Commit graph

264 commits

Author SHA1 Message Date
Ben K
93c4ab3748 corrected certficate path for docker container in docker readme 2021-04-10 15:55:18 +02:00
Johann150
34b333118e
update CHANGELOG 2021-04-10 14:54:09 +02:00
Johann150
695a63af48
added docker support (#52) 2021-04-10 14:51:53 +02:00
Ben K
7d7abce9a3 going back to compiling from source but with fewer layers 2021-04-10 14:24:46 +02:00
Ben K
1d0284e888 another try to fix my markdown 2021-04-10 11:50:28 +02:00
Ben K
83c21cb3e9 removed binary file that I accidentially commited 2021-04-10 11:03:04 +02:00
Ben K
a9355a0b8a improved markdown syntax 2021-04-10 10:56:17 +02:00
Ben K
bae20c9f3c changed dockerfile to use binary 2021-04-10 10:50:23 +02:00
Ben K
2e1800a375 added docker support 2021-04-09 11:57:03 +02:00
Johann150
b6122cd2c0
add some information about tests 2021-04-08 23:44:35 +02:00
Johann150
a650f24d24
fix port collision between username and password (#51) 2021-04-08 23:32:38 +02:00
Jack K
8e4d6eb97b
fix port collision between username and password
resolves #50
2021-04-08 21:53:44 +01:00
Johann150
6ce4afb884
fix another spelling mistake 2021-04-08 08:58:52 +02:00
Johann150
f1c71eafc0
update documents for next version 2021-04-08 08:39:44 +02:00
Johann150
1e8aa8ccf0
update changelog 2021-04-08 08:28:35 +02:00
Johann150
f85585155e
switch default cert signing algorithm to ECDSA
resolves #42
resolves #49

I did not expect support for Ed25519 to be so bad as to receive multiple
complaints about it. I did expect some problems, hence why I provided the
--ecdsa flag. I had hoped support would be better to drive those who still
do not support it (while again there is no reason to not support this
algorithm!) to use it.
2021-04-08 00:13:18 +02:00
Johann150
869a784b59
add tests for fragment and userinfo URLs 2021-04-08 00:11:47 +02:00
Johann150
ba9297eabf
implement stricter requirements for request URLs
Addresses changes in the specification, namely these stricter requirements:
0235100151/specification.gmi (L153-155)
2021-04-07 23:54:44 +02:00
Amplifi-Beats
26bda4be1b Update README.md
Changed the misspelling of current from "currrent" to "current"
2021-04-06 10:53:49 -07:00
Johann150
a5425e3a9a
update changelog 2021-03-28 22:27:30 +02:00
Johann150
4b1ad8be20
remove unnecessary feature, next version 2021-03-28 22:24:12 +02:00
Johann150
22ba3e497c
update changelog and homepage 2021-03-27 20:31:07 +01:00
Johann150
16d05c73a0
resolve clippy warning 2021-03-27 20:31:06 +01:00
Johann150
1a537d630f
automatically create certificate directory
resolves #44
2021-03-27 20:31:06 +01:00
Johann150
f290e10b16
Add install guide for Arch Linux (#47) 2021-03-27 20:12:06 +01:00
MidAutumnMoon
c31ab3717d
Add install guide for Arch Linux 2021-03-28 03:01:22 +08:00
Johann150
ee18e2145b
Merge pull request #45 from steko/patch-1
change example certificate file names to .der
2021-03-27 19:54:13 +01:00
Stefano Costa
fa1ed5a21b
change example certificate file names to .der 2021-03-27 19:11:07 +01:00
Johann150
8876c9771f
update documents for new version 2021-03-27 01:47:24 +01:00
Johann150
b4181ecd2f
update Debian install script 2021-03-27 01:21:38 +01:00
Johann150
61fc129dde
update changelog 2021-03-27 01:20:10 +01:00
Johann150
efb59bd224
update readme 2021-03-27 01:03:47 +01:00
Johann150
2213b055dc
add automatic certificate generation 2021-03-27 00:52:50 +01:00
Johann150
d24db63583
remove silent flag in favour of RUST_LOG 2021-03-26 20:33:45 +01:00
Johann150
2934350485
add function to check for cert of a domain 2021-03-26 12:49:31 +01:00
Johann150
e6f70722de
improve help texts 2021-03-25 21:42:24 +01:00
Johann150
c338696242
sort dependencies alphabetically 2021-03-25 20:45:57 +01:00
Johann150
b2d571de6b
add pull request number to CHANGELOG 2021-03-23 23:29:50 +01:00
Johann150
4c2d33491d
add capability for multiple certificates (#40) 2021-03-23 23:28:16 +01:00
Johann150
eec057515d
finish up for merge 2021-03-23 23:25:04 +01:00
Johann150
d1d3f0cbb5
transform panicking test into non-panicking test 2021-03-13 23:19:20 +01:00
Johann150
782e043083
fix tests for multiple certificates
The tests now actually check that a specific certificate is being used by only
loading the correct one into the trust chain while running the test. The
problem before was that openssl-req by default generates CA-capable certs which
are not accepted by rustls.
2021-03-11 22:24:10 +01:00
Johann150
b96cf3940b
add uninstall script 2021-03-10 23:07:04 +01:00
Johann150
ddc1f4ddb2
update Debian install script 2021-03-10 23:07:03 +01:00
Johann150
2ed6d2886e
Merge branch 'master' into multi-certs 2021-03-09 21:11:34 +01:00
Johann150
3ffe89b775
make all log lines uniform
Now also if the connection is never established. Use the nonexistent status
code 00 for that.
2021-03-07 00:04:22 +01:00
Johann150
d4324233c7
make log lines more uniform
Ensure there is something logged for the request if reading it actually failed.
Instead just write an empty quoted string.
2021-03-07 00:04:21 +01:00
Johann150
c6b34055e9
suppress log messages from other modules
resolves #30
2021-03-07 00:04:02 +01:00
Johann150
afd30c386c
implement clippy reccomendation 2021-03-03 23:17:35 +01:00
Johann150
5dbb4be864
improve comments 2021-03-03 23:09:29 +01:00