Skip to content

Commit

Permalink
Merge pull request #217 from iotaledger/release/version-updates
Browse files Browse the repository at this point in the history
Apply Version Updates From Current Changes
  • Loading branch information
felsweg-iota authored Jun 1, 2022
2 parents 0e147d4 + 4007927 commit a2d3ec1
Show file tree
Hide file tree
Showing 14 changed files with 305 additions and 130 deletions.
25 changes: 11 additions & 14 deletions .changes/release-candidate.md → client/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,32 +1,29 @@
---
"iota-stronghold": minor
"stronghold-engine": minor
"stronghold-derive": minor
"stronghold-runtime": minor
"stronghold-p2p": minor
"stronghold-rlu": minor
---
- Refactor Sink and Stream implementation for EventChannel
# Changelog

## \[0.5.0]

- - Refactor Sink and Stream implementation for EventChannel
- Add `CopyRecord` procedure.
- In the `StrongholdP2p` Interface enable / disable mdns and relay functionality on init via config flags in the `StrongholdP2pBuilder`. Per default, both are enabled.
- In the `Stronghold` client interface enable / disable mdns and relay in the `NetworkConfig` when spawning a new p2p-network actor. Per default, both are disabled.
- Use `libp2p::swarm::toggle` to enable/ disable relay and mdns
- Persist config and keypair of stronghold-p2p in client
- Persist config and keypair of stronghold-p2p in client
- Implement messages to write the keypair used for `StrongholdP2p` in the vault and derive the `PeerId` and a new noise `AuthenticKeypair` from it.
- Implement API for the Stronghold Procedures
- Make stronghold interface clonable
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Patch Stronghold engine fuzzer.
- Patch crypto.rs version v0.7 -> v0.8.
- Persist the state of stronghold-p2p in the `SecureClient` by serializing the `NetworkConfig` and writing it to the store.
- Allow loading stored states into the `NetworkActor` on init.
- Allow reuse of same `Keypair` that is stored in the vault.
- Software transactional memory framework as replacement for actix actor system
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Extract `random` functions from `test_utils` into own module.
- Remove Riker as dependency from utils.
- Introduce KeyProvider instead of repeatedly providing a passphrase.
- Introduce non-contiguous memory types for secure key handling.
- Introduce non-contiguous memory types for secure key handling.
- Abstract over locked and encrypted data types for use internally.
- Stronghold interface rewrite to work on type level with Stronghold as root type, Client as secure container, Store as insecure storage and ClientVault as vault access.
- [3816aef5](https://www.github.com/iotaledger/stronghold.rs/commit/3816aef5111684ffbdbd12ed7f93b887e43e7a02) chore(release-doc): clean up outdated release notes, merge existing into one on 2022-05-31
97 changes: 53 additions & 44 deletions client/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,57 +1,66 @@
[package]
name = "iota_stronghold"
version = "0.4.0"
edition = "2021"
license = "Apache-2.0"
readme = "README.md"
description = "Client interface for Stronghold"
authors = ["IOTA Stiftung"]
keywords = [ "iota", "stronghold", "security" ]
categories = [ "security" ]
homepage = "https://wiki.iota.org/stronghold.rs/welcome"
repository = "https://github.com/iotaledger/stronghold.rs"
name = "iota_stronghold"
version = "0.5.0"
edition = "2021"
license = "Apache-2.0"
readme = "README.md"
description = "Client interface for Stronghold"
authors = [ "IOTA Stiftung" ]
keywords = [ "iota", "stronghold", "security" ]
categories = [ "security" ]
homepage = "https://wiki.iota.org/stronghold.rs/welcome"
repository = "https://github.com/iotaledger/stronghold.rs"

[features]
default = ["std"]
p2p = ["std", "futures", "pin-project", "stronghold-p2p"]
std = []
default = [ "std" ]
p2p = [ "std", "futures", "pin-project", "stronghold-p2p" ]
std = [ ]

[dependencies]
thiserror = { version = "1.0.30" }
zeroize = { version = "1.4.3", features = ["zeroize_derive"] }
serde = { version = "1.0", features = [ "derive" ] }
iota-crypto = { version = "0.8.0", features = [ "aes", "aes-kw", "random", "ed25519", "sha", "hmac", "bip39-en", "bip39-jp", "slip10", "chacha", "x25519" ] }
hkdf = { version = "0.11" }
bincode = { version = "1.3" }
pin-project = { version = "1.0.10", optional = true }
futures = { version = "0.3.21", optional = true }


# internal crates
stronghold-p2p = { package = "stronghold-p2p", path = "../p2p", version = "0.3.0", optional = true }
rlu = { package = "stronghold-rlu", path = "../rlu/" }
engine = { package = "stronghold_engine", path = "../engine" }
stronghold_utils = { package = "stronghold-utils", path = "../utils/" }
stronghold_derive = { package = "stronghold-derive", path = "../derive" }
thiserror = { version = "1.0.30" }
zeroize = { version = "1.4.3", features = [ "zeroize_derive" ] }
serde = { version = "1.0", features = [ "derive" ] }
iota-crypto = { version = "0.8.0", features = [
"aes",
"aes-kw",
"random",
"ed25519",
"sha",
"hmac",
"bip39-en",
"bip39-jp",
"slip10",
"chacha",
"x25519"
] }
hkdf = { version = "0.11" }
bincode = { version = "1.3" }
pin-project = { version = "1.0.10", optional = true }
futures = { version = "0.3.21", optional = true }
stronghold-p2p = { package = "stronghold-p2p", path = "../p2p", version = "0.4.0", optional = true }
rlu = { package = "stronghold-rlu", path = "../rlu/" }
engine = { package = "stronghold_engine", path = "../engine" }
stronghold_utils = { package = "stronghold-utils", path = "../utils/" }
stronghold_derive = { package = "stronghold-derive", path = "../derive" }

[dev-dependencies]
tokio = { version = "1.15.0", features = ["full"] }
criterion = { version = "0.3", features = ["async_tokio"] }
env_logger = { version = "0.9.0" }
ctor = { version = "0.1.21"}
rand = { version = "0.8.4" }
clap = { version = "3.1.6", features = [ "derive" ]}
log = { version = "0.4.14" }
base64 = { version = "0.13.0" }
regex = { version = "1.5.5" }
libc = { version = "0.2" }
tokio = { version = "1.15.0", features = [ "full" ] }
criterion = { version = "0.3", features = [ "async_tokio" ] }
env_logger = { version = "0.9.0" }
ctor = { version = "0.1.21" }
rand = { version = "0.8.4" }
clap = { version = "3.1.6", features = [ "derive" ] }
log = { version = "0.4.14" }
base64 = { version = "0.13.0" }
regex = { version = "1.5.5" }
libc = { version = "0.2" }

[[bench]]
name = "config"
harness = false
name = "config"
harness = false

[[example]]
name = "cli"
name = "cli"

[[example]]
name = "p2p"
name = "p2p"
28 changes: 28 additions & 0 deletions derive/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,33 @@
# Changelog

## \[0.3.0]

- - Refactor Sink and Stream implementation for EventChannel
- Add `CopyRecord` procedure.
- In the `StrongholdP2p` Interface enable / disable mdns and relay functionality on init via config flags in the `StrongholdP2pBuilder`. Per default, both are enabled.
- In the `Stronghold` client interface enable / disable mdns and relay in the `NetworkConfig` when spawning a new p2p-network actor. Per default, both are disabled.
- Use `libp2p::swarm::toggle` to enable/ disable relay and mdns
- Persist config and keypair of stronghold-p2p in client
- Implement messages to write the keypair used for `StrongholdP2p` in the vault and derive the `PeerId` and a new noise `AuthenticKeypair` from it.
- Implement API for the Stronghold Procedures
- Make stronghold interface clonable
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Patch Stronghold engine fuzzer.
- Patch crypto.rs version v0.7 -> v0.8.
- Persist the state of stronghold-p2p in the `SecureClient` by serializing the `NetworkConfig` and writing it to the store.
- Allow loading stored states into the `NetworkActor` on init.
- Allow reuse of same `Keypair` that is stored in the vault.
- Software transactional memory framework as replacement for actix actor system
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Extract `random` functions from `test_utils` into own module.
- Remove Riker as dependency from utils.
- Introduce KeyProvider instead of repeatedly providing a passphrase.
- Introduce non-contiguous memory types for secure key handling.
- Abstract over locked and encrypted data types for use internally.
- Stronghold interface rewrite to work on type level with Stronghold as root type, Client as secure container, Store as insecure storage and ClientVault as vault access.
- [3816aef5](https://www.github.com/iotaledger/stronghold.rs/commit/3816aef5111684ffbdbd12ed7f93b887e43e7a02) chore(release-doc): clean up outdated release notes, merge existing into one on 2022-05-31

