Skip to content

Commit

Permalink
Merge pull request #441 from sigstore/dependabot/cargo/rustls-webpki-…
Browse files Browse the repository at this point in the history
…0.103

build(deps): update rustls-webpki requirement from 0.102 to 0.103
  • Loading branch information
flavio authored Feb 26, 2025
2 parents 8639a22 + 5dd4d99 commit c4c7adf
Show file tree
Hide file tree
Showing 10 changed files with 13 additions and 13 deletions.
4 changes: 3 additions & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -155,6 +155,7 @@ pkcs8 = { version = "0.10", default-features = false, features = [
"pkcs5",
"std",
] }
pki-types = { package = "rustls-pki-types", version = "1.11", default-features = false }
rand = { version = "0.8", default-features = false, features = [
"getrandom",
"std",
Expand All @@ -166,7 +167,8 @@ reqwest = { version = "0.12", default-features = false, features = [
], optional = true }
ring = { version = "0.17", default-features = false, optional = true }
rsa = { version = "0.9", default-features = false, features = ["std"] }
rustls-webpki = { version = "0.102", default-features = false, features = [
rustls-webpki = { version = "0.103", default-features = false, features = [
"ring",
"std",
] }
scrypt = { version = "0.11", default-features = false, features = [
Expand Down
2 changes: 1 addition & 1 deletion src/bundle/verify/verifier.rs
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,10 @@
use std::io::{self, Read};

use pki_types::{CertificateDer, UnixTime};
use sha2::{Digest, Sha256};
use tokio::io::{AsyncRead, AsyncReadExt};
use tracing::debug;
use webpki::types::{CertificateDer, UnixTime};
use x509_cert::der::Encode;

use crate::{
Expand Down
2 changes: 1 addition & 1 deletion src/cosign/client_builder.rs
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@
// See the License for the specific language governing permissions and
// limitations under the License.

use pki_types::CertificateDer;
use tracing::info;
use webpki::types::CertificateDer;

use super::client::Client;
use crate::crypto::SigningScheme;
Expand Down
2 changes: 1 addition & 1 deletion src/cosign/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -281,8 +281,8 @@ where

#[cfg(test)]
mod tests {
use pki_types::CertificateDer;
use serde_json::json;
use webpki::types::CertificateDer;

use super::constraint::{AnnotationMarker, PrivateKeySigner};
use super::verification_constraint::cert_subject_email_verifier::StringVerifier;
Expand Down
2 changes: 1 addition & 1 deletion src/cosign/signature_layers.rs
Original file line number Diff line number Diff line change
Expand Up @@ -435,7 +435,7 @@ impl CertificateSignature {
// ensure the certificate has been issued by Fulcio
fulcio_cert_pool.verify_pem_cert(
cert_pem,
Some(webpki::types::UnixTime::since_unix_epoch(
Some(pki_types::UnixTime::since_unix_epoch(
cert.tbs_certificate.validity.not_before.to_unix_duration(),
)),
)?;
Expand Down
2 changes: 1 addition & 1 deletion src/cosign/verification_constraint/certificate_verifier.rs
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
use chrono::{DateTime, Utc};
use pkcs8::der::Decode;
use pki_types::CertificateDer;
use tracing::warn;
use webpki::types::CertificateDer;
use x509_cert::Certificate;

use super::VerificationConstraint;
Expand Down
6 changes: 2 additions & 4 deletions src/crypto/certificate_pool.rs
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,8 @@
// limitations under the License.

use const_oid::db::rfc5280::ID_KP_CODE_SIGNING;
use webpki::{
types::{CertificateDer, TrustAnchor, UnixTime},
EndEntityCert, KeyUsage, VerifiedPath,
};
use pki_types::{CertificateDer, TrustAnchor, UnixTime};
use webpki::{EndEntityCert, KeyUsage, VerifiedPath};

use crate::errors::{Result as SigstoreResult, SigstoreError};

Expand Down
2 changes: 1 addition & 1 deletion src/registry/config.rs
Original file line number Diff line number Diff line change
Expand Up @@ -15,9 +15,9 @@

//! Set of structs and enums used to define how to interact with OCI registries
use pki_types::CertificateDer;
use serde::Serialize;
use std::cmp::Ordering;
use webpki::types::CertificateDer;

use crate::errors;

Expand Down
2 changes: 1 addition & 1 deletion src/trust/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
// See the License for the specific language governing permissions and
// limitations under the License.

use webpki::types::CertificateDer;
use pki_types::CertificateDer;

#[cfg_attr(docsrs, doc(cfg(feature = "sigstore-trust-root")))]
#[cfg(feature = "sigstore-trust-root")]
Expand Down
2 changes: 1 addition & 1 deletion src/trust/sigstore/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,13 @@ use sha2::{Digest, Sha256};
use std::path::Path;
use tokio_util::bytes::BytesMut;

use pki_types::CertificateDer;
use sigstore_protobuf_specs::dev::sigstore::{
common::v1::TimeRange,
trustroot::v1::{CertificateAuthority, TransparencyLogInstance, TrustedRoot},
};
use tough::TargetName;
use tracing::debug;
use webpki::types::CertificateDer;

mod constants;

Expand Down

0 comments on commit c4c7adf

Please sign in to comment.