa503fb49d7b507c2b62552df7c70b2fce627e06381" - -[[package]] -name = "parking_lot" -version = "0.12.3" +name = "thiserror-impl" +version = "2.0.11" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f1bf18183cf54e8d6059647fc3063646a1801cf30896933ec2311622cc4b9a27" +checksum = "26afc1baea8a989337eeb52b6e72a039780ce45c3edfcc9c5b9d112feeb173c2" dependencies = [ - "lock_api", - "parking_lot_core", + "proc-macro2", + "quote", + "syn", ] [[package]] -name = "parking_lot_core" -version = "0.9.10" +name = "time" +version = "0.3.37" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1e401f977ab385c9e4e3ab30627d6f26d00e2c73eef317493c4ec6d468726cf8" +checksum = "35e7868883861bd0e56d9ac6efcaaca0d6d5d82a2a7ec8209ff492c07cf37b21" dependencies = [ - "cfg-if", - "libc", - "redox_syscall", - "smallvec", - "windows-targets", + "deranged", + "itoa", + "js-sys", + "num-conv", + "powerfmt", + "serde", + "time-core", + "time-macros", ] [[package]] -name = "pem-rfc7468" -version = "0.7.0" +name = "time-core" +version = "0.1.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "88b39c9bfcfc231068454382784bb460aae594343fb030d46e9f50a645418412" -dependencies = [ - "base64ct", -] +checksum = "ef927ca75afb808a4d64dd374f00a2adf8d0fcff8e7b184af886c3c87ec4a3f3" [[package]] -name = "pin-project-lite" -version = "0.2.16" +name = "time-macros" +version = "0.2.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3b3cff922bd51709b605d9ead9aa71031d81447142d828eb4a6eba76fe619f9b" +checksum = "2834e6017e3e5e4b9834939793b282bc03b37a3336245fa820e35e233e2a85de" +dependencies = [ + "num-conv", + "time-core", +] [[package]] -name = "pkcs1" -version = "0.7.5" +name = "tinystr" +version = "0.7.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c8ffb9f10fa047879315e6625af03c164b16962a5368d724ed16323b68ace47f" +checksum = "9117f5d4db391c1cf6927e7bea3db74b9a1c1add8f7eda9ffd5364f40f57b82f" dependencies = [ - "der", - "pkcs8", - "spki", + "displaydoc", + "zerovec", ] [[package]] -name = "pkcs8" -version = "0.10.2" +name = "tokio" +version = "1.43.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f950b2377845cebe5cf8b5165cb3cc1a5e0fa5cfa3e1f7f55707d8fd82e0a7b7" +checksum = "3d61fa4ffa3de412bfea335c6ecff681de2b609ba3c77ef3e00e521813a9ed9e" dependencies = [ - "der", - "spki", + "backtrace", + "bytes", + "libc", + "mio", + "parking_lot", + "pin-project-lite", + "signal-hook-registry", + "socket2", + "tokio-macros", + "windows-sys 0.52.0", ] [[package]] -name = "polyval" -version = "0.6.2" +name = "tokio-macros" +version = "2.5.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9d1fe60d06143b2430aa532c94cfe9e29783047f06c0d7fd359a9a51b729fa25" +checksum = "6e06d43f1345a3bcd39f6a56dbb7dcab2ba47e68e8ac134855e7e2bdbaf8cab8" dependencies = [ - "cfg-if", - "cpufeatures", - "opaque-debug", - "universal-hash", + "proc-macro2", + "quote", + "syn", ] [[package]] -name = "ppv-lite86" -version = "0.2.20" +name = "tokio-native-tls" +version = "0.3.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "77957b295656769bb8ad2b6a6b09d897d94f05c41b069aede1fcdaa675eaea04" +checksum = "bbae76ab933c85776efabc971569dd6119c580d8f5d448769dec1764bf796ef2" dependencies = [ - "zerocopy", + "native-tls", + "tokio", ] [[package]] -name = "proc-macro2" -version = "1.0.93" +name = "tokio-retry2" +version = "0.5.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "60946a68e5f9d28b0dc1c21bb8a97ee7d018a8b322fa57838ba31cc878e22d99" +checksum = "903934dba1c4c2f2e9cb460ef10b5695e0b0ecad3bf9ee7c8675e540c5e8b2d1" dependencies = [ - "unicode-ident", + "pin-project", + "tokio", ] [[package]] -name = "quote" -version = "1.0.38" +name = "tokio-rustls" +version = "0.24.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0e4dccaaaf89514f546c693ddc140f729f958c247918a13380cccc6078391acc" +checksum = "c28327cf380ac148141087fbfb9de9d7bd4e84ab5d2c28fbc911d753de8a7081" dependencies = [ - "proc-macro2", + "rustls 0.21.12", + "tokio", ] [[package]] -name = "rand" -version = "0.8.5" +name = "tokio-rustls" +version = "0.26.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" +checksum = "5f6d0975eaace0cf0fcadee4e4aaa5da15b5c079146f2cffb67c113be122bf37" dependencies = [ - "libc", - "rand_chacha", - "rand_core", + "rustls 0.23.21", + "tokio", ] [[package]] -name = "rand_chacha" -version = "0.3.1" +name = "tokio-stream" +version = "0.1.17" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "e6c10a63a0fa32252be49d21e7709d4d4baf8d231c2dbce1eaa8141b9b127d88" +checksum = "eca58d7bba4a75707817a2c44174253f9236b2d5fbd055602e9d5c07c139a047" dependencies = [ - "ppv-lite86", - "rand_core", + "futures-core", + "pin-project-lite", + "tokio", ] [[package]] -name = "rand_core" -version = "0.6.4" +name = "tokio-util" +version = "0.7.13" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ec0be4795e2f6a28069bec0b5ff3e2ac9bafc99e6a9a7dc3547996c5c816922c" +checksum = "d7fcaa8d55a2bdd6b83ace262b016eca0d79ee02818c5c1bcdf0305114081078" dependencies = [ - "getrandom", + "bytes", + "futures-core", + "futures-sink", + "pin-project-lite", + "tokio", ] [[package]] -name = "redox_syscall" -version = "0.5.8" +name = "tonic" +version = "0.12.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "03a862b389f93e68874fbf580b9de08dd02facb9a788ebadaf4a3fd33cf58834" +checksum = "877c5b330756d856ffcc4553ab34a5684481ade925ecc54bcd1bf02b1d0d4d52" dependencies = [ - "bitflags", + "async-stream", + "async-trait", + "axum", + "base64 0.22.1", + "bytes", + "flate2", + "h2 0.4.7", + "http 1.2.0", + "http-body 1.0.1", + "http-body-util", + "hyper 1.5.2", + "hyper-timeout", + "hyper-util", + "percent-encoding", + "pin-project", + "prost", + "rustls-pemfile 2.2.0", + "socket2", + "tokio", + "tokio-rustls 0.26.1", + "tokio-stream", + "tower 0.4.13", + "tower-layer", + "tower-service", + "tracing", + "webpki-roots", ] [[package]] -name = "regex" -version = "1.11.1" +name = "tower" +version = "0.4.13" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "b544ef1b4eac5dc2db33ea63606ae9ffcfac26c1416a2806ae0bf5f56b201191" +checksum = "b8fa9be0de6cf49e536ce1851f987bd21a43b771b09473c3549a6c853db37c1c" dependencies = [ - "aho-corasick", - "memchr", - "regex-automata", - "regex-syntax", + "futures-core", + "futures-util", + "indexmap 1.9.3", + "pin-project", + "pin-project-lite", + "rand 0.8.5", + "slab", + "tokio", + "tokio-util", + "tower-layer", + "tower-service", + "tracing", ] [[package]] -name = "regex-automata" -version = "0.4.9" +name = "tower" +version = "0.5.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "809e8dc61f6de73b46c85f4c96486310fe304c434cfa43669d7b40f711150908" +checksum = "d039ad9159c98b70ecfd540b2573b97f7f52c3e8d9f8ad57a24b916a536975f9" dependencies = [ - "aho-corasick", - "memchr", - "regex-syntax", + "futures-core", + "futures-util", + "pin-project-lite", + "sync_wrapper", + "tokio", + "tower-layer", + "tower-service", ] [[package]] -name = "regex-syntax" -version = "0.8.5" +name = "tower-layer" +version = "0.3.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2b15c43186be67a4fd63bee50d0303afffcef381492ebe2c5d87f324e1b8815c" +checksum = "121c2a6cda46980bb0fcd1647ffaf6cd3fc79a013de288782836f6df9c48780e" [[package]] -name = "ring" -version = "0.17.8" +name = "tower-service" +version = "0.3.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c17fa4cb658e3583423e915b9f3acc01cceaee1860e33d59ebae66adc3a2dc0d" -dependencies = [ - "cc", - "cfg-if", - "getrandom", - "libc", - "spin", - "untrusted", - "windows-sys 0.52.0", -] +checksum = "8df9b6e13f2d32c91b9bd719c00d1958837bc7dec474d94952798cc8e69eeec3" [[package]] -name = "rsa" -version = "0.9.7" +name = "tracing" +version = "0.1.41" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "47c75d7c5c6b673e58bf54d8544a9f432e3a925b0e80f7cd3602ab5c50c55519" +checksum = "784e0ac535deb450455cbfa28a6f0df145ea1bb7ae51b821cf5e7927fdcfbdd0" dependencies = [ - "const-oid", - "digest", - "num-bigint-dig", - "num-integer", - "num-traits", - "pkcs1", - "pkcs8", - "rand_core", - "sha2", - "signature", - "spki", - "subtle", - "zeroize", + "log", + "pin-project-lite", + "tracing-attributes", + "tracing-core", ] [[package]] -name = "rustc-demangle" -version = "0.1.24" +name = "tracing-attributes" +version = "0.1.28" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "719b953e2095829ee67db738b3bfa9fa368c94900df327b3f07fe6e794d2fe1f" +checksum = "395ae124c09f9e6918a2310af6038fba074bcf474ac352496d5910dd59a2226d" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] [[package]] -name = "rustc_version" -version = "0.4.1" +name = "tracing-core" +version = "0.1.33" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "cfcb3a22ef46e85b45de6ee7e79d063319ebb6594faafcf1c225ea92ab6e9b92" +checksum = "e672c95779cf947c5311f83787af4fa8fffd12fb27e4993211a84bdfd9610f9c" dependencies = [ - "semver", + "once_cell", ] [[package]] -name = "ryu" -version = "1.0.18" +name = "try-lock" +version = "0.2.