diff --git a/master/pykanidm/sitemap.xml.gz b/master/pykanidm/sitemap.xml.gz index 56a2c0825..49ae0597e 100644 Binary files a/master/pykanidm/sitemap.xml.gz and b/master/pykanidm/sitemap.xml.gz differ diff --git a/master/rustdoc/doc/help.html b/master/rustdoc/doc/help.html index 6609109a6..0d76edbf0 100644 --- a/master/rustdoc/doc/help.html +++ b/master/rustdoc/doc/help.html @@ -1 +1 @@ -
pub struct QueryServerReadV1 { /* private fields */ }
pub struct QueryServerReadV1 { /* private fields */ }
pub struct AppState {
- pub status_ref: &'static StatusActor,
+ pub status_ref: &'static StatusActor,
pub qe_w_ref: &'static QueryServerWriteV1,
pub qe_r_ref: &'static QueryServerReadV1,
pub jws_signer: Arc<JwsSigner>,
pub jws_validator: Arc<JwsValidator>,
pub js_files: Vec<JavaScriptFile>,
-}
status_ref: &'static StatusActor
§qe_w_ref: &'static QueryServerWriteV1
§qe_r_ref: &'static QueryServerReadV1
§jws_signer: Arc<JwsSigner>
§jws_validator: Arc<JwsValidator>
§js_files: Vec<JavaScriptFile>
The SHA384 hashes of javascript files we’re going to serve to users
+}status_ref: &'static StatusActor
§qe_w_ref: &'static QueryServerWriteV1
§qe_r_ref: &'static QueryServerReadV1
§jws_signer: Arc<JwsSigner>
§jws_validator: Arc<JwsValidator>
§js_files: Vec<JavaScriptFile>
The SHA384 hashes of javascript files we’re going to serve to users
pub enum DbPasswordV1 {
+DbPasswordV1 in kanidmd_lib::be::dbvalue - Rust Enum kanidmd_lib::be::dbvalue::DbPasswordV1
pub enum DbPasswordV1 {
PBKDF2(usize, Vec<u8, Global>, Vec<u8, Global>),
PBKDF2_SHA1(usize, Vec<u8, Global>, Vec<u8, Global>),
PBKDF2_SHA512(usize, Vec<u8, Global>, Vec<u8, Global>),
SSHA512(Vec<u8, Global>, Vec<u8, Global>),
NT_MD4(Vec<u8, Global>),
-}
Variants§
§PBKDF2(usize, Vec<u8, Global>, Vec<u8, Global>)
§PBKDF2_SHA1(usize, Vec<u8, Global>, Vec<u8, Global>)
§PBKDF2_SHA512(usize, Vec<u8, Global>, Vec<u8, Global>)
§SSHA512(Vec<u8, Global>, Vec<u8, Global>)
§NT_MD4(Vec<u8, Global>)
Trait Implementations§
source§impl Debug for DbPasswordV1
source§impl<'de> Deserialize<'de> for DbPasswordV1
source§fn deserialize<__D>(
+}Variants§
§PBKDF2(usize, Vec<u8, Global>, Vec<u8, Global>)
§PBKDF2_SHA1(usize, Vec<u8, Global>, Vec<u8, Global>)
§PBKDF2_SHA512(usize, Vec<u8, Global>, Vec<u8, Global>)
§SSHA512(Vec<u8, Global>, Vec<u8, Global>)
§NT_MD4(Vec<u8, Global>)
Trait Implementations§
§impl Debug for DbPasswordV1
§impl<'de> Deserialize<'de> for DbPasswordV1
§fn deserialize<__D>(
__deserializer: __D
) -> Result<DbPasswordV1, <__D as Deserializer<'de>>::Error>where
- __D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read moresource§impl Serialize for DbPasswordV1
source§fn serialize<__S>(
+ __D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more§impl Serialize for DbPasswordV1
§fn serialize<__S>(
&self,
__serializer: __S
) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>where
- __S: Serializer,
Serialize this value into the given Serde serializer. Read moresource§impl TryFrom<DbPasswordV1> for Password
Auto Trait Implementations§
§impl RefUnwindSafe for DbPasswordV1
§impl Send for DbPasswordV1
§impl Sync for DbPasswordV1
§impl Unpin for DbPasswordV1
§impl UnwindSafe for DbPasswordV1
Blanket Implementations§
§impl<'a, T> AsTaggedExplicit<'a> for Twhere
diff --git a/master/rustdoc/doc/kanidmd_lib/credential/struct.Credential.html b/master/rustdoc/doc/kanidmd_lib/credential/struct.Credential.html
index c8a26827e..5add06139 100644
--- a/master/rustdoc/doc/kanidmd_lib/credential/struct.Credential.html
+++ b/master/rustdoc/doc/kanidmd_lib/credential/struct.Credential.html
@@ -11,16 +11,16 @@ some metadata to support this such as it’s source and strength etc.
