static api signing keys per-host because dealing with them is turning out to be an absolute nightmare

This commit is contained in:
core 2023-06-24 12:04:20 -04:00
parent e4d71fd62f
commit 408d76f841
Signed by: core
GPG Key ID: FDBF740DADDCEECF
3 changed files with 3 additions and 3 deletions

2
Cargo.lock generated
View File

@ -3633,7 +3633,7 @@ dependencies = [
[[package]] [[package]]
name = "trifid-api" name = "trifid-api"
version = "0.1.2" version = "0.1.3"
dependencies = [ dependencies = [
"actix-cors", "actix-cors",
"actix-request-identifier", "actix-request-identifier",

View File

@ -1,6 +1,6 @@
[package] [package]
name = "trifid-api" name = "trifid-api"
version = "0.1.3" version = "0.1.4"
edition = "2021" edition = "2021"
description = "Pure-rust Defined Networking compatible management server" description = "Pure-rust Defined Networking compatible management server"
license = "GPL-3.0-or-later" license = "GPL-3.0-or-later"

View File

@ -266,7 +266,7 @@ pub async fn dnclient(
ks.signing_keys.push(KSSigningKey { ks.signing_keys.push(KSSigningKey {
id: ks.current_signing_key + 1, id: ks.current_signing_key + 1,
key: SigningKey::generate(&mut OsRng), key: ks.signing_keys[0].key.clone(),
}); });
ks.current_signing_key += 1; ks.current_signing_key += 1;