mirror of
https://github.com/ntex-rs/ntex.git
synced 2025-04-04 13:27:39 +03:00
prep release and update tests
This commit is contained in:
parent
d1071a1f18
commit
a57da1b3f3
8 changed files with 16 additions and 58 deletions
|
@ -1,6 +1,6 @@
|
||||||
[package]
|
[package]
|
||||||
name = "ntex-io"
|
name = "ntex-io"
|
||||||
version = "0.1.0-b.0"
|
version = "0.1.0-b.1"
|
||||||
authors = ["ntex contributors <team@ntex.rs>"]
|
authors = ["ntex contributors <team@ntex.rs>"]
|
||||||
description = "Utilities for encoding and decoding frames"
|
description = "Utilities for encoding and decoding frames"
|
||||||
keywords = ["network", "framework", "async", "futures"]
|
keywords = ["network", "framework", "async", "futures"]
|
||||||
|
|
|
@ -23,7 +23,7 @@ tokio = ["tok-io", "ntex-io/tokio"]
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
ntex-bytes = "0.1.8"
|
ntex-bytes = "0.1.8"
|
||||||
ntex-io = "0.1.0-b.0"
|
ntex-io = "0.1.0-b.1"
|
||||||
ntex-util = "0.1.3"
|
ntex-util = "0.1.3"
|
||||||
async-oneshot = "0.5.0"
|
async-oneshot = "0.5.0"
|
||||||
async-channel = "1.6.1"
|
async-channel = "1.6.1"
|
||||||
|
|
5
ntex-tls/CHANGES.md
Normal file
5
ntex-tls/CHANGES.md
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
# Changes
|
||||||
|
|
||||||
|
## [0.1.0-b.0] - 2021-12-19
|
||||||
|
|
||||||
|
* Initial impl
|
|
@ -46,7 +46,7 @@ ntex-macros = "0.1.3"
|
||||||
ntex-util = "0.1.3"
|
ntex-util = "0.1.3"
|
||||||
ntex-bytes = "0.1.8"
|
ntex-bytes = "0.1.8"
|
||||||
ntex-tls = "0.1.0-b.0"
|
ntex-tls = "0.1.0-b.0"
|
||||||
ntex-io = "0.1.0-b.0"
|
ntex-io = "0.1.0-b.1"
|
||||||
ntex-rt = { version = "0.4.0-b.0", default-features = false, features = ["tokio"] }
|
ntex-rt = { version = "0.4.0-b.0", default-features = false, features = ["tokio"] }
|
||||||
|
|
||||||
base64 = "0.13"
|
base64 = "0.13"
|
||||||
|
|
|
@ -148,7 +148,7 @@ async fn test_rustls() {
|
||||||
use std::{fs::File, io::BufReader};
|
use std::{fs::File, io::BufReader};
|
||||||
|
|
||||||
use ntex::web::HttpRequest;
|
use ntex::web::HttpRequest;
|
||||||
use rustls_pemfile::{certs, pkcs8_private_keys};
|
use rustls_pemfile::{certs, rsa_private_keys};
|
||||||
use tls_rustls::{Certificate, PrivateKey, ServerConfig as RustlsServerConfig};
|
use tls_rustls::{Certificate, PrivateKey, ServerConfig as RustlsServerConfig};
|
||||||
|
|
||||||
let addr = TestServer::unused_addr();
|
let addr = TestServer::unused_addr();
|
||||||
|
@ -165,7 +165,7 @@ async fn test_rustls() {
|
||||||
.iter()
|
.iter()
