Alex
166d74649a
woodpecker CI
2024-03-20 17:45:09 +01:00
Alex
58ac0e3758
Merge pull request 'STUN actor: try to avoid ip address flapping' ( #21 ) from stun-keep-values into main
...
Reviewed-on: Deuxfleurs/diplonat#21
2024-01-16 15:05:01 +00:00
Alex
843104dad7
stun actor: add back log message to inform of autodiscovery result
2024-01-16 15:51:36 +01:00
Alex
6613ea347d
stun actor: if no address is found but an address existed <15m ago, keep it
2024-01-16 15:38:20 +01:00
Alex
097a2a029d
refactor stun_actor
2024-01-16 15:24:34 +01:00
Alex
5a4bd88903
dockerfile: update rust version
2024-01-16 15:21:45 +01:00
Alex
05872634a4
Merge pull request 'public IP address autodiscovery' ( #20 ) from stun into main
...
Reviewed-on: Deuxfleurs/diplonat#20
2023-04-21 09:56:21 +00:00
Alex
f5fc635b75
match numeric protocol values
2023-04-20 14:53:20 +02:00
Alex
d27173a2b7
debug
2023-04-20 14:29:38 +02:00
Alex
48da5b61ac
better error handling
2023-04-20 14:14:30 +02:00
Alex
21ab77b828
Remove ACME options from tests
2023-04-05 09:51:50 +02:00
Alex
71bfd5be2d
Remove ACME config, not used as we are doing ACME in Tricot now
2023-04-05 09:50:26 +02:00
Alex
c356c4d1c4
IPv6-only mode
2023-04-05 09:47:58 +02:00
Alex
f410230240
parse private_ip earlier
2023-04-04 19:06:33 +02:00
Alex
b3f76f272a
Remove .rustfmt.toml and move to standard rustfmt format (4 spaces)
2023-04-04 18:48:52 +02:00
Alex
2d39adcabb
cargo fmt
2023-04-04 18:48:10 +02:00
Alex
615f926618
Add STUN actor that saves autodiscovered IPv4/IPv6 to Consul
2023-04-04 18:46:14 +02:00
Alex
e64be9e881
Merge pull request 'firewall: open ports in ipv6 as well as ipv4 (using ip6tables)' ( #19 ) from fw-ipv6 into main
...
Reviewed-on: Deuxfleurs/diplonat#19
2023-04-04 12:13:19 +00:00
Alex
846c4344aa
firewall: open ports in ipv6 as well as ipv4 (using ip6tables)
2023-04-04 13:33:54 +02:00
Alex
eba95c9b28
Merge pull request 'CI: make rustfmt work in nix' ( #17 ) from ci-fmt into main
...
Reviewed-on: Deuxfleurs/diplonat#17
2022-12-02 11:38:34 +00:00
Alex
75aa6405f2
CI: make rustfmt work in nix
2022-12-02 12:36:55 +01:00
Alex
f306e8dc8d
Merge pull request 'Make repoa Nix flake' ( #16 ) from nix-flake into main
...
Reviewed-on: Deuxfleurs/diplonat#16
2022-12-01 16:51:20 +00:00
Alex
f8431271d9
Merge branch 'consul-tls' into nix-flake
2022-12-01 17:50:46 +01:00
Alex
2a910c7af2
Default value for skip tls parameter
2022-12-01 17:49:57 +01:00
Alex
04528d1e60
Make repo a nix flake
2022-12-01 17:38:04 +01:00
Alex
e7f6c15bc1
Add possibility to skip tls verification for consul
2022-08-24 18:22:00 +02:00
Quentin
862e8ce876
Add license in the readme
2022-04-23 11:58:34 +02:00
Quentin
5483db8dd4
Add the AGPLv3 license
2022-04-23 11:57:06 +02:00
Alex
730c9049ad
Update Rust version in docker build
2021-12-30 20:49:48 +01:00
Alex
04bdd029fe
Add TLS support for Consul
2021-12-30 20:42:56 +01:00
adrien
4560622fa1
Merge pull request 'Allow Diplonat to automatically detect it's private IP' ( #12 ) from autodetect-private-ip into main
...