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f3cb5ba0dc43242ce17de99c180e96db90b235b8a9fdc9543c96d2209116bd9f" +checksum = "e421abadd41a4225275504ea4d6566923418b7f05506fbc9c0fe86ba7396114b" [[package]] -name = "scopeguard" -version = "1.2.0" +name = "typenum" +version = "1.17.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49" +checksum = "42ff0bf0c66b8238c6f3b578df37d0b7848e55df8577b3f74f92a69acceeb825" [[package]] -name = "semver" -version = "1.0.24" +name = "unicode-ident" +version = "1.0.14" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3cb6eb87a131f756572d7fb904f6e7b68633f09cca868c5df1c4b8d1a694bbba" +checksum = "adb9e6ca4f869e1180728b7950e35922a7fc6397f7b641499e8f3ef06e50dc83" [[package]] -name = "serde" -version = "1.0.217" +name = "universal-hash" +version = "0.5.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "02fc4265df13d6fa1d00ecff087228cc0a2b5f3c0e87e258d8b94a156e984c70" +checksum = "fc1de2c688dc15305988b563c3854064043356019f97a4b46276fe734c4f07ea" dependencies = [ - "serde_derive", + "crypto-common", + "subtle", ] [[package]] -name = "serde_derive" -version = "1.0.217" +name = "untrusted" +version = "0.9.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5a9bf7cf98d04a2b28aead066b7496853d4779c9cc183c440dbac457641e19a0" -dependencies = [ - "proc-macro2", - "quote", - "syn", -] +checksum = "8ecb6da28b8a351d773b68d5825ac39017e680750f980f3a1a85cd8dd28a47c1" [[package]] -name = "serde_json" -version = "1.0.135" +name = "url" +version = "2.5.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2b0d7ba2887406110130a978386c4e1befb98c674b4fba677954e4db976630d9" +checksum = "32f8b686cadd1473f4bd0117a5d28d36b1ade384ea9b5069a1c40aefed7fda60" dependencies = [ - "itoa", - "memchr", - "ryu", + "form_urlencoded", + "idna", + "percent-encoding", "serde", ] [[package]] -name = "sha2" -version = "0.10.8" +name = "urlencoding" +version = "2.1.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "793db75ad2bcafc3ffa7c68b215fee268f537982cd901d132f89c6343f3a3dc8" -dependencies = [ - "cfg-if", - "cpufeatures", - "digest", -] +checksum = "daf8dba3b7eb870caf1ddeed7bc9d2a049f3cfdfae7cb521b087cc33ae4c49da" [[package]] -name = "shlex" -version = "1.3.0" +name = "utf16_iter" +version = "1.0.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64" +checksum = "c8232dd3cdaed5356e0f716d285e4b40b932ac434100fe9b7e0e8e935b9e6246" [[package]] -name = "signal-hook-registry" -version = "1.4.2" +name = "utf8_iter" +version = "1.0.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a9e9e0b4211b72e7b8b6e85c807d36c212bdb33ea8587f7569562a84df5465b1" -dependencies = [ - "libc", -] +checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" [[package]] -name = "signature" -version = "2.2.0" +name = "utf8parse" +version = "0.2.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "77549399552de45a898a580c1b41d445bf730df867cc44e6c0233bbc4b8329de" -dependencies = [ - "digest", - "rand_core", -] +checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821" [[package]] -name = "smallvec" -version = "1.13.2" +name = "uuid" +version = "1.12.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67" +checksum = "b3758f5e68192bb96cc8f9b7e2c2cfdabb435499a28499a42f8f984092adad4b" [[package]] -name = "socket2" -version = "0.5.8" +name = "vcpkg" +version = "0.2.15" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c970269d99b64e60ec3bd6ad27270092a5394c4e309314b18ae3fe575695fbe8" -dependencies = [ - "libc", - "windows-sys 0.52.0", -] +checksum = "accd4ea62f7bb7a82fe23066fb0957d48ef677f6eeb8215f372f52e48bb32426" [[package]] -name = "spin" -version = "0.9.8" +name = "version_check" +version = "0.9.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "6980e8d7511241f8acf4aebddbb1ff938df5eebe98691418c4468d0b72a96a67" +checksum = "0b928f33d975fc6ad9f86c8f283853ad26bdd5b10b7f1542aa2fa15e2289105a" [[package]] -name = "spki" -version = "0.7.3" +name = "vsimd" +version = "0.8.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d91ed6c858b01f942cd56b37a94b3e0a1798290327d1236e4d9cf4eaca44d29d" -dependencies = [ - "base64ct", - "der", -] +checksum = "5c3082ca00d5a5ef149bb8b555a72ae84c9c59f7250f013ac822ac2e49b19c64" [[package]] -name = "subtle" -version = "2.6.1" +name = "waker-fn" +version = "1.2.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "13c2bddecc57b384dee18652358fb23172facb8a2c51ccc10d74c157bdea3292" +checksum = "317211a0dc0ceedd78fb2ca9a44aed3d7b9b26f81870d485c07122b4350673b7" [[package]] -name = "syn" -version = "2.0.96" +name = "want" +version = "0.3.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d5d0adab1ae378d7f53bdebc67a39f1f151407ef230f0ce2883572f5d8985c80" +checksum = "bfa7760aed19e106de2c7c0b581b509f2f25d3dacaf737cb82ac61bc6d760b0e" dependencies = [ - "proc-macro2", - "quote", - "unicode-ident", + "try-lock", ] [[package]] -name = "thiserror" -version = "2.0.11" +name = "wasi" +version = "0.9.0+wasi-snapshot-preview1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d452f284b73e6d76dd36758a0c8684b1d5be31f92b89d07fd5822175732206fc" -dependencies = [ - "thiserror-impl", -] +checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519" [[package]] -name = "thiserror-impl" -version = "2.0.11" +name = "wasi" +version = "0.11.0+wasi-snapshot-preview1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "26afc1baea8a989337eeb52b6e72a039780ce45c3edfcc9c5b9d112feeb173c2" -dependencies = [ - "proc-macro2", - "quote", - "syn", -] +checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" [[package]] -name = "tokio" -version = "1.43.0" +name = "wasm-bindgen" +version = "0.2.100" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3d61fa4ffa3de412bfea335c6ecff681de2b609ba3c77ef3e00e521813a9ed9e" +checksum = "1edc8929d7499fc4e8f0be2262a241556cfc54a0bea223790e71446f2aab1ef5" dependencies = [ - "backtrace", - "bytes", - "libc", - "mio", - "parking_lot", - "pin-project-lite", - "signal-hook-registry", - "socket2", - "tokio-macros", - "windows-sys 0.52.0", + "cfg-if", + "once_cell", + "rustversion", + "wasm-bindgen-macro", ] [[package]] -name = "tokio-macros" -version = "2.5.0" +name = "wasm-bindgen-backend" +version = "0.2.100" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "6e06d43f1345a3bcd39f6a56dbb7dcab2ba47e68e8ac134855e7e2bdbaf8cab8" +checksum = "2f0a0651a5c2bc21487bde11ee802ccaf4c51935d0d3d42a6101f98161700bc6" dependencies = [ + "bumpalo", + "log", "proc-macro2", "quote", "syn", + "wasm-bindgen-shared", ] [[package]] -name = "typenum" -version = "1.17.0" +name = "wasm-bindgen-futures" +version = "0.4.50" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "42ff0bf0c66b8238c6f3b578df37d0b7848e55df8577b3f74f92a69acceeb825" +checksum = "555d470ec0bc3bb57890405e5d4322cc9ea83cebb085523ced7be4144dac1e61" +dependencies = [ + "cfg-if", + "js-sys", + "once_cell", + "wasm-bindgen", + "web-sys", +] [[package]] -name = "unicode-ident" -version = "1.0.14" +name = "wasm-bindgen-macro" +version = "0.2.100" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "adb9e6ca4f869e1180728b7950e35922a7fc6397f7b641499e8f3ef06e50dc83" +checksum = "7fe63fc6d09ed3792bd0897b314f53de8e16568c2b3f7982f468c0bf9bd0b407" +dependencies = [ + "quote", + "wasm-bindgen-macro-support", +] [[package]] -name = "universal-hash" -version = "0.5.1" +name = "wasm-bindgen-macro-support" +version = "0.2.100" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "fc1de2c688dc15305988b563c3854064043356019f97a4b46276fe734c4f07ea" +checksum = "8ae87ea40c9f689fc23f209965b6fb8a99ad69aeeb0231408be24920604395de" dependencies = [ - "crypto-common", - "subtle", + "proc-macro2", + "quote", + "syn", + "wasm-bindgen-backend", + "wasm-bindgen-shared", ] [[package]] -name = "untrusted" -version = "0.9.0" +name = "wasm-bindgen-shared" +version = "0.2.100" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8ecb6da28b8a351d773b68d5825ac39017e680750f980f3a1a85cd8dd28a47c1" +checksum = "1a05d73b933a847d6cccdda8f838a22ff101ad9bf93e33684f39c1f5f0eece3d" +dependencies = [ + "unicode-ident", +] [[package]] -name = "utf8parse" -version = "0.2.2" +name = "wasm-streams" +version = "0.4.