Implementations§
source§impl Credential
sourcepub fn try_from_repl_v1(
rc: &ReplCredV1
) -> Result<(String, Self), OperationError>
sourcepub fn new_password_only(
- policy: &CryptoPolicy,
+ policy: &CryptoPolicy,
cleartext: &str
) -> Result<Self, OperationError>
Create a new credential that contains a CredentialType::Password
sourcepub fn new_generatedpassword_only(
- policy: &CryptoPolicy,
+ policy: &CryptoPolicy,
cleartext: &str
) -> Result<Self, OperationError>
Create a new credential that contains a CredentialType::GeneratedPassword
sourcepub fn set_password(
&self,
- policy: &CryptoPolicy,
+ policy: &CryptoPolicy,
cleartext: &str
) -> Result<Self, OperationError>
Update the state of the Password on this credential, if a password is present. If possible
this will convert the credential to a PasswordMFA in some cases, or fail in others.
diff --git a/master/rustdoc/doc/kanidmd_lib/credential/struct.Password.html b/master/rustdoc/doc/kanidmd_lib/credential/struct.Password.html
index 3af22735d..9c79a3c15 100644
--- a/master/rustdoc/doc/kanidmd_lib/credential/struct.Password.html
+++ b/master/rustdoc/doc/kanidmd_lib/credential/struct.Password.html
@@ -1,13 +1,13 @@
-Password in kanidmd_lib::credential - Rust Struct kanidmd_lib::credential::Password
source · pub struct Password { /* private fields */ }
Implementations§
source§impl Password
sourcepub fn new(
- policy: &CryptoPolicy,
+Password in kanidmd_lib::credential - Rust Struct kanidmd_lib::credential::Password
pub struct Password { /* private fields */ }
Implementations§
§impl Password
pub fn new(
+ policy: &CryptoPolicy,
cleartext: &str
-) -> Result<Password, OperationError>
sourcepub fn verify(&self, cleartext: &str) -> Result<bool, OperationError>
sourcepub fn to_dbpasswordv1(&self) -> DbPasswordV1
sourcepub fn to_repl_v1(&self) -> ReplPasswordV1
sourcepub fn requires_upgrade(&self) -> bool
Trait Implementations§
source§impl PartialEq<Password> for Password
source§fn eq(&self, other: &Password) -> bool
This method tests for self
and other
values to be equal, and is used
+) -> Result<Password, OperationError>pub fn verify(&self, cleartext: &str) -> Result<bool, OperationError>
pub fn to_dbpasswordv1(&self) -> DbPasswordV1
pub fn to_repl_v1(&self) -> ReplPasswordV1
pub fn requires_upgrade(&self) -> bool
Trait Implementations§
§impl TryFrom<DbPasswordV1> for Password
source§impl StructuralPartialEq for Password
Auto Trait Implementations§
§impl RefUnwindSafe for Password
§impl Send for Password
§impl Sync for Password
§impl Unpin for Password
§impl UnwindSafe for Password
Blanket Implementations§
§impl StructuralPartialEq for Password
Auto Trait Implementations§
§impl RefUnwindSafe for Password
§impl Send for Password
§impl Sync for Password
§impl Unpin for Password
§impl UnwindSafe for Password
Blanket Implementations§
§impl<'a, T> AsTaggedExplicit<'a> for Twhere
T: 'a,
§impl<'a, T> AsTaggedImplicit<'a> for Twhere
T: 'a,
§fn implicit(
diff --git a/master/rustdoc/doc/kanidmd_testkit/fn.setup_async_test.html b/master/rustdoc/doc/kanidmd_testkit/fn.setup_async_test.html
index 4d89d11ad..2f633fc62 100644
--- a/master/rustdoc/doc/kanidmd_testkit/fn.setup_async_test.html
+++ b/master/rustdoc/doc/kanidmd_testkit/fn.setup_async_test.html
@@ -1 +1 @@
-setup_async_test in kanidmd_testkit - Rust Function kanidmd_testkit::setup_async_test
source · pub async fn setup_async_test() -> (KanidmClient, CoreHandle)
\ No newline at end of file
+setup_async_test in kanidmd_testkit - Rust Function kanidmd_testkit::setup_async_test
source · pub async fn setup_async_test() -> (KanidmClient, CoreHandle)
\ No newline at end of file
diff --git a/master/rustdoc/doc/settings.html b/master/rustdoc/doc/settings.html
index 8e57dacba..3147f0363 100644
--- a/master/rustdoc/doc/settings.html
+++ b/master/rustdoc/doc/settings.html
@@ -1 +1 @@
-Rustdoc settings Rustdoc settings
Back
\ No newline at end of file
+Rustdoc settings Rustdoc settings
Back
\ No newline at end of file
diff --git a/stable/pykanidm/sitemap.xml.gz b/stable/pykanidm/sitemap.xml.gz
index 6410d92bd..2ad3296db 100644
Binary files a/stable/pykanidm/sitemap.xml.gz and b/stable/pykanidm/sitemap.xml.gz differ
diff --git a/v1.1.0-alpha.12/pykanidm/sitemap.xml.gz b/v1.1.0-alpha.12/pykanidm/sitemap.xml.gz
index 6410d92bd..2ad3296db 100644
Binary files a/v1.1.0-alpha.12/pykanidm/sitemap.xml.gz and b/v1.1.0-alpha.12/pykanidm/sitemap.xml.gz differ