-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply Version Updates From Current Changes #217
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
13ecb06
to
b36b98c
Compare
e6623bb
to
be83224
Compare
5c3387a
to
3d6ff8b
Compare
3d6ff8b
to
2d72835
Compare
090c149
to
f6011d2
Compare
d190b6a
to
c0fa8c8
Compare
0d79841
to
ad111df
Compare
55c8ba3
to
c600fe9
Compare
c600fe9
to
f332d67
Compare
f332d67
to
42686c7
Compare
6a0a65b
to
9eef301
Compare
9eef301
to
c05ca7f
Compare
Co-authored-by: charlesthompson3 <[email protected]>
3d989a7
to
f1066b6
Compare
* Implement AES256KW encryption procedure * Use generic_procedures macro * Document ciphers; fix ctx output length * Implement the `AesKeyWrapDecrypt` procedure * Return error for ciphertext of len < BLOCK
f1066b6
to
5ae5c91
Compare
5ae5c91
to
2ea1b16
Compare
doc: update on front-facing README / CONTRIBUTION guide.
2ea1b16
to
80fe955
Compare
80fe955
to
1ca0747
Compare
Additional interface tests
1ca0747
to
22f4dd1
Compare
chore(release-doc): clean up outdated release docs / merge existing
22f4dd1
to
4007927
Compare
felsweg-iota
approved these changes
Jun 1, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Version Updates
Merging this PR will release new versions of the following packages based on your change files.
stronghold-derive
[0.3.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.stronghold-runtime
[0.2.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.stronghold-engine
[0.5.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.stronghold-utils
[0.3.1]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.stronghold-p2p
[0.4.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.stronghold-rlu
[0.2.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.iota-stronghold
[0.5.0]
CopyRecord
procedure.StrongholdP2p
Interface enable / disable mdns and relay functionality on init via config flags in theStrongholdP2pBuilder
. Per default, both are enabled.Stronghold
client interface enable / disable mdns and relay in theNetworkConfig
when spawning a new p2p-network actor. Per default, both are disabled.libp2p::swarm::toggle
to enable/ disable relay and mdnsStrongholdP2p
in the vault and derive thePeerId
and a new noiseAuthenticKeypair
from it.SecureClient
by serializing theNetworkConfig
and writing it to the store.NetworkActor
on init.Keypair
that is stored in the vault.random
functions fromtest_utils
into own module.