-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathCargo.toml
More file actions
125 lines (109 loc) · 3.37 KB
/
Cargo.toml
File metadata and controls
125 lines (109 loc) · 3.37 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
[workspace]
resolver = "2"
members = ["auth/client/rs", "auth/server", "crates/*", "crates/resolver/derive"]
[workspace.package]
edition = "2024"
authors = ["moghtech <contact@mogh.tech>"]
license = "MPL-2.0"
repository = "https://github.com/moghtech/lib"
[patch.crates-io]
# MOGH API
mogh_auth_client = { path = "auth/client/rs" }
mogh_auth_server = { path = "auth/server" }
# MOGH
mogh_cache = { path = "crates/cache" }
mogh_config = { path = "crates/config" }
mogh_encryption = { path = "crates/encryption" }
mogh_error = { path = "crates/error" }
mogh_logger = { path = "crates/logger" }
mogh_pki = { path = "crates/pki" }
mogh_rate_limit = { path = "crates/rate_limit" }
mogh_request_ip = { path = "crates/request_ip" }
mogh_resolver = { path = "crates/resolver" }
mogh_resolver_derive = { path = "crates/resolver/derive" }
mogh_secret_file = { path = "crates/secret_file" }
mogh_server = { path = "crates/server" }
mogh_validations = { path = "crates/validations" }
[workspace.dependencies]
# MOGH API
mogh_auth_client = "1.3.0"
mogh_auth_server = "1.3.0"
# MOGH
mogh_cache = "1.1.2"
mogh_config = "1.0.5"
mogh_encryption = "0.1.1"
mogh_error = "1.0.4"
mogh_logger = "1.3.3"
mogh_pki = "1.1.3"
mogh_rate_limit = "1.0.1"
mogh_request_ip = "1.0.1"
mogh_resolver = "1.0.0"
mogh_resolver_derive = "1.0.0"
mogh_secret_file = "1.0.1"
mogh_server = "1.4.5"
mogh_validations = "1.0.1"
# CICADA
cicada_loader = "0.5.1"
# ASYNC
reqwest = { version = "0.13.2", default-features = false, features = ["json", "query", "form", "rustls"] }
tokio = { version = "1.52.1", features = ["full"] }
arc-swap = "1.9.1"
# SERVER
tower-http = { version = "0.6.8", features = ["fs", "cors", "set-header"] }
axum-server = { version = "0.8.0", features = ["tls-rustls"] }
axum = { version = "0.8.9", features = ["macros"] }
tower-sessions = "0.15.0"
urlencoding = "2.1.3"
# SER/DE
indexmap = { version = "2.14.0", features = ["serde"] }
serde = { version = "1.0.228", features = ["derive"] }
strum = { version = "0.28.0", features = ["derive"] }
serde_yaml_ng = "0.10.0"
serde_json = "1.0.149"
serde_qs = "1.0.0"
bson = "3.1.0"
toml = "1.1.2+spec-1.1.0"
url = "2.5.8"
# CRYPTO
chacha20poly1305 = "0.10.1"
data-encoding = "2.10.0"
rand = "0.10.1"
# Held back for 'openidconnect'
sha2 = "0.10.9"
# AUTH
webauthn-rs = { version = "0.5.4", features = ["danger-allow-state-serialisation"] }
openidconnect = { version = "4.0.1", features = ["accept-rfc3339-timestamps"] }
jsonwebtoken = { version = "10.3.0", features = ["aws_lc_rs"] }
totp-rs = { version = "5.7.1", features = ["qr", "serde_support"] }
bcrypt = "0.19.0"
# PKI
pem-rfc7468 = { version = "1.0.0", features = ["alloc"] }
pkcs8 = "0.10.2"
snow = "0.10.0"
# Held back for 'pkcs8'
spki = "0.7.3"
# Held back for 'spki'
der = "0.7.10"
# ERROR
anyhow = "1.0.102"
thiserror = "2.0.18"
# LOGGING
opentelemetry-otlp = { version = "0.31.1", features = ["tls-roots", "reqwest-rustls"] }
opentelemetry_sdk = { version = "0.31.0", features = ["rt-tokio"] }
tracing-subscriber = { version = "0.3.23", features = ["json"] }
opentelemetry-semantic-conventions = "0.31.0"
tracing-opentelemetry = "0.32.1"
opentelemetry = "0.31.0"
tracing = "0.1.44"
# MACRO
quote = "1.0.45"
proc-macro2 = "1.0.106"
syn = "2.0.117"
# MISC
clap = { version = "4.6.0", features = ["derive"] }
uuid = { version = "1.23.1", features = ["v4"] }
typeshare = "1.0.5"
wildcard = "0.3.0"
colored = "3.1.1"
utoipa = "5.4.0"
regex = "1.12.3"