hopefully resolving cargo audit
Some checks failed
CI / Rustfmt (push) Successful in 19s
CI / Cargo Audit & Deny (push) Successful in 29s
CI / Web Blocking Checks (push) Successful in 48s
CI / Security Blocking Checks (push) Successful in 8s
CI / Clippy (push) Successful in 2m2s
CI / Web Advisory Checks (push) Successful in 32s
CI / Security Advisory Checks (push) Successful in 35s
CI / Tests (push) Failing after 7m54s
Some checks failed
CI / Rustfmt (push) Successful in 19s
CI / Cargo Audit & Deny (push) Successful in 29s
CI / Web Blocking Checks (push) Successful in 48s
CI / Security Blocking Checks (push) Successful in 8s
CI / Clippy (push) Successful in 2m2s
CI / Web Advisory Checks (push) Successful in 32s
CI / Security Advisory Checks (push) Successful in 35s
CI / Tests (push) Failing after 7m54s
This commit is contained in:
@@ -124,9 +124,8 @@ jobs:
|
||||
with:
|
||||
path: |
|
||||
~/.cargo/bin/cargo-binstall
|
||||
~/.cargo/bin/cargo-audit
|
||||
~/.cargo/bin/cargo-deny
|
||||
key: cargo-security-tools-v1
|
||||
key: cargo-security-tools-v2
|
||||
|
||||
- name: Install cargo-binstall
|
||||
run: |
|
||||
@@ -136,12 +135,8 @@ jobs:
|
||||
|
||||
- name: Install security tools (pre-built binaries)
|
||||
run: |
|
||||
command -v cargo-audit &> /dev/null || cargo binstall --no-confirm --locked cargo-audit
|
||||
command -v cargo-deny &> /dev/null || cargo binstall --no-confirm --locked cargo-deny
|
||||
|
||||
- name: Cargo Audit
|
||||
run: cargo audit
|
||||
|
||||
- name: Cargo Deny
|
||||
run: cargo deny check
|
||||
|
||||
|
||||
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1,6 +1,5 @@
|
||||
# Rust
|
||||
target/
|
||||
Cargo.lock
|
||||
**/*.rs.bk
|
||||
*.pdb
|
||||
|
||||
|
||||
6642
Cargo.lock
generated
Normal file
6642
Cargo.lock
generated
Normal file
File diff suppressed because it is too large
Load Diff
10
Makefile
10
Makefile
@@ -316,14 +316,9 @@ coverage:
|
||||
update:
|
||||
cargo update
|
||||
|
||||
# Audit dependencies for security issues
|
||||
# Ignored advisories:
|
||||
# RUSTSEC-2023-0071: rsa via sqlx-mysql (we only use postgres, no upstream fix)
|
||||
# RUSTSEC-2025-0134: rustls-pemfile via lapin TLS stack (no alternative)
|
||||
AUDIT_IGNORE = --ignore RUSTSEC-2023-0071 --ignore RUSTSEC-2025-0134
|
||||
|
||||
# Audit dependencies for security issues (ignores configured in deny.toml)
|
||||
audit:
|
||||
cargo audit $(AUDIT_IGNORE)
|
||||
cargo deny check advisories
|
||||
|
||||
deny:
|
||||
cargo deny check
|
||||
@@ -332,7 +327,6 @@ ci-rust:
|
||||
cargo fmt --all -- --check
|
||||
cargo clippy --workspace --all-targets --all-features -- -D warnings
|
||||
cargo test --workspace --all-features
|
||||
cargo audit $(AUDIT_IGNORE)
|
||||
cargo deny check
|
||||
|
||||
ci-web-blocking:
|
||||
|
||||
11
deny.toml
11
deny.toml
@@ -4,13 +4,12 @@ all-features = true
|
||||
[advisories]
|
||||
version = 2
|
||||
yanked = "deny"
|
||||
# Note: RUSTSEC-2023-0071 (rsa via sqlx-mysql) is in Cargo.lock but unreachable —
|
||||
# sqlx-macros-core unconditionally resolves sqlx-mysql; we only use postgres.
|
||||
# cargo deny's graph analysis correctly identifies it as unreachable, so no
|
||||
# ignore entry is needed here. If cargo audit is ever re-added, it will need
|
||||
# --ignore RUSTSEC-2023-0071 since it scans the lockfile without graph analysis.
|
||||
ignore = [
|
||||
# rsa v0.9.10 - Marvin Attack timing sidechannel (medium severity)
|
||||
# Pulled in transitively by sqlx-mysql, which sqlx compiles unconditionally
|
||||
# for its macro system. We only use PostgreSQL — the rsa code is never
|
||||
# executed. No upstream fix available.
|
||||
{ id = "RUSTSEC-2023-0071", reason = "transitive via sqlx-mysql; we only use postgres" },
|
||||
|
||||
# rustls-pemfile v2.x - unmaintained
|
||||
# Transitive dependency via lapin → amq-protocol-tcp → tcp-stream.
|
||||
# No alternative available until lapin updates its TLS stack.
|
||||
|
||||
@@ -1,14 +0,0 @@
|
||||
○ valkey.service - Advanced key-value store
|
||||
Loaded: loaded (]8;;file://hp-probook-cachy/usr/lib/systemd/system/valkey.service\/usr/lib/systemd/system/valkey.service]8;;\; [0;1;38:5:185mdisabled[0m; preset: [0;1;38:5:185mdisabled[0m)
|
||||
Active: inactive (dead)
|
||||
|
||||
Feb 10 20:42:44 hp-probook-cachy systemd[1]: Started Advanced key-value store.
|
||||
Feb 19 13:50:06 hp-probook-cachy valkey-server[1154]: 1154:signal-handler (1771530606) Received SIGTERM scheduling shutdown...
|
||||
Feb 19 13:50:06 hp-probook-cachy systemd[1]: Stopping Advanced key-value store...
|
||||
Feb 19 13:50:06 hp-probook-cachy valkey-server[1154]: 1154:M 19 Feb 2026 13:50:06.871 * User requested shutdown...
|
||||
Feb 19 13:50:06 hp-probook-cachy valkey-server[1154]: 1154:M 19 Feb 2026 13:50:06.871 * Saving the final RDB snapshot before exiting.
|
||||
Feb 19 13:50:06 hp-probook-cachy valkey-server[1154]: 1154:M 19 Feb 2026 13:50:06.874 * DB saved on disk
|
||||
Feb 19 13:50:06 hp-probook-cachy valkey-server[1154]: 1154:M 19 Feb 2026 13:50:06.874 # Valkey is now ready to exit, bye bye...
|
||||
Feb 19 13:50:06 hp-probook-cachy systemd[1]: valkey.service: Deactivated successfully.
|
||||
Feb 19 13:50:06 hp-probook-cachy systemd[1]: Stopped Advanced key-value store.
|
||||
Feb 19 13:50:06 hp-probook-cachy systemd[1]: valkey.service: Consumed 3min 58.539s CPU time over 1d 15h 35min 51.539s wall clock time, 13.2M memory peak.
|
||||
Reference in New Issue
Block a user