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821" +checksum = "15053d8d85c7eccdbefef60f06769760a563c7f0a9d6902a13d35c7800b0ad65" +dependencies = [ + "futures-util", + "js-sys", + "wasm-bindgen", + "wasm-bindgen-futures", + "web-sys", +] [[package]] -name = "version_check" -version = "0.9.5" +name = "web-sys" +version = "0.3.77" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0b928f33d975fc6ad9f86c8f283853ad26bdd5b10b7f1542aa2fa15e2289105a" +checksum = "33b6dd2ef9186f1f2072e409e99cd22a975331a6b3591b12c764e0e55c60d5d2" +dependencies = [ + "js-sys", + "wasm-bindgen", +] [[package]] -name = "wasi" -version = "0.11.0+wasi-snapshot-preview1" +name = "webpki-roots" +version = "0.26.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" +checksum = "5d642ff16b7e79272ae451b7322067cdc17cadf68c23264be9d94a32319efe7e" +dependencies = [ + "rustls-pki-types", +] [[package]] name = "windows" @@ -1052,6 +3427,36 @@ dependencies = [ "windows-targets", ] +[[package]] +name = "windows-registry" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e400001bb720a623c1c69032f8e3e4cf09984deec740f007dd2b03ec864804b0" +dependencies = [ + "windows-result", + "windows-strings", + "windows-targets", +] + +[[package]] +name = "windows-result" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1d1043d8214f791817bab27572aaa8af63732e11bf84aa21a45a78d6c317ae0e" +dependencies = [ + "windows-targets", +] + +[[package]] +name = "windows-strings" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4cd9b125c486025df0eabcb585e62173c6c9eddcec5d117d3b6e8c30e2ee4d10" +dependencies = [ + "windows-result", + "windows-targets", +] + [[package]] name = "windows-sys" version = "0.52.0" @@ -1134,6 +3539,48 @@ version = "0.52.6" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" +[[package]] +name = "write16" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d1890f4022759daae28ed4fe62859b1236caebfc61ede2f63ed4e695f3f6d936" + +[[package]] +name = "writeable" +version = "0.5.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e9df38ee2d2c3c5948ea468a8406ff0db0b29ae1ffde1bcf20ef305bcc95c51" + +[[package]] +name = "xmlparser" +version = "0.13.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "66fee0b777b0f5ac1c69bb06d361268faafa61cd4682ae064a171c16c433e9e4" + +[[package]] +name = "yoke" +version = "0.7.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "120e6aef9aa629e3d4f52dc8cc43a015c7724194c97dfaf45180d2daf2b77f40" +dependencies = [ + "serde", + "stable_deref_trait", + "yoke-derive", + "zerofrom", +] + +[[package]] +name = "yoke-derive" +version = "0.7.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2380878cad4ac9aac1e2435f3eb4020e8374b5f13c296cb75b4620ff8e229154" +dependencies = [ + "proc-macro2", + "quote", + "syn", + "synstructure", +] + [[package]] name = "zerocopy" version = "0.7.35" @@ -1155,8 +3602,51 @@ dependencies = [ "syn", ] +[[package]] +name = "zerofrom" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cff3ee08c995dee1859d998dea82f7374f2826091dd9cd47def953cae446cd2e" +dependencies = [ + "zerofrom-derive", +] + +[[package]] +name = "zerofrom-derive" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "595eed982f7d355beb85837f651fa22e90b3c044842dc7f2c2842c086f295808" +dependencies = [ + "proc-macro2", + "quote", + "syn", + "synstructure", +] + [[package]] name = "zeroize" version = "1.8.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "ced3678a2879b30306d323f4542626697a464a97c0a07c9aebf7ebca65cd4dde" + +[[package]] +name = "zerovec" +version = "0.10.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aa2b893d79df23bfb12d5461018d408ea19dfafe76c2c7ef6d4eba614f8ff079" +dependencies = [ + "yoke", + "zerofrom", + "zerovec-derive", +] + +[[package]] +name = "zerovec-derive" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6eafa6dfb17584ea3e2bd6e76e0cc15ad7af12b09abdd1ca55961bed9b1063c6" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] diff --git a/Cargo.toml b/Cargo.toml index 7346c00..4ab329b 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -24,7 +24,15 @@ ring = "0.17.8" sha2 = "0.10" parking_lot = "0.12" async-trait = "0.1" - +azure_security_keyvault = { version = "0.21.0", features = ["enable_reqwest"] } +aws-sdk-kms = { version = "1.57.0", features = ["rt-tokio"] } +aws-sdk-secretsmanager = { version = "1.3", features = ["rt-tokio"] } +google-cloud-kms = { version = "0.6.0", features = ["auth"] } +aws-config = { version = "1.0", features = ["behavior-version-latest"] } +aws-types = "1.0" +chrono = "0.4" +crc32c = "0.6" +google-cloud-googleapis = { version = "0.16.0", features = ["kms"] } [lib] name = "windows_ssh_agent" path = "src/lib.rs" diff --git a/src/cloud/aws/kms.rs b/src/cloud/aws/kms.rs new file mode 100644 index 0000000..1d4ab82 --- /dev/null +++ b/src/cloud/aws/kms.rs @@ -0,0 +1,75 @@ +use aws_sdk_kms::Client as KmsClient; +use aws_sdk_kms::primitives::Blob; +use crate::cloud::{CloudProvider, CloudError}; +use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; +use async_trait::async_trait; + +#[derive(Debug)] +pub struct AWSProvider { + client: KmsClient, +} + +impl AWSProvider { + pub fn new(client: KmsClient) -> Self { + Self { client } + } + + async fn encrypt(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { + let response = self.client + .encrypt() + .key_id(key_id) + .plaintext(Blob::new(data.to_vec())) // Convertir Vec en Blob + .send() + .await + .map_err(|e| CloudError::EncryptionError(e.to_string()))?; + + response.ciphertext_blob() + .ok_or_else(|| CloudError::EncryptionError("No ciphertext in response".to_string())) + .map(|blob| blob.as_ref().to_vec()) // Convertir Blob en Vec + } + + async fn decrypt(&self, key_id: &str, ciphertext: &[u8]) -> Result, CloudError> { + let response = self.client + .decrypt() + .key_id(key_id) + .ciphertext_blob(Blob::new(ciphertext.to_vec())) // Convertir Vec en Blob + .send() + .await + .map_err(|e| CloudError::DecryptionError(e.to_string()))?; + + response.plaintext() + .ok_or_else(|| CloudError::DecryptionError("No plaintext in response".to_string())) + .map(|text| text.as_ref().to_vec()) // Convertir Blob en Vec + } +} + +#[async_trait] +impl CloudProvider for AWSProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("key_{}", chrono::Utc::now().timestamp()); + let encrypted_key = self.encrypt(&key_id, key).await?; + let key_b64 = BASE64.encode(encrypted_key); + + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + Err(CloudError::OperationNotSupported("Key retrieval not implemented for AWS KMS".to_string())) + } + + async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { + let response = self.client + .sign() + .key_id(key_id) + .message(Blob::new(data.to_vec())) // Convertir Vec en Blob + .message_type(aws_sdk_kms::types::MessageType::Raw) + .signing_algorithm(aws_sdk_kms::types::SigningAlgorithmSpec::RsassaPssSha256) + .send() + .await + .map_err(|e| CloudError::SigningError(e.to_string()))?; + + response.signature() + .ok_or_else(|| CloudError::SigningError("No signature in response".to_string())) + .map(|sig| sig.as_ref().to_vec()) // Convertir Blob en Vec + } +} \ No newline at end of file diff --git a/src/cloud/aws/mod.rs b/src/cloud/aws/mod.rs new file mode 100644 index 0000000..5d37307 --- /dev/null +++ b/src/cloud/aws/mod.rs @@ -0,0 +1,3 @@ +mod kms; + +pub use kms::AWSProvider; \ No newline at end of file diff --git a/src/cloud/azure/kms.rs b/src/cloud/azure/kms.rs new file mode 100644 index 0000000..624f58e --- /dev/null +++ b/src/cloud/azure/kms.rs @@ -0,0 +1,97 @@ +use azure_security_keyvault::{prelude::SignatureAlgorithm, KeyvaultClient}; +use crate::cloud::{CloudProvider, CloudError}; +use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; +use async_trait::async_trait; +use ring::{signature::{self, Ed25519KeyPair, RsaKeyPair}, digest::{Context, SHA256}}; +use ring::rand::SystemRandom; + +#[derive(Debug)] +pub struct AzureKmsProvider { + client: KeyvaultClient, +} + +impl AzureKmsProvider { + pub fn new(client: KeyvaultClient) -> Self { + Self { client } + } + + pub async fn set_secret(&self, secret_name: &str, secret_value: &str) -> Result<(), CloudError> { + self.client.secret_client() + .set(secret_name, secret_value) + .await + .map_err(|e| CloudError::StorageError(e.to_string()))?; + Ok(()) + } + + pub async fn get_secret(&self, secret_name: &str) -> Result { + let secret = self.client.secret_client() + .get(secret_name) + .await + .map_err(|e| CloudError::RetrievalError(e.to_string()))?; + Ok(secret.value) + } + + async fn sign_with_key(&self, private_key: &[u8], data: &[u8]) -> Result, CloudError> { + // Try to parse as Ed25519 key first + if let Ok(key_pair) = Ed25519KeyPair::from_pkcs8(private_key) { + let signature = key_pair.sign(data); + return Ok(signature.as_ref().to_vec()); + } + + // If not Ed25519, try RSA + let mut context = Context::new(&SHA256); + context.update(data); + let digest = context.finish(); + + // Parse the private key as RSA + let key_pair = RsaKeyPair::from_der(private_key) + .map_err(|e| CloudError::SigningError(format!("Failed to parse RSA key: {}", e)))?; + + let mut signature = vec![0; key_pair.public().modulus_len()]; + key_pair + .sign( + &signature::RSA_PKCS1_SHA256, + &SystemRandom::new(), + digest.as_ref(), + &mut signature, + ) + .map_err(|e| CloudError::SigningError(format!("Signing failed: {}", e)))?; + + Ok(signature) + } +} + +#[async_trait] +impl CloudProvider for AzureKmsProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("key_{}", chrono::Utc::now().timestamp()); + let key_b64 = BASE64.encode(key); + + self.set_secret(&key_id, &key_b64) + .await + .map_err(|e| CloudError::StorageError(format!("Failed to store key in Azure Key Vault: {}", e)))?; + + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + let key_b64 = self.get_secret(id) + .await + .map_err(|e| CloudError::RetrievalError(e.to_string()))?; + BASE64.decode(key_b64) + .map_err(|e| CloudError::DecodingError(e.to_string())) + } + + async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { + let signature = self.client.key_client() + .sign( + key_id, + SignatureAlgorithm::RS256, // or appropriate algorithm + BASE64.encode(data) // Convert data to base64 + ) + .await + .map_err(|e| CloudError::SigningError(e.to_string()))?; + + Ok(signature.signature) + } +} \ No newline at end of file diff --git a/src/cloud/azure/mod.rs b/src/cloud/azure/mod.rs new file mode 100644 index 0000000..95f579a --- /dev/null +++ b/src/cloud/azure/mod.rs @@ -0,0 +1,3 @@ +mod kms; + +pub use kms::AzureKmsProvider; \ No newline at end of file diff --git a/src/cloud/error.rs b/src/cloud/error.rs new file mode 100644 index 0000000..bfc6f54 --- /dev/null +++ b/src/cloud/error.rs @@ -0,0 +1,28 @@ +use std::fmt; + +#[derive(Debug)] +pub enum CloudError { + EncryptionError(String), + DecryptionError(String), + SigningError(String), + StorageError(String), + RetrievalError(String), + DecodingError(String), + OperationNotSupported(String), +} + +impl fmt::Display for CloudError { + fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { + match self { + CloudError::EncryptionError(msg) => write!(f, "Encryption error: {}", msg), + CloudError::DecryptionError(msg) => write!(f, "Decryption error: {}", msg), + CloudError::SigningError(msg) => write!(f, "Signing error: {}", msg), + CloudError::StorageError(msg) => write!(f, "Storage error: {}", msg), + CloudError::RetrievalError(msg) => write!(f, "Retrieval error: {}", msg), + CloudError::DecodingError(msg) => write!(f, "Decoding error: {}", msg), + CloudError::OperationNotSupported(msg) => write!(f, "Operation not supported: {}", msg), + } + } +} + +impl std::error::Error for CloudError {} \ No newline at end of file diff --git a/src/cloud/gcp/kms.rs b/src/cloud/gcp/kms.rs new file mode 100644 index 0000000..0ec24f6 --- /dev/null +++ b/src/cloud/gcp/kms.rs @@ -0,0 +1,132 @@ +use google_cloud_kms::client::Client as KmsClient; +use google_cloud_googleapis::cloud::kms::v1::{ + CryptoKey, + crypto_key::CryptoKeyPurpose, + CryptoKeyVersionTemplate, + ProtectionLevel, + AsymmetricSignRequest, + CreateCryptoKeyRequest, + DecryptRequest, + EncryptRequest, + GetPublicKeyRequest, + crypto_key_version::CryptoKeyVersionAlgorithm, +}; +use crate::cloud::{CloudProvider, CloudError}; +use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; +use async_trait::async_trait; +use crc32c::crc32c; + +#[derive(Debug)] +pub struct KmsProvider { + client: KmsClient, + key_path: String, +} + +impl KmsProvider { + pub fn new(client: KmsClient, key_path: String) -> Self { + Self { client, key_path } + } + + async fn encrypt(&self, data: &[u8]) -> Result, CloudError> { + let plaintext_crc32c = crc32c(data) as i64; + let request = EncryptRequest { + name: self.key_path.clone(), + plaintext: data.to_vec(), + plaintext_crc32c: Some(plaintext_crc32c), + additional_authenticated_data: Vec::new(), + additional_authenticated_data_crc32c: None, + }; + + let response = self.client + .encrypt(request, None) + .await + .map_err(|e| CloudError::EncryptionError(e.to_string()))?; + + Ok(response.ciphertext) + } + + async fn decrypt(&self, ciphertext: &[u8]) -> Result, CloudError> { + let ciphertext_crc32c = crc32c(ciphertext) as i64; + let request = DecryptRequest { + name: self.key_path.clone(), + ciphertext: ciphertext.to_vec(), + ciphertext_crc32c: Some(ciphertext_crc32c), + additional_authenticated_data: Vec::new(), + additional_authenticated_data_crc32c: None, + }; + + let response = self.client + .decrypt(request, None) + .await + .map_err(|e| CloudError::DecryptionError(e.to_string()))?; + + Ok(response.plaintext) + } +} + +#[async_trait] +impl CloudProvider for KmsProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("key_{}", chrono::Utc::now().timestamp()); + + let request = CreateCryptoKeyRequest { + parent: self.key_path.clone(), + crypto_key_id: key_id.clone(), + crypto_key: Some(CryptoKey { + purpose: CryptoKeyPurpose::EncryptDecrypt as i32, + version_template: Some(CryptoKeyVersionTemplate { + algorithm: CryptoKeyVersionAlgorithm::GoogleSymmetricEncryption as i32, + protection_level: ProtectionLevel::Hsm as i32, + ..Default::default() + }), + ..Default::default() + }), + skip_initial_version_creation: false, + }; + + self.client + .create_crypto_key(request, None) + .await + .map_err(|e| CloudError::StorageError(e.to_string()))?; + + let encrypted_key = self.encrypt(key).await?; + let _key_b64 = BASE64.encode(encrypted_key); + + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + let encrypted_key = self.client + .get_public_key( + GetPublicKeyRequest { + name: format!("{}/cryptoKeys/{}/cryptoKeyVersions/1", self.key_path, id), + }, + None + ) + .await + .map_err(|e| CloudError::RetrievalError(e.to_string()))? + .pem; + + let encrypted_key = BASE64.decode(encrypted_key) + .map_err(|e| CloudError::DecodingError(e.to_string()))?; + + self.decrypt(&encrypted_key).await + } + + async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { + let data_crc32c = crc32c(data) as i64; + let request = AsymmetricSignRequest { + name: format!("{}/cryptoKeys/{}/cryptoKeyVersions/1", self.key_path, key_id), + data: data.to_vec(), + data_crc32c: Some(data_crc32c), + ..Default::default() + }; + + let response = self.client + .asymmetric_sign(request, None) + .await + .map_err(|e| CloudError::SigningError(e.to_string()))?; + + Ok(response.signature) + } +} \ No newline at end of file diff --git a/src/cloud/gcp/mod.rs b/src/cloud/gcp/mod.rs new file mode 100644 index 0000000..292cfa6 --- /dev/null +++ b/src/cloud/gcp/mod.rs @@ -0,0 +1,3 @@ +mod kms; + +pub use kms::KmsProvider; \ No newline at end of file diff --git a/src/cloud/mod.rs b/src/cloud/mod.rs new file mode 100644 index 0000000..0da4d24 --- /dev/null +++ b/src/cloud/mod.rs @@ -0,0 +1,28 @@ +pub mod aws; +pub mod gcp; +pub mod azure; +mod error; + +pub use error::CloudError; + +#[async_trait::async_trait] +pub trait CloudProvider: Send + Sync { + /// Store a key in the cloud provider's storage. + /// Returns a unique identifier for the stored key. + async fn store_key(&self, key: &[u8]) -> Result; + + /// Retrieve a key from the cloud provider's storage using its identifier. + async fn retrieve_key(&self, id: &str) -> Result, CloudError>; + + /// Sign data using a key stored in the cloud provider. + /// The key_id should be a valid key identifier previously returned by store_key. + async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError>; +} + +/// Supported cloud provider implementations +#[derive(Debug)] +pub enum CloudProviderType { + AWS(aws::AWSProvider), + GCP(gcp::KmsProvider), + Azure(azure::AzureKmsProvider), +} \ No newline at end of file diff --git a/src/lib.rs b/src/lib.rs index e77074e..d17668f 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -1,8 +1,7 @@ pub mod key_store; pub mod tpm; +pub mod cloud; pub use key_store::{KeyInfo, KeyStore, KeyStoreError}; -pub use tpm::{ - KeyType, MockTPMProvider, SSHAgentServer, TPMProvider, TPMProviderType, WindowsSSHAgent, - WindowsTPMProvider, -}; +pub use tpm::{KeyType, MockTPMProvider, SSHAgentServer, TPMProvider, TPMProviderType, WindowsSSHAgent, WindowsTPMProvider}; +pub use cloud::{CloudProvider, CloudProviderType, CloudError}; From 478fa11b60e92d8f3a8010e5dbedc495fb0700c4 Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Fri, 31 Jan 2025 14:45:10 +0100 Subject: [PATCH 2/8] fix(ci): fix ci --- .github/workflows/windows-build.