Skip to content

Commit 8cf9ebd

Browse files
authored
Update some deps in pokemon-service-tls example (#3911)
tls-listener 0.7.0 is vulnerable to CVE-2024-28854, GHSA-2qph-qpvm-2qf7, and RUSTSEC-2024-0341 rustls 0.20.9 is vulnerable to CVE-2024-32650, GHSA-6g7w-8wpp-frhj, and RUSTSEC-2024-0336 We can't update them to the latest versions because we still require hyper 0.x. ---- _By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice._
1 parent ae7b403 commit 8cf9ebd

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

examples/pokemon-service-tls/Cargo.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,11 @@ tokio = "1.26.0"
1313
tracing = "0.1"
1414

1515
# These dependencies are only required for the `pokemon-service-tls` program.
16-
tls-listener = { version = "0.7.0", features = ["rustls", "hyper-h2"] }
17-
tokio-rustls = "0.24.0"
18-
rustls-pemfile = "1.0.2"
16+
17+
# Latest version supporting hyper 0.x
18+
tls-listener = { version = "0.8", features = ["rustls", "hyper-h2"] }
19+
tokio-rustls = "0.24"
20+
rustls-pemfile = "1"
1921
futures-util = { version = "0.3.29", default-features = false }
2022

2123
# Local paths
@@ -37,4 +39,3 @@ aws-smithy-types = { path = "../../rust-runtime/aws-smithy-types/" }
3739
pokemon-service-client = { path = "../pokemon-service-client/", features = [
3840
"behavior-version-latest",
3941
] }
40-

examples/pokemon-service-tls/src/main.rs

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,7 @@ pub async fn main() {
131131
acceptor,
132132
hyper::server::conn::AddrIncoming::bind(&addr).expect("could not bind"),
133133
)
134+
.connections()
134135
.filter(|conn| {
135136
if let Err(err) = conn {
136137
eprintln!("connection error: {:?}", err);

0 commit comments

Comments
 (0)