Package: rust-rustls
I have prepared a debdiff to make rust-rustls use rustls-native-certs 0.8 instead of 0.6.
diff -Nru rust-rustls-0.23.26+ds/debian/changelog rust-rustls-0.23.26+ds/debian/changelog --- rust-rustls-0.23.26+ds/debian/changelog 2025-04-10 18:06:09.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/changelog 2025-07-12 13:46:24.000000000 +0000 @@ -1,3 +1,10 @@ +rust-rustls (0.23.26+ds-1.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * Update patch and dependencies for rustls-native-certs 0.8 + + -- Peter Michael Green <[email protected]> Sat, 12 Jul 2025 13:46:24 +0000 + rust-rustls (0.23.26+ds-1) unstable; urgency=medium [ upstream ] diff -Nru rust-rustls-0.23.26+ds/debian/control rust-rustls-0.23.26+ds/debian/control --- rust-rustls-0.23.26+ds/debian/control 2025-04-10 18:00:04.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/control 2025-07-12 13:43:37.000000000 +0000 @@ -31,7 +31,7 @@ librust-ring-0.17+default-dev, librust-rustls-pki-types-1+alloc-dev, librust-rustls-pki-types-1+default-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-rustls-webpki-0.102+alloc-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, diff -Nru rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch --- rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch 2025-04-10 18:00:29.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch 2025-07-12 13:46:24.000000000 +0000 @@ -1,31 +1,38 @@ Description: use crate rustls-native-certs (not webpki-roots) Author: Jonas Smedegaard <[email protected]> +Author: Peter Michael Green <[email protected]> Forwarded: not-needed -Last-Update: 2023-08-14 +Last-Update: 2025-07-12 --- This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ---- a/Cargo.toml -+++ b/Cargo.toml -@@ -87,7 +87,7 @@ +Index: rust-rustls-0.23.26+ds/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/Cargo.toml ++++ rust-rustls-0.23.26+ds/Cargo.toml +@@ -87,7 +87,7 @@ time = { version = "0.3.6", default-feat tikv-jemallocator = "0.6" tokio = { version = "1.34", features = ["io-util", "macros", "net", "rt"] } webpki = { package = "rustls-webpki", version = "0.103", features = ["alloc"], default-features = false } -webpki-roots = "0.26" -+rustls-native-certs = "0.6" ++rustls-native-certs = "0.8" x25519-dalek = "2" x509-parser = "0.17" zeroize = "1.7" ---- a/examples/Cargo.toml -+++ b/examples/Cargo.toml -@@ -17,4 +17,4 @@ +Index: rust-rustls-0.23.26+ds/examples/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/Cargo.toml ++++ rust-rustls-0.23.26+ds/examples/Cargo.toml +@@ -17,4 +17,4 @@ rcgen = { workspace = true } rustls = { path = "../rustls", features = ["logging"] } serde = { workspace = true } tokio = { workspace = true } -webpki-roots = { workspace = true } +rustls-native-certs = { workspace = true } ---- a/examples/src/bin/ech-client.rs -+++ b/examples/src/bin/ech-client.rs -@@ -48,6 +48,7 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/ech-client.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs +@@ -48,6 +48,7 @@ use rustls::crypto::aws_lc_rs::hpke::ALL use rustls::crypto::hpke::Hpke; use rustls::pki_types::pem::PemObject; use rustls::pki_types::{CertificateDer, EchConfigListBytes, ServerName}; @@ -33,23 +40,27 @@ #[tokio::main] async fn main() -> Result<(), Box<dyn Error>> { -@@ -109,7 +110,12 @@ +@@ -108,8 +109,13 @@ async fn main() -> Result<(), Box<dyn Er + ); root_store } - None => RootCertStore { +- None => RootCertStore { - roots: webpki_roots::TLS_SERVER_ROOTS.into(), ++ None => { + let mut root_store = rustls::RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; + root_store }, }; ---- a/examples/src/bin/limitedclient.rs -+++ b/examples/src/bin/limitedclient.rs -@@ -7,13 +7,15 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/limitedclient.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/limitedclient.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/limitedclient.rs +@@ -7,13 +7,15 @@ use std::net::TcpStream; use std::sync::Arc; use rustls::crypto::{CryptoProvider, aws_lc_rs as provider}; @@ -64,15 +75,17 @@ - ); + let mut root_store = rustls::RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; let config = rustls::ClientConfig::builder_with_provider( CryptoProvider { ---- a/examples/src/bin/simple_0rtt_client.rs -+++ b/examples/src/bin/simple_0rtt_client.rs -@@ -22,6 +22,7 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/simple_0rtt_client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/simple_0rtt_client.