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/windows-build.yml b/.github/workflows/windows-build.yml index 379317e..90a83d4 100644 --- a/.github/workflows/windows-build.yml +++ b/.github/workflows/windows-build.yml @@ -47,7 +47,7 @@ jobs: run: cargo test --target x86_64-pc-windows-msvc --all -- --nocapture - name: Upload Artifact - uses: actions/upload-artifact@v3 + uses: actions/upload-artifact@v4 with: name: windows-ssh-agent path: target/x86_64-pc-windows-msvc/release/agent.exe From 5a16f0b51579e35ecaa3c79255e538df32f35278 Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Fri, 31 Jan 2025 14:47:35 +0100 Subject: [PATCH 3/8] fix: format --- src/cloud/aws/kms.rs | 32 ++++++++++++++++----------- src/cloud/aws/mod.rs | 2 +- src/cloud/azure/kms.rs | 48 ++++++++++++++++++++++++++--------------- src/cloud/azure/mod.rs | 2 +- src/cloud/error.rs | 2 +- src/cloud/gcp/kms.rs | 49 +++++++++++++++++++++--------------------- src/cloud/gcp/mod.rs | 2 +- src/cloud/mod.rs | 6 +++--- src/lib.rs | 9 +++++--- 9 files changed, 89 insertions(+), 63 deletions(-) diff --git a/src/cloud/aws/kms.rs b/src/cloud/aws/kms.rs index 1d4ab82..979ac26 100644 --- a/src/cloud/aws/kms.rs +++ b/src/cloud/aws/kms.rs @@ -1,8 +1,8 @@ -use aws_sdk_kms::Client as KmsClient; +use crate::cloud::{CloudError, CloudProvider}; +use async_trait::async_trait; use aws_sdk_kms::primitives::Blob; -use crate::cloud::{CloudProvider, CloudError}; +use aws_sdk_kms::Client as KmsClient; use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; -use async_trait::async_trait; #[derive(Debug)] pub struct AWSProvider { @@ -15,7 +15,8 @@ impl AWSProvider { } async fn encrypt(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { - let response = self.client + let response = self + .client .encrypt() .key_id(key_id) .plaintext(Blob::new(data.to_vec())) // Convertir Vec en Blob @@ -23,13 +24,15 @@ impl AWSProvider { .await .map_err(|e| CloudError::EncryptionError(e.to_string()))?; - response.ciphertext_blob() + response + .ciphertext_blob() .ok_or_else(|| CloudError::EncryptionError("No ciphertext in response".to_string())) .map(|blob| blob.as_ref().to_vec()) // Convertir Blob en Vec } async fn decrypt(&self, key_id: &str, ciphertext: &[u8]) -> Result, CloudError> { - let response = self.client + let response = self + .client .decrypt() .key_id(key_id) .ciphertext_blob(Blob::new(ciphertext.to_vec())) // Convertir Vec en Blob @@ -37,7 +40,8 @@ impl AWSProvider { .await .map_err(|e| CloudError::DecryptionError(e.to_string()))?; - response.plaintext() + response + .plaintext() .ok_or_else(|| CloudError::DecryptionError("No plaintext in response".to_string())) .map(|text| text.as_ref().to_vec()) // Convertir Blob en Vec } @@ -49,16 +53,19 @@ impl CloudProvider for AWSProvider { let key_id = format!("key_{}", chrono::Utc::now().timestamp()); let encrypted_key = self.encrypt(&key_id, key).await?; let key_b64 = BASE64.encode(encrypted_key); - + Ok(key_id) } async fn retrieve_key(&self, id: &str) -> Result, CloudError> { - Err(CloudError::OperationNotSupported("Key retrieval not implemented for AWS KMS".to_string())) + Err(CloudError::OperationNotSupported( + "Key retrieval not implemented for AWS KMS".to_string(), + )) } async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { - let response = self.client + let response = self + .client .sign() .key_id(key_id) .message(Blob::new(data.to_vec())) // Convertir Vec en Blob @@ -68,8 +75,9 @@ impl CloudProvider for AWSProvider { .await .map_err(|e| CloudError::SigningError(e.to_string()))?; - response.signature() + response + .signature() .ok_or_else(|| CloudError::SigningError("No signature in response".to_string())) .map(|sig| sig.as_ref().to_vec()) // Convertir Blob en Vec } -} \ No newline at end of file +} diff --git a/src/cloud/aws/mod.rs b/src/cloud/aws/mod.rs index 5d37307..baaef61 100644 --- a/src/cloud/aws/mod.rs +++ b/src/cloud/aws/mod.rs @@ -1,3 +1,3 @@ mod kms; -pub use kms::AWSProvider; \ No newline at end of file +pub use kms::AWSProvider; diff --git a/src/cloud/azure/kms.rs b/src/cloud/azure/kms.rs index 624f58e..3684fcc 100644 --- a/src/cloud/azure/kms.rs +++ b/src/cloud/azure/kms.rs @@ -1,9 +1,12 @@ +use crate::cloud::{CloudError, CloudProvider}; +use async_trait::async_trait; use azure_security_keyvault::{prelude::SignatureAlgorithm, KeyvaultClient}; -use crate::cloud::{CloudProvider, CloudError}; use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; -use async_trait::async_trait; -use ring::{signature::{self, Ed25519KeyPair, RsaKeyPair}, digest::{Context, SHA256}}; use ring::rand::SystemRandom; +use ring::{ + digest::{Context, SHA256}, + signature::{self, Ed25519KeyPair, RsaKeyPair}, +}; #[derive(Debug)] pub struct AzureKmsProvider { @@ -15,8 +18,13 @@ impl AzureKmsProvider { Self { client } } - pub async fn set_secret(&self, secret_name: &str, secret_value: &str) -> Result<(), CloudError> { - self.client.secret_client() + pub async fn set_secret( + &self, + secret_name: &str, + secret_value: &str, + ) -> Result<(), CloudError> { + self.client + .secret_client() .set(secret_name, secret_value) .await .map_err(|e| CloudError::StorageError(e.to_string()))?; @@ -24,7 +32,9 @@ impl AzureKmsProvider { } pub async fn get_secret(&self, secret_name: &str) -> Result { - let secret = self.client.secret_client() + let secret = self + .client + .secret_client() .get(secret_name) .await .map_err(|e| CloudError::RetrievalError(e.to_string()))?; @@ -66,32 +76,36 @@ impl CloudProvider for AzureKmsProvider { async fn store_key(&self, key: &[u8]) -> Result { let key_id = format!("key_{}", chrono::Utc::now().timestamp()); let key_b64 = BASE64.encode(key); - - self.set_secret(&key_id, &key_b64) - .await - .map_err(|e| CloudError::StorageError(format!("Failed to store key in Azure Key Vault: {}", e)))?; + + self.set_secret(&key_id, &key_b64).await.map_err(|e| { + CloudError::StorageError(format!("Failed to store key in Azure Key Vault: {}", e)) + })?; Ok(key_id) } async fn retrieve_key(&self, id: &str) -> Result, CloudError> { - let key_b64 = self.get_secret(id) + let key_b64 = self + .get_secret(id) .await .map_err(|e| CloudError::RetrievalError(e.to_string()))?; - BASE64.decode(key_b64) + BASE64 + .decode(key_b64) .map_err(|e| CloudError::DecodingError(e.to_string())) } async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { - let signature = self.client.key_client() + let signature = self + .client + .key_client() .sign( - key_id, + key_id, SignatureAlgorithm::RS256, // or appropriate algorithm - BASE64.encode(data) // Convert data to base64 + BASE64.encode(data), // Convert data to base64 ) .await .map_err(|e| CloudError::SigningError(e.to_string()))?; - + Ok(signature.signature) } -} \ No newline at end of file +} diff --git a/src/cloud/azure/mod.rs b/src/cloud/azure/mod.rs index 95f579a..8789b20 100644 --- a/src/cloud/azure/mod.rs +++ b/src/cloud/azure/mod.rs @@ -1,3 +1,3 @@ mod kms; -pub use kms::AzureKmsProvider; \ No newline at end of file +pub use kms::AzureKmsProvider; diff --git a/src/cloud/error.rs b/src/cloud/error.rs index bfc6f54..339af5c 100644 --- a/src/cloud/error.rs +++ b/src/cloud/error.rs @@ -25,4 +25,4 @@ impl fmt::Display for CloudError { } } -impl std::error::Error for CloudError {} \ No newline at end of file +impl std::error::Error for CloudError {} diff --git a/src/cloud/gcp/kms.rs b/src/cloud/gcp/kms.rs index 0ec24f6..5d4a9bf 100644 --- a/src/cloud/gcp/kms.rs +++ b/src/cloud/gcp/kms.rs @@ -1,20 +1,13 @@ -use google_cloud_kms::client::Client as KmsClient; -use google_cloud_googleapis::cloud::kms::v1::{ - CryptoKey, - crypto_key::CryptoKeyPurpose, - CryptoKeyVersionTemplate, - ProtectionLevel, - AsymmetricSignRequest, - CreateCryptoKeyRequest, - DecryptRequest, - EncryptRequest, - GetPublicKeyRequest, - crypto_key_version::CryptoKeyVersionAlgorithm, -}; -use