|
||||||
.map(|c| Certificate(c.to_vec()))
|
.map(|c| Certificate(c.to_vec()))
|
||||||
.collect();
|
.collect();
|
||||||
let keys = PrivateKey(pkcs8_private_keys(key_file).unwrap().remove(0));
|
let keys = PrivateKey(rsa_private_keys(key_file).unwrap().remove(0));
|
||||||
let config = RustlsServerConfig::builder()
|
let config = RustlsServerConfig::builder()
|
||||||
.with_safe_defaults()
|
.with_safe_defaults()
|
||||||
.with_no_client_auth()
|
.with_no_client_auth()
|
||||||
|
|
|
@ -852,7 +852,7 @@ async fn test_brotli_encoding_large_openssl_h2() {
|
||||||
async fn test_reading_deflate_encoding_large_random_rustls() {
|
async fn test_reading_deflate_encoding_large_random_rustls() {
|
||||||
use std::{fs::File, io::BufReader};
|
use std::{fs::File, io::BufReader};
|
||||||
|
|
||||||
use rustls_pemfile::{certs, pkcs8_private_keys};
|
use rustls_pemfile::{certs, rsa_private_keys};
|
||||||
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
||||||
|
|
||||||
let data = rand::thread_rng()
|
let data = rand::thread_rng()
|
||||||
|
@ -869,7 +869,7 @@ async fn test_reading_deflate_encoding_large_random_rustls() {
|
||||||
.iter()
|
.iter()
|
||||||
.map(|c| Certificate(c.to_vec()))
|
.map(|c| Certificate(c.to_vec()))
|
||||||
.collect();
|
.collect();
|
||||||
let keys = PrivateKey(pkcs8_private_keys(key_file).unwrap().remove(0));
|
let keys = PrivateKey(rsa_private_keys(key_file).unwrap().remove(0));
|
||||||
let config = ServerConfig::builder()
|
let config = ServerConfig::builder()
|
||||||
.with_safe_defaults()
|
.with_safe_defaults()
|
||||||
.with_no_client_auth()
|
.with_no_client_auth()
|
||||||
|
@ -908,7 +908,7 @@ async fn test_reading_deflate_encoding_large_random_rustls() {
|
||||||
#[cfg(all(feature = "rustls", feature = "openssl"))]
|
#[cfg(all(feature = "rustls", feature = "openssl"))]
|
||||||
#[ntex::test]
|
#[ntex::test]
|
||||||
async fn test_reading_deflate_encoding_large_random_rustls_h1() {
|
async fn test_reading_deflate_encoding_large_random_rustls_h1() {
|
||||||
use rustls_pemfile::{certs, pkcs8_private_keys};
|
use rustls_pemfile::{certs, rsa_private_keys};
|
||||||
use std::fs::File;
|
use std::fs::File;
|
||||||
use std::io::BufReader;
|
use std::io::BufReader;
|
||||||
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
||||||
|
@ -927,7 +927,7 @@ async fn test_reading_deflate_encoding_large_random_rustls_h1() {
|
||||||
.iter()
|
.iter()
|
||||||
.map(|c| Certificate(c.to_vec()))
|
.map(|c| Certificate(c.to_vec()))
|
||||||