## \[0.2.0]

- Merged Store, Vault and Snapshot into a single crate called Stronghold-Engine.
Expand Down
2 changes: 1 addition & 1 deletion derive/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "stronghold-derive"
version = "0.2.0"
version = "0.3.0"
authors = [
"IOTA Stiftung",
"tensor-programming <[email protected]>"
Expand Down
28 changes: 28 additions & 0 deletions engine/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,33 @@
# Changelog

## \[0.5.0]

- - Refactor Sink and Stream implementation for EventChannel
- Add `CopyRecord` procedure.
- In the `StrongholdP2p` Interface enable / disable mdns and relay functionality on init via config flags in the `StrongholdP2pBuilder`. Per default, both are enabled.
- In the `Stronghold` client interface enable / disable mdns and relay in the `NetworkConfig` when spawning a new p2p-network actor. Per default, both are disabled.
- Use `libp2p::swarm::toggle` to enable/ disable relay and mdns
- Persist config and keypair of stronghold-p2p in client
- Implement messages to write the keypair used for `StrongholdP2p` in the vault and derive the `PeerId` and a new noise `AuthenticKeypair` from it.
- Implement API for the Stronghold Procedures
- Make stronghold interface clonable
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Patch Stronghold engine fuzzer.
- Patch crypto.rs version v0.7 -> v0.8.
- Persist the state of stronghold-p2p in the `SecureClient` by serializing the `NetworkConfig` and writing it to the store.
- Allow loading stored states into the `NetworkActor` on init.
- Allow reuse of same `Keypair` that is stored in the vault.
- Software transactional memory framework as replacement for actix actor system
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Extract `random` functions from `test_utils` into own module.
- Remove Riker as dependency from utils.
- Introduce KeyProvider instead of repeatedly providing a passphrase.
- Introduce non-contiguous memory types for secure key handling.
- Abstract over locked and encrypted data types for use internally.
- Stronghold interface rewrite to work on type level with Stronghold as root type, Client as secure container, Store as insecure storage and ClientVault as vault access.
- [3816aef5](https://www.github.com/iotaledger/stronghold.rs/commit/3816aef5111684ffbdbd12ed7f93b887e43e7a02) chore(release-doc): clean up outdated release notes, merge existing into one on 2022-05-31

## \[0.4.0]

- Merged Store, Vault and Snapshot into a single crate called Stronghold-Engine.
Expand Down
29 changes: 14 additions & 15 deletions engine/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "stronghold_engine"
version = "0.4.0"
version = "0.5.0"
authors = [
"IOTA Stiftung",
"tensorprogramming <[email protected]>"
Expand All @@ -27,26 +27,25 @@ once_cell = "1.4"
zeroize = { version = "1.4.3" }
serde = { version = "1.0", features = [ "derive" ] }

[dependencies.stronghold-runtime]
path = "runtime"
version = "0.2"

[dependencies.stronghold-runtime]
path = "runtime"
version = "0.1"
[dependencies.digest]
version = "0.10.1"
optional = true
default-features = false

[dependencies.digest]
version = "0.10.1"
optional = true
default-features = false

[dependencies.iota-crypto]
version = "0.8.0"
features = [ "random", "chacha", "hmac", "sha", "x25519", "blake2b" ]
[dependencies.iota-crypto]
version = "0.8.0"
features = [ "random", "chacha", "hmac", "sha", "x25519", "blake2b" ]

[dev-dependencies]
tempfile = "3.1.0"
proptest = "1.0.0"
criterion = "0.3.3"
json = "0.12"

[dev-dependencies.stronghold-utils]
path = "../utils"
version = "0.3"
[dev-dependencies.stronghold-utils]
path = "../utils"
version = "0.3"
29 changes: 29 additions & 0 deletions engine/runtime/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# Changelog