crate::cloud::{CloudProvider, CloudError}; -use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; +use crate::cloud::{CloudError, CloudProvider}; use async_trait::async_trait; +use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; use crc32c::crc32c; +use google_cloud_googleapis::cloud::kms::v1::{ + crypto_key::CryptoKeyPurpose, crypto_key_version::CryptoKeyVersionAlgorithm, + AsymmetricSignRequest, CreateCryptoKeyRequest, CryptoKey, CryptoKeyVersionTemplate, + DecryptRequest, EncryptRequest, GetPublicKeyRequest, ProtectionLevel, +}; +use google_cloud_kms::client::Client as KmsClient; #[derive(Debug)] pub struct KmsProvider { @@ -37,7 +30,8 @@ impl KmsProvider { additional_authenticated_data_crc32c: None, }; - let response = self.client + let response = self + .client .encrypt(request, None) .await .map_err(|e| CloudError::EncryptionError(e.to_string()))?; @@ -55,7 +49,8 @@ impl KmsProvider { additional_authenticated_data_crc32c: None, }; - let response = self.client + let response = self + .client .decrypt(request, None) .await .map_err(|e| CloudError::DecryptionError(e.to_string()))?; @@ -68,7 +63,7 @@ impl KmsProvider { impl CloudProvider for KmsProvider { async fn store_key(&self, key: &[u8]) -> Result { let key_id = format!("key_{}", chrono::Utc::now().timestamp()); - + let request = CreateCryptoKeyRequest { parent: self.key_path.clone(), crypto_key_id: key_id.clone(), @@ -96,18 +91,20 @@ impl CloudProvider for KmsProvider { } async fn retrieve_key(&self, id: &str) -> Result, CloudError> { - let encrypted_key = self.client + let encrypted_key = self + .client .get_public_key( GetPublicKeyRequest { name: format!("{}/cryptoKeys/{}/cryptoKeyVersions/1", self.key_path, id), }, - None + None, ) .await .map_err(|e| CloudError::RetrievalError(e.to_string()))? .pem; - let encrypted_key = BASE64.decode(encrypted_key) + let encrypted_key = BASE64 + .decode(encrypted_key) .map_err(|e| CloudError::DecodingError(e.to_string()))?; self.decrypt(&encrypted_key).await @@ -116,17 +113,21 @@ impl CloudProvider for KmsProvider { async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { let data_crc32c = crc32c(data) as i64; let request = AsymmetricSignRequest { - name: format!("{}/cryptoKeys/{}/cryptoKeyVersions/1", self.key_path, key_id), + name: format!( + "{}/cryptoKeys/{}/cryptoKeyVersions/1", + self.key_path, key_id + ), data: data.to_vec(), data_crc32c: Some(data_crc32c), ..Default::default() }; - let response = self.client + let response = self + .client .asymmetric_sign(request, None) .await .map_err(|e| CloudError::SigningError(e.to_string()))?; Ok(response.signature) } -} \ No newline at end of file +} diff --git a/src/cloud/gcp/mod.rs b/src/cloud/gcp/mod.rs index 292cfa6..692d1b8 100644 --- a/src/cloud/gcp/mod.rs +++ b/src/cloud/gcp/mod.rs @@ -1,3 +1,3 @@ mod kms; -pub use kms::KmsProvider; \ No newline at end of file +pub use kms::KmsProvider; diff --git a/src/cloud/mod.rs b/src/cloud/mod.rs index 0da4d24..0e828f4 100644 --- a/src/cloud/mod.rs +++ b/src/cloud/mod.rs @@ -1,7 +1,7 @@ pub mod aws; -pub mod gcp; pub mod azure; mod error; +pub mod gcp; pub use error::CloudError; @@ -23,6 +23,6 @@ pub trait CloudProvider: Send + Sync { #[derive(Debug)] pub enum CloudProviderType { AWS(aws::AWSProvider), - GCP(gcp::KmsProvider), + GCP(gcp::KmsProvider), Azure(azure::AzureKmsProvider), -} \ No newline at end of file +} diff --git a/src/lib.rs b/src/lib.rs index d17668f..82e052e 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -1,7 +1,10 @@ +pub mod cloud; pub mod key_store; pub mod tpm; -pub mod cloud; +pub use cloud::{CloudError, CloudProvider, CloudProviderType}; pub use key_store::{KeyInfo, KeyStore, KeyStoreError}; -pub use tpm::{KeyType, MockTPMProvider, SSHAgentServer, TPMProvider, TPMProviderType, WindowsSSHAgent, WindowsTPMProvider}; -pub use cloud::{CloudProvider, CloudProviderType, CloudError}; +pub use tpm::{ + KeyType, MockTPMProvider, SSHAgentServer, TPMProvider, TPMProviderType, WindowsSSHAgent, + WindowsTPMProvider, +}; From 8de59ec600831758978ea3c86c70ce8b7f5de8ee Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Fri, 31 Jan 2025 22:39:40 +0100 Subject: [PATCH 4/8] refactor(cloud): improve error handling and add fallback mechanisms in cloud KMS providers --- src/cloud/aws/kms.rs | 73 ++++++++++++++++++++++++---- src/cloud/azure/mod.rs | 4 +- src/cloud/azure/{kms.rs => vault.rs} | 24 +++++---- src/cloud/gcp/kms.rs | 9 +++- 4 files changed, 89 insertions(+), 21 deletions(-) rename src/cloud/azure/{kms.rs => vault.rs} (84%) diff --git a/src/cloud/aws/kms.rs b/src/cloud/aws/kms.rs index 979ac26..3f3a133 100644 --- a/src/cloud/aws/kms.rs +++ b/src/cloud/aws/kms.rs @@ -19,7 +19,7 @@ impl AWSProvider { .client .encrypt() .key_id(key_id) - .plaintext(Blob::new(data.to_vec())) // Convertir Vec en Blob + .plaintext(Blob::new(data.to_vec())) .send() .await .map_err(|e| CloudError::EncryptionError(e.to_string()))?; @@ -27,15 +27,16 @@ impl AWSProvider { response .ciphertext_blob() .ok_or_else(|| CloudError::EncryptionError("No ciphertext in response".to_string())) - .map(|blob| blob.as_ref().to_vec()) // Convertir Blob en Vec + .map(|blob| blob.as_ref().to_vec()) } + #[allow(dead_code)] async fn decrypt(&self, key_id: &str, ciphertext: &[u8]) -> Result, CloudError> { let response = self .client .decrypt() .key_id(key_id) - .ciphertext_blob(Blob::new(ciphertext.to_vec())) // Convertir Vec en Blob + .ciphertext_blob(Blob::new(ciphertext.to_vec())) .send() .await .map_err(|e| CloudError::DecryptionError(e.to_string()))?; @@ -43,7 +44,56 @@ impl AWSProvider { response .plaintext() .ok_or_else(|| CloudError::DecryptionError("No plaintext in response".to_string())) - .map(|text| text.as_ref().to_vec()) // Convertir Blob en Vec + .map(|text| text.as_ref().to_vec()) + } + + async fn get_encrypted_key(&self, key_id: &str) -> Result, CloudError> { + // Recover encrypted key from AWS KMS + let response = self + .client + .describe_key() + .key_id(key_id) + .send() + .await + .map_err(|e| CloudError::RetrievalError(e.to_string()))?; + + // Check that the key exists and is active + let key_metadata = response + .key_metadata() + .ok_or_else(|| CloudError::RetrievalError("No key metadata in response".to_string()))?; + + // Check key status with appropriate Option management + match key_metadata.key_state() { + Some(state) => match state { + aws_sdk_kms::types::KeyState::Enabled => {} + other => { + return Err(CloudError::RetrievalError(format!( + "Key is not in enabled state: {:?}", + other + ))) + } + }, + None => { + return Err(CloudError::RetrievalError( + "Key state is not available".to_string(), + )) + } + } + + // Generate a data key for this key_id + let response = self + .client + .generate_data_key() + .key_id(key_id) + .key_spec(aws_sdk_kms::types::DataKeySpec::Aes256) + .send() + .await + .map_err(|e| CloudError::RetrievalError(e.to_string()))?; + + response + .ciphertext_blob() + .ok_or_else(|| CloudError::RetrievalError("No ciphertext blob in response".to_string())) + .map(|blob| blob.as_ref().to_vec()) } } @@ -52,15 +102,20 @@ impl CloudProvider for AWSProvider { async fn store_key(&self, key: &[u8]) -> Result { let key_id = format!("key_{}", chrono::Utc::now().timestamp()); let encrypted_key = self.encrypt(&key_id, key).await?; - let key_b64 = BASE64.encode(encrypted_key); - + let _key_b64 = BASE64.encode(encrypted_key); // Prefix with underscore Ok(key_id) } async fn retrieve_key(&self, id: &str) -> Result, CloudError> { - Err(CloudError::OperationNotSupported( - "Key retrieval not implemented for AWS KMS".to_string(), - )) + let encrypted_key = self.get_encrypted_key(id).await?; + + match self.decrypt(id, &encrypted_key).await { + Ok(key) => Ok(key), + Err(e) => Err(CloudError::RetrievalError(format!