Reviewed-on: Deuxfleurs/diplonat#12
2021-12-28 11:56:12 +01:00
adrien
7760b9c58f
repaired test, now that private IP is an Option
2021-12-28 10:43:10 +01:00
Alex
3b9e75634a
Allow Diplonat to automatically detect it's private IP
2021-12-25 19:23:18 +01:00
Quentin
4d4d453afa
Merge pull request 'Extensively use rustfmt' ( #11 ) from quality/rustfmt into main
...
Reviewed-on: Deuxfleurs/diplonat#11
2021-09-20 16:06:02 +02:00
Quentin
68cb4d5482
Use the official rust image
2021-09-20 16:01:42 +02:00
Quentin
fd3a153103
Fix the CONTRIBUTING doc for the new formatting
2021-09-20 15:18:49 +02:00
Quentin
7d478d9976
Stricter Rust formating rules and build in the CI
2021-09-20 15:13:16 +02:00
Quentin
2bbc910999
Merge pull request 'added rustfmt, a guide about this, and a CI job to enforce code quality' ( #10 ) from adrien/diplonat:meta/formating into main
...
Reviewed-on: Deuxfleurs/diplonat#10
2021-09-17 10:06:51 +02:00
adrien
bf226d077e
added a line to CI to actually install rustfmt on the runner
continuous-integration/drone/push Build is passing
2021-09-11 16:38:09 +02:00
adrien
f720070905
added rustfmt: a rustfmt.toml file diescribing syntax (soft tabs of 2 spaces), a CONTRIBUTING.md file to explain how to use rustfmt, a .drone.yml file to add code style checks in CI, 2 lines in README.md to present CONTRIBUTING.md, and applied rustfmt on the source
continuous-integration/drone/push Build is failing
2021-09-11 16:34:03 +02:00
Quentin
fa25c54e47
Merge pull request 'Environment parsing done with Serde Envy' ( #5 ) from adrien/diplonat:feature/config-handling into main
...
Reviewed-on: Deuxfleurs/diplonat#5
2021-08-19 08:32:53 +02:00
adrien
8b57fb2680
Merge pull request 'Edited README: declare system dependency to a TLS library' ( #4 ) from adrien/diplonat:main into main
...
Reviewed-on: Deuxfleurs/diplonat#4
2021-08-16 11:45:45 +02:00
LUXEY Adrien
0f114f2134
a last pass to remove warnings from my code
2021-08-16 11:34:42 +02:00
LUXEY Adrien
644e707956
environment.rs successfully replaced with new config/ configuration loader. No API changes, more tests, cleaner code: life is swell.
2021-08-16 11:19:16 +02:00
LUXEY Adrien
ae9550ce23
New configuration parsing using envy. Added minimal functionnality for
...
the future ACME parameters. Tests written and passing.
WIP: added envy dependncy and ConfigOpts structs that will constitute Diplonat's configuration
WIP: ConfigOpts from_env() and validate() methods written. No API change (the env names remain unchanged)! Now need to use our new ConfigOpts struct instead of Environment, and update references to the environment variables in the code.
WIP: RuntimeConfig with business logic done. Tests written, but they are all running from the same process - setting environment variables in each test produces incoherent results. Another solution for testing is needed.
WIP: tests are fully written using 'from_iter' and all passing
2021-08-16 10:26:06 +02:00
LUXEY Adrien
41b4786f78
edited README: declare system dependency to a TLS library
2021-08-14 18:08:48 +02:00
darkgallium
ade0090cdb
change image name
2020-07-13 19:34:04 +02:00
Quentin
7ec74a21d4
Merge pull request 'Automatically manage firewall rules (iptables) for services' ( #1 ) from add-firewall-rules into master
...
Reviewed-on: Deuxfleurs/diplonat#1
2020-07-04 17:16:21 +02:00
darkgallium
4f4b6b048d
corrections after review
2020-07-04 17:01:27 +02:00
darkgallium
a59ed38121
ensure chain jump is added only once
2020-06-28 19:05:36 +02:00