## \[0.2.0]

- - Refactor Sink and Stream implementation for EventChannel
- Add `CopyRecord` procedure.
- In the `StrongholdP2p` Interface enable / disable mdns and relay functionality on init via config flags in the `StrongholdP2pBuilder`. Per default, both are enabled.
- In the `Stronghold` client interface enable / disable mdns and relay in the `NetworkConfig` when spawning a new p2p-network actor. Per default, both are disabled.
- Use `libp2p::swarm::toggle` to enable/ disable relay and mdns
- Persist config and keypair of stronghold-p2p in client
- Implement messages to write the keypair used for `StrongholdP2p` in the vault and derive the `PeerId` and a new noise `AuthenticKeypair` from it.
- Implement API for the Stronghold Procedures
- Make stronghold interface clonable
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Patch Stronghold engine fuzzer.
- Patch crypto.rs version v0.7 -> v0.8.
- Persist the state of stronghold-p2p in the `SecureClient` by serializing the `NetworkConfig` and writing it to the store.
- Allow loading stored states into the `NetworkActor` on init.
- Allow reuse of same `Keypair` that is stored in the vault.
- Software transactional memory framework as replacement for actix actor system
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Extract `random` functions from `test_utils` into own module.
- Remove Riker as dependency from utils.
- Introduce KeyProvider instead of repeatedly providing a passphrase.
- Introduce non-contiguous memory types for secure key handling.
- Abstract over locked and encrypted data types for use internally.
- Stronghold interface rewrite to work on type level with Stronghold as root type, Client as secure container, Store as insecure storage and ClientVault as vault access.
- [3816aef5](https://www.github.com/iotaledger/stronghold.rs/commit/3816aef5111684ffbdbd12ed7f93b887e43e7a02) chore(release-doc): clean up outdated release notes, merge existing into one on 2022-05-31
28 changes: 14 additions & 14 deletions engine/runtime/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
[package]
name = "stronghold-runtime"
version = "0.1.0"
edition = "2021"
readme = "README.md"
name = "stronghold-runtime"
version = "0.2.0"
edition = "2021"
readme = "README.md"

[lib]
name = "runtime"
name = "runtime"

[dependencies]
zeroize = { version = "1.4.3" }
libsodium-sys = { version = "0.2" }
serde = { version = "1.0", features = [ "derive" ] }
random = { version = "0.8.4", package = "rand" }
dirs = { version = "4.0.0" }
thiserror = { version = "1.0" }
iota-crypto = { version = "0.8.0", features = ["blake2b"] }
zeroize = { version = "1.4.3" }
libsodium-sys = { version = "0.2" }
serde = { version = "1.0", features = [ "derive" ] }
random = { version = "0.8.4", package = "rand" }
dirs = { version = "4.0.0" }
thiserror = { version = "1.0" }
iota-crypto = { version = "0.8.0", features = [ "blake2b" ] }

[dev-dependencies]
serde_json = { version = "1.0" }
serde_json = { version = "1.0" }
29 changes: 29 additions & 0 deletions p2p/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# Changelog

## \[0.4.0]

- - Refactor Sink and Stream implementation for EventChannel
- Add `CopyRecord` procedure.
- In the `StrongholdP2p` Interface enable / disable mdns and relay functionality on init via config flags in the `StrongholdP2pBuilder`. Per default, both are enabled.
- In the `Stronghold` client interface enable / disable mdns and relay in the `NetworkConfig` when spawning a new p2p-network actor. Per default, both are disabled.
- Use `libp2p::swarm::toggle` to enable/ disable relay and mdns
- Persist config and keypair of stronghold-p2p in client
- Implement messages to write the keypair used for `StrongholdP2p` in the vault and derive the `PeerId` and a new noise `AuthenticKeypair` from it.
- Implement API for the Stronghold Procedures
- Make stronghold interface clonable
- Update inline Docs and README files to reflect the current state of the project.
- Add communication fuzzer for distributed fuzzing with docker.
- Patch Stronghold engine fuzzer.
- Patch crypto.rs version v0.7 -> v0.8.
- Persist the state of stronghold-p2p in the `SecureClient` by serializing the `NetworkConfig` and writing it to the store.
- Allow loading stored states into the `NetworkActor` on init.
- Allow reuse of same `Keypair` that is stored in the vault.
- Software transactional memory framework as replacement for actix actor system
- Integration is runtime agnostic an can be used by any async runtime for rust, tkio is encouraged though
- Extract `random` functions from `test_utils` into own module.
- Remove Riker as dependency from utils.
- Introduce KeyProvider instead of repeatedly providing a passphrase.
- Introduce non-contiguous memory types for secure key handling.
- Abstract over locked and encrypted data types for use internally.
- Stronghold interface rewrite to work on type level with Stronghold as root type, Client as secure container, Store as insecure storage and ClientVault as vault access.
- [3816aef5](https://www.github.com/iotaledger/stronghold.rs/commit/3816aef5111684ffbdbd12ed7f93b887e43e7a02) chore(release-doc): clean up outdated release notes, merge existing into one on 2022-05-31
Loading

0 comments on commit a2d3ec1

Please sign in to comment.