.collect();
|
.collect();
|
||||||
let keys = PrivateKey(pkcs8_private_keys(key_file).unwrap().remove(0));
|
let keys = PrivateKey(rsa_private_keys(key_file).unwrap().remove(0));
|
||||||
let config = ServerConfig::builder()
|
let config = ServerConfig::builder()
|
||||||
.with_safe_defaults()
|
.with_safe_defaults()
|
||||||
.with_no_client_auth()
|
.with_no_client_auth()
|
||||||
|
@ -968,7 +968,7 @@ async fn test_reading_deflate_encoding_large_random_rustls_h1() {
|
||||||
async fn test_reading_deflate_encoding_large_random_rustls_h2() {
|
async fn test_reading_deflate_encoding_large_random_rustls_h2() {
|
||||||
use std::{fs::File, io::BufReader};
|
use std::{fs::File, io::BufReader};
|
||||||
|
|
||||||
use rustls_pemfile::{certs, pkcs8_private_keys};
|
use rustls_pemfile::{certs, rsa_private_keys};
|
||||||
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
use tls_rustls::{Certificate, PrivateKey, ServerConfig};
|
||||||
|
|
||||||
let data = rand::thread_rng()
|
let data = rand::thread_rng()
|
||||||
|
@ -985,7 +985,7 @@ async fn test_reading_deflate_encoding_large_random_rustls_h2() {
|
||||||
.iter()
|
.iter()
|
||||||
.map(|c| Certificate(c.to_vec()))
|
.map(|c| Certificate(c.to_vec()))
|
||||||
.collect();
|
.collect();
|
||||||
let keys = PrivateKey(pkcs8_private_keys(key_file).unwrap().remove(0));
|
let keys = PrivateKey(rsa_private_keys(key_file).unwrap().remove(0));
|
||||||
let config = ServerConfig::builder()
|
let config = ServerConfig::builder()
|
||||||
.with_safe_defaults()
|
.with_safe_defaults()
|
||||||
.with_no_client_auth()
|
.with_no_client_auth()
|
||||||
|
|
|
@ -1,19 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDEDCCAfgCCQCQdmIZc/Ib/jANBgkqhkiG9w0BAQsFADBKMQswCQYDVQQGEwJ1
|
|
||||||
czELMAkGA1UECAwCY2ExCzAJBgNVBAcMAnNmMSEwHwYJKoZIhvcNAQkBFhJmYWZo
|
|
||||||
cmQ5MUBnbWFpbC5jb20wHhcNMTkxMTE5MTEwNjU1WhcNMjkxMTE2MTEwNjU1WjBK
|
|
||||||
MQswCQYDVQQGEwJ1czELMAkGA1UECAwCY2ExCzAJBgNVBAcMAnNmMSEwHwYJKoZI
|
|
||||||
hvcNAQkBFhJmYWZocmQ5MUBnbWFpbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
|
||||||
DwAwggEKAoIBAQDcnaz12CKzUL7248V7Axhms/O9UQXfAdw0yolEfC3P5jADa/1C
|
|
||||||
+kLWKjAc2coqDSbGsrsR6KiH2g06Kunx+tSGqUO+Sct7HEehmxndiSwx/hfMWezy
|
|
||||||
XRe/olcHFTeCk/Tllz4xGEplhPua6GLhJygLOhAMiV8cwCYrgyPqsDduExLDFCqc
|
|
||||||
K2xntIPreumXpiE3QY4+MWyteiJko4IWDFf/UwwsdCY5MlFfw1F/Uv9vz7FfOfvu
|
|
||||||
GccHd/ex8cOwotUqd6emZb+0bVE24Sv8U+yLnHIVx/tOkxgMAnJEpAnf2G3Wp3zU
|
|
||||||
b2GJosbmfGaf+xTfnGGhTLLL7kCtva+NvZr5AgMBAAEwDQYJKoZIhvcNAQELBQAD