( + "Failed to decrypt key: {}", + e + ))), + } } async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { diff --git a/src/cloud/azure/mod.rs b/src/cloud/azure/mod.rs index 8789b20..4218812 100644 --- a/src/cloud/azure/mod.rs +++ b/src/cloud/azure/mod.rs @@ -1,3 +1,3 @@ -mod kms; +mod vault; -pub use kms::AzureKmsProvider; +pub use vault::AzureKmsProvider; diff --git a/src/cloud/azure/kms.rs b/src/cloud/azure/vault.rs similarity index 84% rename from src/cloud/azure/kms.rs rename to src/cloud/azure/vault.rs index 3684fcc..b8b0312 100644 --- a/src/cloud/azure/kms.rs +++ b/src/cloud/azure/vault.rs @@ -41,6 +41,7 @@ impl AzureKmsProvider { Ok(secret.value) } + #[allow(dead_code)] async fn sign_with_key(&self, private_key: &[u8], data: &[u8]) -> Result, CloudError> { // Try to parse as Ed25519 key first if let Ok(key_pair) = Ed25519KeyPair::from_pkcs8(private_key) { @@ -95,17 +96,22 @@ impl CloudProvider for AzureKmsProvider { } async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { - let signature = self + // Try it first with Azure Key Vault + match self .client .key_client() - .sign( - key_id, - SignatureAlgorithm::RS256, // or appropriate algorithm - BASE64.encode(data), // Convert data to base64 - ) + .sign(key_id, SignatureAlgorithm::RS256, BASE64.encode(data)) .await - .map_err(|e| CloudError::SigningError(e.to_string()))?; - - Ok(signature.signature) + { + Ok(signature) => Ok(signature.signature), + Err(_) => { + // If this fails, try the local method + let key = self.get_secret(key_id).await?; + let key_bytes = BASE64 + .decode(key) + .map_err(|e| CloudError::DecodingError(e.to_string()))?; + self.sign_with_key(&key_bytes, data).await + } + } } } diff --git a/src/cloud/gcp/kms.rs b/src/cloud/gcp/kms.rs index 5d4a9bf..c4aa129 100644 --- a/src/cloud/gcp/kms.rs +++ b/src/cloud/gcp/kms.rs @@ -39,6 +39,7 @@ impl KmsProvider { Ok(response.ciphertext) } + #[allow(dead_code)] async fn decrypt(&self, ciphertext: &[u8]) -> Result, CloudError> { let ciphertext_crc32c = crc32c(ciphertext) as i64; let request = DecryptRequest { @@ -107,7 +108,13 @@ impl CloudProvider for KmsProvider { .decode(encrypted_key) .map_err(|e| CloudError::DecodingError(e.to_string()))?; - self.decrypt(&encrypted_key).await + match self.decrypt(&encrypted_key).await { + Ok(key) => Ok(key), + Err(e) => Err(CloudError::RetrievalError(format!( + "Failed to decrypt key: {}", + e + ))), + } } async fn sign_data(&self, key_id: &str, data: &[u8]) -> Result, CloudError> { From e0a91b3ec6097ae905e1e59ce37273a3e0d11b42 Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Fri, 31 Jan 2025 22:50:56 +0100 Subject: [PATCH 5/8] refactor(cloud/gcp): remove unnecessary default values in KMS key configuration --- src/cloud/gcp/kms.rs | 1 - 1 file changed, 1 deletion(-) diff --git a/src/cloud/gcp/kms.rs b/src/cloud/gcp/kms.rs index c4aa129..7f02a05 100644 --- a/src/cloud/gcp/kms.rs +++ b/src/cloud/gcp/kms.rs @@ -73,7 +73,6 @@ impl CloudProvider for KmsProvider { version_template: Some(CryptoKeyVersionTemplate { algorithm: CryptoKeyVersionAlgorithm::GoogleSymmetricEncryption as i32, protection_level: ProtectionLevel::Hsm as i32, - ..Default::default() }), ..Default::default() }), From 07e185b736c528f4d2ca4c859cdb94882b64f407 Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Sat, 1 Feb 2025 10:53:43 +0100 Subject: [PATCH 6/8] chore(deps): update Tokio dependency with test-util and macros features --- Cargo.toml | 2 +- tests/cloud_tests.rs | 189 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 190 insertions(+), 1 deletion(-) create mode 100644 tests/cloud_tests.rs diff --git a/Cargo.toml b/Cargo.toml index 4ab329b..68f4e8a 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -19,7 +19,7 @@ serde_json = "1.0" thiserror = "2.0.9" colored = "3.0.0" figlet-rs = "0.1.5" -tokio = { version = "1.36", features = ["full"] } +tokio = { version = "1.36", features = ["full", "test-util", "macros"] } ring = "0.17.8" sha2 = "0.10" parking_lot = "0.12" diff --git a/tests/cloud_tests.rs b/tests/cloud_tests.rs new file mode 100644 index 0000000..94adbfe --- /dev/null +++ b/tests/cloud_tests.rs @@ -0,0 +1,189 @@ +use windows_ssh_agent::{CloudProvider, CloudError}; +use async_trait::async_trait; +use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; +use std::collections::HashMap; +use std::sync::Arc; +use tokio::sync::Mutex; + +// Structure Mock pour simuler le stockage +#[derive(Debug, Default)] +struct MockKeyStore { + keys: HashMap>, +} + +// Mock pour AWS +#[derive(Debug, Default)] +struct MockAWSProvider { + store: Arc>, +} + +#[async_trait] +impl CloudProvider for MockAWSProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("mock_aws_key_{}", chrono::Utc::now().timestamp()); + let mut store = self.store.lock().await; + store.keys.insert(key_id.clone(), key.to_vec()); + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + let store = self.store.lock().await; + store + .keys + .get(id) + .cloned() + .ok_or_else(|| CloudError::RetrievalError("Key not found".to_string())) + } + + async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { + // Simuler une signature simple pour les tests + Ok(data.iter().map(|b| !b).collect()) + } +} + +// Mock pour Azure +#[derive(Debug, Default)] +struct MockAzureProvider { + store: Arc>, +} + +#[async_trait] +impl CloudProvider for MockAzureProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("mock_azure_key_{}", chrono::Utc::now().timestamp()); + let mut store = self.store.lock().await; + store.keys.insert(key_id.clone(), key.to_vec()); + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + let store = self.store.lock().await; + store + .keys + .get(id) + .cloned() + .ok_or_else(|| CloudError::RetrievalError("Key not found".to_string())) + } + + async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { + // Simuler une signature simple pour les tests + Ok(BASE64.encode(data).into_bytes()) + } +} + +// Mock pour GCP +#[derive(Debug, Default)] +struct MockGCPProvider { + store: Arc>, +} + +#[async_trait] +impl CloudProvider for MockGCPProvider { + async fn store_key(&self, key: &[u8]) -> Result { + let key_id = format!("mock_gcp_key_{}", chrono::Utc::now().timestamp()); + let mut store = self.store.lock().await; + store.keys.insert(key_id.clone(), key.to_vec()); + Ok(key_id) + } + + async fn retrieve_key(&self, id: &str) -> Result, CloudError> { + let store = self.store.lock().await; + store + .keys + .get(id) + .cloned() + .ok_or_else(|| CloudError::RetrievalError("Key not found".to_string())) + } + + async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { + // Simuler une signature simple pour les tests + Ok(data.repeat(2)) + } +} + +// Tests +#[tokio::test] +async fn test_aws_provider() -> Result<(), Box> { + let provider = MockAWSProvider::default(); + + // Test key storage and retrieval + let test_key = b"test_aws_key"; + let key_id = provider.store_key(test_key).await?; + let retrieved_key = provider.retrieve_key(&key_id).await?; + assert_eq!(test_key.to_vec(), retrieved_key); + + // Test signing + let test_data = b"test_data"; + let signature = provider.sign_data(&key_id, test_data).await?; + assert!(!signature.is_empty()); + + // Test error case + let result = provider.retrieve_key("nonexistent_key").await; + assert!(result.is_err()); + + Ok(()) +} + +#[tokio::test] +async fn test_azure_provider() -> Result<(), Box> { + let provider = MockAzureProvider::default(); + + // Test key storage and retrieval + let test_key = b"test_azure_key"; + let key_id = provider.store_key(test_key).await?; + let retrieved_key = provider.retrieve_key(&key_id).await?; + assert_eq!(test_key.to_vec(), retrieved_key); + + // Test signing + let test_data = b"test_data"; + let signature = provider.sign_data(&key_id, test_data).await?; + assert!(!signature.is_empty()); + + // Test error case + let result = provider.retrieve_key("nonexistent_key").await; + assert!(result.is_err()); + + Ok(()) +} + +#[tokio::test] +async fn test_gcp_provider() -> Result<(), Box> { + let provider = MockGCPProvider::default(); + + // Test key storage and retrieval + let test_key = b"test_gcp_key"; + let key_id = provider.store_key(test_key).await?; + let retrieved_key = provider.retrieve_key(&key_id).await?; + assert_eq!(test_key.to_vec(), retrieved_key); + + // Test signing + let test_data = b"test_data"; + let signature = provider.sign_data(&key_id, test_data).await?; + assert!(!signature.is_empty()); + + // Test error case + let result = provider.retrieve_key("nonexistent_key").await; + assert!(result.is_err()); + + Ok(()) +} + +// Test des cas d'erreur spécifiques +#[tokio::test] +async fn test_error_cases() -> Result<(), Box> { + let provider = MockAWSProvider::default(); + + // Test avec une clé invalide + let result = provider.retrieve_key("invalid_key").await; + assert!(matches!(result, Err(CloudError::RetrievalError(_)))); + + // Test avec des données vides + let result = provider.store_key(&[]).await; + assert!