devolutionsbot
e6d6e9d8a7
chore(release): prepare for publishing ( #628 )
2025-01-28 23:24:35 +00:00
Marc-André Lureau
63963182b5
fix(server): drop unexpected PDUs during deactivation-reactivation
...
The current behaviour of handling unmatched PDUs in fn read_by_hint()
isn't good enough. An unexpected PDUs may be received and fail to be
decoded during Acceptor::step().
Change the code to simply drop unexpected PDUs (as opposed to attempting
to replay the unmatched leftover, which isn't clearly needed)
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2025-01-27 07:35:36 -05:00
Sébastien Duquette
dd249909a8
docs: use CDN URLs instead of the blob storage URLs for Devolutions logo ( #631 )
2025-01-09 10:06:10 -05:00
devolutionsbot
97ef9f0acb
chore(release): prepare for publishing ( #611 )
2024-12-14 14:32:28 +00:00
Benoît Cortier
0c10367ebc
chore: symlinks to license files in packages ( #604 )
...
Add symlinks to the license files in crates that we are publishing on
crates.io.
2024-12-11 08:13:26 -05:00
Benoît Cortier
755738ff9c
chore: prepare release ( #598 )
...
Crates to release:
- ironrdp-acceptor -> 0.2.0
- ironrdp-async -> 0.2.0
- ironrdp-blocking -> 0.2.0
- ironrdp-session -> 0.2.0
- ironrdp-server -> 0.3.0
- ironrdp -> 0.7.0
2024-12-06 09:51:14 +00:00
Marc-André Lureau
5381b24444
docs: use Devolutions logo
...
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-10-29 19:14:20 +09:00
Marc-André Lureau
bf56a7fc80
docs: use README.md for crates lib.rs doc
...
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-10-29 19:14:20 +09:00
Marc-André Lureau
4ef36bf5fa
docs: add project links to READMEs for consistency
...
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-10-29 19:14:20 +09:00
Marc-André Lureau
278a0506c2
refactor(core): move WriteBuf
...
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-08-30 00:05:16 -04:00
Marc-André Lureau
f8c0c0ed47
feat(blocking): teach single_sequence_step() to keep unmatched PDUs
...
The caller can gather the unmatching/unexpected PDUs as necessary.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-08-19 06:44:15 -04:00
Marc-André Lureau
6f779406e6
refactor(blocking): let read_by_hint() optionally accumulate unmatched bytes
...
The caller can then decide what to do.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-08-19 06:44:15 -04:00
Marc-André Lureau
46b703e813
refactor(pdu): return whether hint::find_size() matches the expected hint
...
When compiled in debug mode, the code checks the expected Action hint.
But in release mode, no checks are done and the it will have to fail
later.
Instead, return whether the PDU is matching the hint, so the caller can
decide what to do in this case.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-08-19 06:44:15 -04:00
Sandeep Bansal
d8e21b0bd4
fix!: remove dependency on ClientConnector in CredsspSequence ( #519 )
2024-08-16 13:09:02 -04:00
Marc-André Lureau
7307148cb8
chore: use workspace lints
...
Among other things, this allows tools and LSP to pick up our settings.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2024-07-24 04:35:32 -04:00
Isaiah Becker-Mayer
ba3796f738
feat: implement the connection activation sequence rerun ( #421 )
2024-04-05 11:05:15 -04:00
Benoît Cortier
0954f42519
fix(connector): better security protocol selection ( #328 )
...
Replace the bitflag-based config API with a boolean-based one:
- `enable_tls`: set the PROTOCOL_SSL flag
- `enable_credssp`: set the PROTOCOL_HYBRID and PROTOCOL_HYBRID_EX flags
The `--security_protocol` argument was removed from the native client
CLI, and instead it’s possible to disable specific protocols with
`--no-tls` and `--no-credssp`. By default, both protocols are
enabled for maximum compatibility with most RDP servers. We may change
the defaults in the future.
2023-12-08 15:59:48 +00:00
Benoît Cortier
8fc213e699
refactor(credssp): follow up to #260 ( #287 )
2023-11-17 09:50:03 -05:00
irvingouj@Devolutions
5530550ef3
feat(credssp): support for Kerberos ( #260 )
...
Issue: ARC-139
Co-authored-by: Benoît Cortier <bcortier@proton.me>
2023-11-17 04:12:13 +00:00
Benoît CORTIER
40740169e0
feat: add new_from_leftover
on Framed
2023-10-30 18:24:00 -04:00
Benoît CORTIER
f834305563
refactor(connector): use #[non_exhaustive] on type tokens
2023-10-30 18:24:00 -04:00
Benoît Cortier
6283e37937
refactor: check for additional lints ( #200 )
2023-10-02 13:46:05 +03:00
Benoît Cortier
86b86ba343
doc: elaborate high-level documentation ( #192 )
2023-09-18 19:03:39 +00:00
Benoît Cortier
babbd68af5
feat(blocking): initial implementation ( #158 )
2023-09-11 15:47:26 +00:00