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/simple_0rtt_client.rs +@@ -22,6 +22,7 @@ use std::sync::Arc; use rustls::RootCertStore; use rustls::pki_types::pem::PemObject; use rustls::pki_types::{CertificateDer, ServerName}; @@ -80,7 +93,7 @@ fn start_connection(config: &Arc<rustls::ClientConfig>, domain_name: &str, port: u16) { let server_name = ServerName::try_from(domain_name) -@@ -93,11 +94,10 @@ +@@ -93,11 +94,10 @@ fn main() { .map(|result| result.unwrap()), ); } else { @@ -90,15 +103,17 @@ - .cloned(), - ) + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; } let mut config = rustls::ClientConfig::builder() ---- a/examples/src/bin/simpleclient.rs -+++ b/examples/src/bin/simpleclient.rs -@@ -12,11 +12,15 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/simpleclient.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/simpleclient.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/simpleclient.rs +@@ -12,11 +12,15 @@ use std::io::{Read, Write, stdout}; use std::net::TcpStream; use std::sync::Arc; @@ -111,14 +126,16 @@ - roots: webpki_roots::TLS_SERVER_ROOTS.into(), + let mut root_store = RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); }; let mut config = rustls::ClientConfig::builder() .with_root_certificates(root_store) ---- a/examples/src/bin/tlsclient-mio.rs -+++ b/examples/src/bin/tlsclient-mio.rs -@@ -30,6 +30,7 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/tlsclient-mio.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/tlsclient-mio.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/tlsclient-mio.rs +@@ -30,6 +30,7 @@ use rustls::RootCertStore; use rustls::crypto::{CryptoProvider, aws_lc_rs as provider}; use rustls::pki_types::pem::PemObject; use rustls::pki_types::{CertificateDer, PrivateKeyDer, ServerName}; @@ -126,7 +143,7 @@ const CLIENT: mio::Token = mio::Token(0); -@@ -207,7 +208,7 @@ +@@ -207,7 +208,7 @@ impl io::Read for TlsClient { /// basic HTTP GET request for /. /// /// If --cafile is not supplied, a built-in set of CA certificates @@ -135,7 +152,7 @@ #[derive(Debug, Parser)] struct Args { /// Connect to this port -@@ -402,11 +403,10 @@ +@@ -402,11 +403,10 @@ fn make_config(args: &Args) -> Arc<rustl .map(|result| result.unwrap()), ); } else { @@ -145,15 +162,17 @@ - .cloned(), - ); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; } let suites = if !args.suite.is_empty() { ---- a/examples/src/bin/unbuffered-async-client.rs -+++ b/examples/src/bin/unbuffered-async-client.rs -@@ -10,12 +10,14 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-async-client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/unbuffered-async-client.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-async-client.rs +@@ -10,12 +10,14 @@ use async_std::io::{ReadExt, WriteExt}; #[cfg(feature = "async-std")] use async_std::net::TcpStream; use rustls::client::{ClientConnectionData, UnbufferedClientConnection}; @@ -168,7 +187,7 @@ #[cfg(not(feature = "async-std"))] use tokio::io::{AsyncReadExt, AsyncWriteExt}; #[cfg(not(feature = "async-std"))] -@@ -24,8 +26,10 @@ +@@ -24,8 +26,10 @@ use tokio::net::TcpStream; #[cfg_attr(not(feature = "async-std"), tokio::main(flavor = "current_thread"))] #[cfg_attr(feature = "async-std", async_std::main)] async fn main() -> Result<(), Box<dyn Error>> { @@ -176,14 +195,16 @@ - roots: webpki_roots::TLS_SERVER_ROOTS.into(), + let mut root_store = RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); }; let config = ClientConfig::builder_with_protocol_versions(&[&TLS13]) ---- a/examples/src/bin/unbuffered-client.rs -+++ b/examples/src/bin/unbuffered-client.rs -@@ -11,12 +11,16 @@ +Index: rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/unbuffered-client.rs ++++ rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-client.rs +@@ -11,12 +11,16 @@ use rustls::unbuffered::{ AppDataRecord, ConnectionState, EncodeError, EncryptError, InsufficientSizeError, UnbufferedStatus, WriteTraffic, }; @@ -197,14 +218,16 @@ - roots: webpki_roots::TLS_SERVER_ROOTS.into(), + let mut root_store = RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); }; let mut config = ClientConfig::builder_with_protocol_versions(&[&TLS13]) ---- a/provider-example/Cargo.toml -+++ b/provider-example/Cargo.toml -@@ -26,7 +26,7 @@ +Index: rust-rustls-0.23.26+ds/provider-example/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/provider-example/Cargo.toml ++++ rust-rustls-0.23.26+ds/provider-example/Cargo.toml +@@ -26,7 +26,7 @@ x25519-dalek = { workspace = true } [dev-dependencies] env_logger = { workspace = true } rcgen = { workspace = true } @@ -213,13 +236,16 @@ [features] default = ["std"] ---- a/provider-example/examples/client.rs -+++ b/provider-example/examples/client.rs -@@ -2,14 +2,16 @@ +Index: rust-rustls-0.23.26+ds/provider-example/examples/client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/provider-example/examples/client.rs ++++ rust-rustls-0.23.26+ds/provider-example/examples/client.rs +@@ -2,14 +2,17 @@ use std::io::{Read, Write, stdout}; use std::net::TcpStream; use std::sync::Arc; +use rustls_native_certs::load_native_certs; ++use rustls::pki_types::CertificateDer; + fn main() { env_logger::init(); @@ -231,15 +257,17 @@ - ); + let mut root_store = rustls::RootCertStore::empty(); + for cert in load_native_certs().expect("could not load platform certs") { -+ root_store.add(CertificateDer::from_slice(&cert.0)) ++ root_store.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; let config = rustls::ClientConfig::builder_with_provider(rustls_provider_example::provider().into()) ---- a/rustls/Cargo.toml -+++ b/rustls/Cargo.toml -@@ -57,10 +57,10 @@ +Index: rust-rustls-0.23.26+ds/rustls/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/rustls/Cargo.toml ++++ rust-rustls-0.23.26+ds/rustls/Cargo.toml +@@ -57,10 +57,10 @@ log = { workspace = true } macro_rules_attribute = { workspace = true } num-bigint = { workspace = true } rcgen = { workspace = true } @@ -251,8 +279,10 @@ x509-parser = { workspace = true } [[bench]] ---- a/rustls/src/lib.rs -+++ b/rustls/src/lib.rs +Index: rust-rustls-0.23.26+ds/rustls/src/lib.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/rustls/src/lib.rs ++++ rust-rustls-0.23.26+ds/rustls/src/lib.rs @@ -170,14 +170,15 @@ //! ```rust //! # #[cfg(feature = "aws_lc_rs")] { @@ -268,15 +298,17 @@ -//! # ); +//! # let mut root_store = rustls::RootCertStore::empty(); +//! # for cert in load_native_certs().expect("could not load platform certs") { -+//! # root_store.add(CertificateDer::from_slice(&cert.0)) ++//! # root_store.add(CertificateDer::from_slice(&cert.to_vec())) +//! # .expect("could not add certificate"); +//! # }; //! # let config = rustls::ClientConfig::builder() //! # .with_root_certificates(root_store) //! # .with_no_client_auth(); ---- a/rustls/src/verifybench.rs -+++ b/rustls/src/verifybench.rs -@@ -7,7 +7,7 @@ +Index: rust-rustls-0.23.26+ds/rustls/src/verifybench.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/rustls/src/verifybench.rs ++++ rust-rustls-0.23.26+ds/rustls/src/verifybench.rs +@@ -7,7 +7,7 @@ use core::time::Duration; use std::prelude::v1::*; use pki_types::{CertificateDer, ServerName, UnixTime}; @@ -285,7 +317,7 @@ use crate::crypto::CryptoProvider; use crate::verify::ServerCertVerifier; -@@ -187,11 +187,10 @@ +@@ -187,11 +187,10 @@ struct Context { impl Context { fn new(provider: CryptoProvider, domain: &'static str, certs: &[&'static [u8]]) -> Self { let mut roots = RootCertStore::empty(); @@ -295,7 +327,7 @@ - .cloned(), - ); + for cert in load_native_certs().expect("could not load platform certs") { -+ roots.add(CertificateDer::from_slice(&cert.0)) ++ roots.add(CertificateDer::from_slice(&cert.to_vec())) + .expect("could not add certificate"); + }; Self { diff -Nru rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch --- rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch 2025-04-10 18:02:45.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch 2025-07-12 13:41:45.000000000 +0000 @@ -4,9 +4,11 @@ Last-Update: 2024-12-17 --- This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ---- a/examples/Cargo.toml -+++ b/examples/Cargo.toml -@@ -10,7 +10,6 @@ +Index: rust-rustls-0.23.26+ds/examples/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/Cargo.toml ++++ rust-rustls-0.23.26+ds/examples/Cargo.toml +@@ -10,7 +10,6 @@ publish = false async-std = { workspace = true, optional = true } clap = { workspace = true } env_logger = { workspace = true } @@ -14,7 +16,9 @@ log = { workspace = true } mio = { workspace = true } rcgen = { workspace = true } ---- a/examples/src/bin/ech-client.rs +Index: rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/examples/src/bin/ech-client.rs +++ /dev/null @@ -1,284 +0,0 @@ -//! This is a simple example demonstrating how to use Encrypted Client Hello (ECH) with @@ -128,10 +132,10 @@ - ); - root_store - } -- None => RootCertStore { +- None => { - let mut root_store = rustls::RootCertStore::empty(); - for cert in load_native_certs().expect("could not load platform certs") { -- root_store.add(CertificateDer::from_slice(&cert.0)) +- root_store.add(CertificateDer::from_slice(&cert.to_vec())) - .expect("could not add certificate"); - }; - root_store @@ -301,9 +305,11 @@ -/// -/// A real implementation should vary this suite across all of the suites that are supported. -static GREASE_HPKE_SUITE: &dyn Hpke = aws_lc_rs::hpke::DH_KEM_X25519_HKDF_SHA256_AES_128; ---- a/connect-tests/Cargo.toml -+++ b/connect-tests/Cargo.toml -@@ -10,7 +10,6 @@ +Index: rust-rustls-0.23.26+ds/connect-tests/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/connect-tests/Cargo.toml ++++ rust-rustls-0.23.26+ds/connect-tests/Cargo.toml +@@ -10,7 +10,6 @@ publish = false rustls = { path = "../rustls", features = ["logging"] } [dev-dependencies] @@ -311,7 +317,9 @@ regex = { workspace = true } ring = { workspace = true } tokio = { workspace = true } ---- a/connect-tests/tests/ech.rs +Index: rust-rustls-0.23.26+ds/connect-tests/tests/ech.rs +=================================================================== +--- rust-rustls-0.23.26+ds.orig/connect-tests/tests/ech.rs +++ /dev/null @@ -1,67 +0,0 @@ -mod ech_config { @@ -381,9 +389,11 @@ - .into() - } -} ---- a/Cargo.toml -+++ b/Cargo.toml -@@ -54,7 +54,6 @@ +Index: rust-rustls-0.23.26+ds/Cargo.toml +=================================================================== +--- rust-rustls-0.23.26+ds.orig/Cargo.toml ++++ rust-rustls-0.23.26+ds/Cargo.toml +@@ -54,7 +54,6 @@ env_logger = "0.11" fxhash = "0.2.1" hashbrown = { version = "0.14", default-features = false, features = ["ahash", "inline-more"] } hex = "0.4" diff -Nru rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch --- rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch 2025-04-10 18:02:51.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch 2025-07-12 13:42:41.000000000 +0000 @@ -12,7 +12,7 @@ tokio = { version = "1.34", features = ["io-util", "macros", "net", "rt"] } -webpki = { package = "rustls-webpki", version = "0.103", features = ["alloc"], default-features = false } +webpki = { package = "rustls-webpki", version = "0.102.8", features = ["alloc"], default-features = false } - rustls-native-certs = "0.6" + rustls-native-certs = "0.8" x25519-dalek = "2" x509-parser = "0.17" --- a/rustls/src/webpki/mod.rs diff -Nru rust-rustls-0.23.26+ds/debian/tests/control rust-rustls-0.23.26+ds/debian/tests/control --- rust-rustls-0.23.26+ds/debian/tests/control 2025-04-10 18:00:10.000000000 +0000 +++ rust-rustls-0.23.26+ds/debian/tests/control 2025-07-12 13:46:24.000000000 +0000 @@ -22,7 +22,7 @@ # librust-rcgen-0.13+pem-dev, # librust-regex-1+default-dev, # librust-rustls-0.23+default-dev, -# librust-rustls-native-certs-0.6+default-dev, +# librust-rustls-native-certs-0.8+default-dev, # librust-serde-1+default-dev, # librust-serde-1+derive-dev, # librust-serde-json-1+default-dev, @@ -52,7 +52,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -82,7 +82,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -112,7 +112,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+brotli-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -143,7 +143,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+custom-provider-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -174,7 +174,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+hashbrown-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -205,7 +205,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+logging-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -236,7 +236,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+ring-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -267,7 +267,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+std-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev, @@ -299,7 +299,7 @@ librust-rcgen-0.13+pem-dev, librust-regex-1+default-dev, librust-rustls-0.23+tls12-dev, - librust-rustls-native-certs-0.6+default-dev, + librust-rustls-native-certs-0.8+default-dev, librust-serde-1+default-dev, librust-serde-1+derive-dev, librust-serde-json-1+default-dev,