(result.is_ok()); // Devrait accepter une clé vide + + // Test de signature avec une clé invalide + let result = provider.sign_data("invalid_key", b"test_data").await; + assert!(!result.is_err()); // Notre mock ne vérifie pas la validité de la clé pour la signature + + Ok(()) +} \ No newline at end of file From da000ea49696b663af559a7d2389637cefa0ccd3 Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Sat, 1 Feb 2025 10:55:55 +0100 Subject: [PATCH 7/8] fix: format --- tests/cloud_tests.rs | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/tests/cloud_tests.rs b/tests/cloud_tests.rs index 94adbfe..3aea0cf 100644 --- a/tests/cloud_tests.rs +++ b/tests/cloud_tests.rs @@ -1,9 +1,9 @@ -use windows_ssh_agent::{CloudProvider, CloudError}; use async_trait::async_trait; use base64::{engine::general_purpose::STANDARD as BASE64, Engine}; use std::collections::HashMap; use std::sync::Arc; use tokio::sync::Mutex; +use windows_ssh_agent::{CloudError, CloudProvider}; // Structure Mock pour simuler le stockage #[derive(Debug, Default)] @@ -105,7 +105,7 @@ impl CloudProvider for MockGCPProvider { #[tokio::test] async fn test_aws_provider() -> Result<(), Box> { let provider = MockAWSProvider::default(); - + // Test key storage and retrieval let test_key = b"test_aws_key"; let key_id = provider.store_key(test_key).await?; @@ -116,7 +116,7 @@ async fn test_aws_provider() -> Result<(), Box> { let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; assert!(!signature.is_empty()); - + // Test error case let result = provider.retrieve_key("nonexistent_key").await; assert!(result.is_err()); @@ -127,7 +127,7 @@ async fn test_aws_provider() -> Result<(), Box> { #[tokio::test] async fn test_azure_provider() -> Result<(), Box> { let provider = MockAzureProvider::default(); - + // Test key storage and retrieval let test_key = b"test_azure_key"; let key_id = provider.store_key(test_key).await?; @@ -138,7 +138,7 @@ async fn test_azure_provider() -> Result<(), Box> { let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; assert!(!signature.is_empty()); - + // Test error case let result = provider.retrieve_key("nonexistent_key").await; assert!(result.is_err()); @@ -149,7 +149,7 @@ async fn test_azure_provider() -> Result<(), Box> { #[tokio::test] async fn test_gcp_provider() -> Result<(), Box> { let provider = MockGCPProvider::default(); - + // Test key storage and retrieval let test_key = b"test_gcp_key"; let key_id = provider.store_key(test_key).await?; @@ -160,7 +160,7 @@ async fn test_gcp_provider() -> Result<(), Box> { let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; assert!(!signature.is_empty()); - + // Test error case let result = provider.retrieve_key("nonexistent_key").await; assert!(result.is_err()); @@ -186,4 +186,4 @@ async fn test_error_cases() -> Result<(), Box> { assert!(!result.is_err()); // Notre mock ne vérifie pas la validité de la clé pour la signature Ok(()) -} \ No newline at end of file +} From cb7aa3ae6c675819737afe6fbaac9980b115a77f Mon Sep 17 00:00:00 2001 From: Chahine-tech Date: Sat, 1 Feb 2025 11:06:25 +0100 Subject: [PATCH 8/8] fix: format --- tests/cloud_tests.rs | 70 +++++++++++++++++++++++++------------------- 1 file changed, 40 insertions(+), 30 deletions(-) diff --git a/tests/cloud_tests.rs b/tests/cloud_tests.rs index 3aea0cf..3557423 100644 --- a/tests/cloud_tests.rs +++ b/tests/cloud_tests.rs @@ -5,13 +5,13 @@ use std::sync::Arc; use tokio::sync::Mutex; use windows_ssh_agent::{CloudError, CloudProvider}; -// Structure Mock pour simuler le stockage +// Mock key storage for testing purposes #[derive(Debug, Default)] struct MockKeyStore { keys: HashMap>, } -// Mock pour AWS +// AWS Provider Mock Implementation #[derive(Debug, Default)] struct MockAWSProvider { store: Arc>, @@ -36,12 +36,12 @@ impl CloudProvider for MockAWSProvider { } async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { - // Simuler une signature simple pour les tests + // Simple bitwise NOT signature simulation Ok(data.iter().map(|b| !b).collect()) } } -// Mock pour Azure +// Azure Provider Mock Implementation #[derive(Debug, Default)] struct MockAzureProvider { store: Arc>, @@ -66,12 +66,12 @@ impl CloudProvider for MockAzureProvider { } async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { - // Simuler une signature simple pour les tests + // Base64 encoded data simulation Ok(BASE64.encode(data).into_bytes()) } } -// Mock pour GCP +// GCP Provider Mock Implementation #[derive(Debug, Default)] struct MockGCPProvider { store: Arc>, @@ -96,30 +96,30 @@ impl CloudProvider for MockGCPProvider { } async fn sign_data(&self, _key_id: &str, data: &[u8]) -> Result, CloudError> { - // Simuler une signature simple pour les tests + // Double data simulation Ok(data.repeat(2)) } } -// Tests +// Test Suite #[tokio::test] async fn test_aws_provider() -> Result<(), Box> { let provider = MockAWSProvider::default(); - // Test key storage and retrieval + // Test key lifecycle operations let test_key = b"test_aws_key"; let key_id = provider.store_key(test_key).await?; let retrieved_key = provider.retrieve_key(&key_id).await?; assert_eq!(test_key.to_vec(), retrieved_key); - // Test signing + // Test signature generation let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; - assert!(!signature.is_empty()); + assert!(!signature.is_empty(), "Signature should not be empty"); - // Test error case + // Test error handling for non-existent key let result = provider.retrieve_key("nonexistent_key").await; - assert!(result.is_err()); + assert!(result.is_err(), "Should return error for non-existent key"); Ok(()) } @@ -128,20 +128,20 @@ async fn test_aws_provider() -> Result<(), Box> { async fn test_azure_provider() -> Result<(), Box> { let provider = MockAzureProvider::default(); - // Test key storage and retrieval + // Validate key storage and retrieval let test_key = b"test_azure_key"; let key_id = provider.store_key(test_key).await?; let retrieved_key = provider.retrieve_key(&key_id).await?; assert_eq!(test_key.to_vec(), retrieved_key); - // Test signing + // Verify signature format let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; - assert!(!signature.is_empty()); + assert!(!signature.is_empty(), "Azure signature should not be empty"); - // Test error case + // Validate error case let result = provider.retrieve_key("nonexistent_key").await; - assert!(result.is_err()); + assert!(result.is_err(), "Azure should error on missing key"); Ok(()) } @@ -150,40 +150,50 @@ async fn test_azure_provider() -> Result<(), Box> { async fn test_gcp_provider() -> Result<(), Box> { let provider = MockGCPProvider::default(); - // Test key storage and retrieval + // Test basic operations let test_key = b"test_gcp_key"; let key_id = provider.store_key(test_key).await?; let retrieved_key = provider.retrieve_key(&key_id).await?; assert_eq!(test_key.to_vec(), retrieved_key); - // Test signing + // Check signature format let test_data = b"test_data"; let signature = provider.sign_data(&key_id, test_data).await?; - assert!(!signature.is_empty()); + assert_eq!( + signature, + test_data.repeat(2), + "GCP signature should be doubled data" + ); - // Test error case + // Test error scenario let result = provider.retrieve_key("nonexistent_key").await; - assert!(result.is_err()); + assert!(result.is_err(), "GCP should return error for missing key"); Ok(()) } -// Test des cas d'erreur spécifiques +// Error Case Validation #[tokio::test] async fn test_error_cases() -> Result<(), Box> { let provider = MockAWSProvider::default(); - // Test avec une clé invalide + // Test invalid key retrieval let result = provider.retrieve_key("invalid_key").await; - assert!(matches!(result, Err(CloudError::RetrievalError(_)))); + assert!( + matches!(result, Err(CloudError::RetrievalError(_))), + "Should return RetrievalError type" + ); - // Test avec des données vides + // Test empty key storage let result = provider.store_key(&[]).await; - assert!(result.is_ok()); // Devrait accepter une clé vide + assert!(result.is_ok(), "Should accept empty keys for storage"); - // Test de signature avec une clé invalide + // Test signature with invalid key (mock doesn't validate keys) let result = provider.sign_data("invalid_key", b"test_data").await; - assert!(!result.is_err()); // Notre mock ne vérifie pas la validité de la clé pour la signature + assert!( + result.is_ok(), + "Mock implementation should accept any key ID" + ); Ok(()) }