|
|
||||||
ggEBANftoL8zDGrjCwWvct8kOOqset2ukK8vjIGwfm88CKsy0IfSochNz2qeIu9R
|
|
||||||
ZuO7c0pfjmRkir9ZQdq9vXgG3ccL9UstFsferPH9W3YJ83kgXg3fa0EmCiN/0hwz
|
|
||||||
6Ij1ZBiN1j3+d6+PJPgyYFNu2nGwox5mJ9+aRAGe0/9c63PEOY8P2TI4HsiPmYSl
|
|
||||||
fFR8k/03vr6e+rTKW85BgctjvYKe/TnFxeCQ7dZ+na7vlEtch4tNmy6O/vEk2kCt
|
|
||||||
5jW0DUxhmRsv2wGmfFRI0+LotHjoXQQZi6nN5aGL3odaGF3gYwIVlZNd3AdkwDQz
|
|
||||||
BzG0ZwXuDDV9bSs3MfWEWcy4xuU=
|
|
||||||
-----END CERTIFICATE-----
|
|
|
@ -1,28 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDcnaz12CKzUL72
|
|
||||||
48V7Axhms/O9UQXfAdw0yolEfC3P5jADa/1C+kLWKjAc2coqDSbGsrsR6KiH2g06
|
|
||||||
Kunx+tSGqUO+Sct7HEehmxndiSwx/hfMWezyXRe/olcHFTeCk/Tllz4xGEplhPua
|
|
||||||
6GLhJygLOhAMiV8cwCYrgyPqsDduExLDFCqcK2xntIPreumXpiE3QY4+MWyteiJk
|
|
||||||
o4IWDFf/UwwsdCY5MlFfw1F/Uv9vz7FfOfvuGccHd/ex8cOwotUqd6emZb+0bVE2
|
|
||||||
4Sv8U+yLnHIVx/tOkxgMAnJEpAnf2G3Wp3zUb2GJosbmfGaf+xTfnGGhTLLL7kCt
|
|
||||||
va+NvZr5AgMBAAECggEBAKoU0UwzVgVCQgca8Jt2dnBvWYDhnxIfYAI/BvaKedMm
|
|
||||||
1ms87OKfB7oOiksjyI0E2JklH72dzZf2jm4CuZt5UjGC+xwPzlTaJ4s6hQVbBHyC
|
|
||||||
NRyxU1BCXtW5tThbrhD4OjxqjmLRJEIB9OunLtwAEQoeuFLB8Va7+HFhR+Zd9k3f
|
|
||||||
7aVA93pC5A50NRbZlke4miJ3Q8n7ZF0+UmxkBfm3fbqLk7aMWkoEKwLLTadjRlu1
|
|
||||||
bBp0YDStX66I/p1kujqBOdh6VpPvxFOa1sV9pq0jeiGc9YfSkzRSKzIn8GoyviFB
|
|
||||||
fHeszQdNlcnrSDSNnMABAw+ZpxUO7SCaftjwejEmKZUCgYEA+TY43VpmV95eY7eo
|
|
||||||
WKwGepiHE0fwQLuKGELmZdZI80tFi73oZMuiB5WzwmkaKGcJmm7KGE9KEvHQCo9j
|
|
||||||
xvmktBR0VEZH8pmVfun+4h6+0H7m/NKMBBeOyv/IK8jBgHjkkB6e6nmeR7CqTxCw
|
|
||||||
tf9tbajl1QN8gNzXZSjBDT/lanMCgYEA4qANOKOSiEARtgwyXQeeSJcM2uPv6zF3
|
|
||||||
ffM7vjSedtuEOHUSVeyBP/W8KDt7zyPppO/WNbURHS+HV0maS9yyj6zpVS2HGmbs
|
|
||||||
3fetswsQ+zYVdokW89x4oc2z4XOGHd1LcSlyhRwPt0u2g1E9L0irwTQLWU0npFmG
|
|
||||||
PRf7sN9+LeMCgYAGkDUDL2ROoB6gRa/7Vdx90hKMoXJkYgwLA4gJ2pDlR3A3c/Lw
|
|
||||||
5KQJyxmG3zm/IqeQF6be6QesZA30mT4peV2rGHbP2WH/s6fKReNelSy1VQJEWk8x
|
|
||||||
tGUgV4gwDwN5nLV4TjYlOrq+bJqvpmLhCC8bmj0jVQosYqSRl3cuICasnQKBgGlV
|
|
||||||
VO/Xb1su1EyWPK5qxRIeSxZOTYw2sMB01nbgxCqge0M2fvA6/hQ5ZlwY0cIEgits
|
|
||||||
YlcSMsMq/TAAANxz1vbaupUhlSMbZcsBvNV0Nk9c4vr2Wxm7hsJF9u66IEMvQUp2
|
|
||||||
pkjiMxfR9CHzF4orr9EcHI5EQ0Grbq5kwFKEfoRbAoGAcWoFPILeJOlp2yW/Ds3E
|
|
||||||
g2fQdI9BAamtEZEaslJmZMmsDTg5ACPcDkOSFEQIaJ7wLPXeZy74FVk/NrY5F8Gz
|
|
||||||
bjX9OD/xzwp852yW5L9r62vYJakAlXef5jI6CFdYKDDCcarU0S7W5k6kq9n+wrBR
|
|
||||||
i1NklYmUAMr2q59uJA5zsic=
|
|
||||||
-----END PRIVATE KEY-----
|
|
Loading…
Add table
Add a link
Reference in a new issue