Skip to content

Commit 3a8f00e

Browse files
committed
chore: update security toolchain config
- Update deny.toml, clippy.toml, rustfmt.toml - Add .cargo/audit.toml - Update sec-audit.yml (timeout 35min, add audit.toml path) - Update Cargo.toml/Cargo.lock (dependency cleanup)
1 parent 1228dd5 commit 3a8f00e

10 files changed

Lines changed: 509 additions & 426 deletions

File tree

.cargo/audit.toml

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
[advisories]
2+
ignore = [
3+
"RUSTSEC-2025-0141",
4+
]
5+
informational_warnings = ["unmaintained"]
6+
severity_threshold = "low"
7+
8+
[database]
9+
fetch = true
10+
stale = false
11+
12+
[output]
13+
deny = ["unmaintained"]
14+
format = "terminal"
15+
quiet = false
16+
show_tree = true
17+
18+
[yanked]
19+
enabled = true
20+
update_index = true

.github/workflows/sec-audit.yml

Lines changed: 51 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,62 @@
11
name: Sec Audit
22

33
on:
4-
push:
5-
branches: [main]
6-
paths:
7-
- "Cargo.toml"
8-
- "Cargo.lock"
9-
- "src/**"
10-
- "crates/**"
11-
- "deny.toml"
12-
pull_request:
13-
branches: [main]
14-
paths:
15-
- "Cargo.toml"
16-
- "Cargo.lock"
17-
- "src/**"
18-
- "crates/**"
19-
- "deny.toml"
20-
schedule:
21-
- cron: "0 6 * * 1" # Weekly on Monday 6am UTC
4+
push:
5+
branches: [main]
6+
paths:
7+
- "Cargo.toml"
8+
- "Cargo.lock"
9+
- "src/**"
10+
- "crates/**"
11+
- "deny.toml"
12+
- '.cargo/audit.toml'
13+
pull_request:
14+
branches: [main]
15+
paths:
16+
- "Cargo.toml"
17+
- "Cargo.lock"
18+
- "src/**"
19+
- "crates/**"
20+
- "deny.toml"
21+
- '.cargo/audit.toml'
22+
schedule:
23+
- cron: "0 6 * * 1"
2224

2325
concurrency:
24-
group: security-${{ github.event.pull_request.number || github.ref }}
25-
cancel-in-progress: true
26+
group: security-${{ github.event.pull_request.number || github.ref }}
27+
cancel-in-progress: true
2628

2729
permissions:
28-
contents: read
29-
security-events: write
30-
actions: read
31-
checks: write
30+
contents: read
31+
issues: write
3232

3333
env:
34-
CARGO_TERM_COLOR: always
34+
CARGO_TERM_COLOR: always
3535

3636
jobs:
37-
audit:
38-
name: Security Audit
39-
runs-on: ubuntu-latest
40-
timeout-minutes: 20
41-
steps:
42-
- uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4
43-
44-
- uses: rustsec/audit-check@69366f33c96575abad1ee0dba8212993eecbe998 # v2.0.0
45-
with:
46-
token: ${{ secrets.GITHUB_TOKEN }}
47-
48-
deny:
49-
name: License & Supply Chain
50-
runs-on: ubuntu-latest
51-
timeout-minutes: 20
52-
steps:
53-
- uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4
54-
55-
- uses: EmbarkStudios/cargo-deny-action@3fd3802e88374d3fe9159b834c7714ec57d6c979 # v2
56-
with:
57-
command: check advisories licenses sources
37+
audit:
38+
name: Security Audit
39+
runs-on: ubuntu-latest
40+
timeout-minutes: 35
41+
steps:
42+
- uses: actions/checkout@v4
43+
- uses: rustsec/audit-check@v2.0.0
44+
with:
45+
token: ${{ secrets.GITHUB_TOKEN }}
46+
47+
deny:
48+
name: License & Supply Chain
49+
runs-on: ubuntu-latest
50+
timeout-minutes: 35
51+
strategy:
52+
matrix:
53+
checks:
54+
- advisories
55+
- bans licenses sources
56+
continue-on-error: ${{ matrix.checks == 'advisories' }}
57+
steps:
58+
- uses: actions/checkout@v4
59+
- uses: EmbarkStudios/cargo-deny-action@v2
60+
with:
61+
command: check ${{ matrix.checks }}
62+
arguments: --all-features

0 commit comments

Comments
 (0)