fiddling with jenkins, changing redirect
This commit is contained in:
parent
d2c7a38d56
commit
1f7476add3
2
.github/workflows/build.yml
vendored
2
.github/workflows/build.yml
vendored
@ -65,7 +65,7 @@ jobs:
|
||||
run: cargo doc --no-deps --document-private-items
|
||||
|
||||
- name: Add redirect
|
||||
run: echo '<meta http-equiv="refresh" content="0;url=dnstp/index.html">' > target/doc/index.html
|
||||
run: echo '<meta http-equiv="refresh" content="0;url=dnstplib/index.html">' > target/doc/index.html
|
||||
|
||||
- name: Remove lock file
|
||||
run: rm target/doc/.lock
|
||||
|
@ -4,7 +4,13 @@ pipeline {
|
||||
stages {
|
||||
stage('Build') {
|
||||
steps {
|
||||
sh '~/.cargo/bin/cargo build'
|
||||
sh 'source ~/.cargo/env && cargo build'
|
||||
}
|
||||
}
|
||||
|
||||
stage('Test') {
|
||||
steps {
|
||||
sh 'source ~/.cargo/env && cargo test'
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -6,4 +6,6 @@ Transmitting files over dns piece by piece. Should be a pretty subtle way of sen
|
||||
|
||||
I remember I was listening to, I think, [Security This Week with Carl Franklin](https://securitythisweek.com/). One of the hosts mentioned doing data exfiltration from a tight network by breaking the file down and sending it over DNS. I wanted to see how this could work. [Read More](https://www.securityweek.com/multigrain-pos-malware-exfiltrates-card-data-over-dns/).
|
||||
|
||||
I also wanted to play with a big rust project for standard targets with threading. Although I had a lot of fun with my browser-based checkers game, [Draught](https://draught.sarsoo.xyz), working against WASM has some restrictions.
|
||||
I also wanted to play with a big rust project for standard targets with threading. Although I had a lot of fun with my browser-based checkers game, [Draught](https://draught.sarsoo.xyz), working against WASM has some restrictions.
|
||||
|
||||
[Read the Docs](https://github.com/Sarsoo/dnstp/settings/pages)
|
Loading…
Reference in New Issue
Block a user