-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSUB-386: Enable cargo audit in CI #880
Conversation
d6721aa
to
5c14955
Compare
Codecov Report
@@ Coverage Diff @@
## dev #880 +/- ##
======================================
Coverage ? 77.62%
======================================
Files ? 75
Lines ? 11383
Branches ? 0
======================================
Hits ? 8836
Misses ? 2547
Partials ? 0 📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
For full LLVM coverage report click here! |
The report being output by the audit points to the If that library is being used inside the runtime, it's not a security concern because of the One question I have from looking at this and the the main I would assume, for example, that this dependency: Still digging, but any insights are appreciated. |
That's correct. Dependabot will not do anything about it. |
Referring to this issue in the
However, maintainers of Unfortunately, this would not fix the problem... because it appears that We need to look at the execution paths & conditions to determine whether this is a concern for us. Unfortunately, it appears that some of the dependencies that utilize The fact that multiple core dependencies are no longer maintained brings up another issue around how large our "trusted base" is, given the amount of dependencies the project has. Let's take a little more time to analyze the short term risks of the failures reported by |
The time dependency here looks like it's being pulled in by Substrate related crates. There are newer versions of these crates available now on crates.io (as opposed the github they're currently being pulled from), but several of the newer crates introduce new names for existing types as well as moving types we're using to new modules. There would be a bit of effort involved in migrating to the latest Substrate crates, but it may help with some of our dependency concerns here. The downside is that by upgrading the substrate crates we go from ~900 dependencies to just over 1100, so not the ideal direction. |
Potential segfault in the time crate: https://rustsec.org/advisories/RUSTSEC-2020-0071 this is not a direct dependency of creditcoin-node and will be fixed via a future upgrade of Substrate. ALSO don't error out on warnings because all of them are coming from Substrate as well.
7ea0b3f
to
5faa4ff
Compare
this is an extra check which should hopefully inform us on warnings or anything else that is a 1st level dependency of Creditcoin.
5faa4ff
to
804eeca
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not crazy about ignoring all indirect dependencies, but I think this is still a nice addition to the pipeline.
Edit: After clarification, everything makes sense
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A couple questions/comments
Description of proposed changes:
Practical tips for PR review & merge: