Cargo Features
schema-registry-client has no features set by default.
[dependencies]
schema-registry-client = { version = "0.2.1", features = ["rules", "rules-cel", "rules-encryption-awskms", "rules-encryption-azurekms", "rules-encryption-gcpkms", "rules-encryption-hcvault", "rules-encryption-localkms", "rules-encryption-tink", "rules-jsonata"] }
- rules = rules-cel, rules-encryption-awskms, rules-encryption-azurekms, rules-encryption-gcpkms, rules-encryption-hcvault, rules-jsonata
- rules-cel rules?
-
Enables cel-interpreter, email_address, fluent-uri, and hostname-validator
Affects
rules::cel
… - rules-encryption-awskms rules? = rules-encryption-tink
-
Enables aws-config, aws-credential-types, aws-sdk-kms, and hex
Affects
encryption::awskms
… - rules-encryption-azurekms rules? = rules-encryption-tink
-
Enables azure_core ^0.21.0, azure_identity ^0.21.0, and azure_security_keyvault
Affects
encryption::azurekms
… - rules-encryption-gcpkms rules? = rules-encryption-tink
-
Enables google-cloud-auth and google-cloud-kms-v1
Affects
encryption::gcpkms
… - rules-encryption-hcvault rules? = rules-encryption-tink
-
Enables vaultrs
Affects
encryption::hcvault
… - rules-encryption-localkms = rules-encryption-tink
-
Affects
encryption::localkms
… - rules-encryption-tink rules-encryption-awskms? rules-encryption-azurekms? rules-encryption-gcpkms? rules-encryption-hcvault? rules-encryption-localkms?
-
Enables tink-aead, tink-daead, and tink-proto
Affects
encryption::encrypt_executor
… - rules-jsonata rules?
-
Enables bumpalo and jsonata-rs
Affects
jsonata::jsonata_executor
,rules::jsonata
…