Fix failing and skipped security checks#37
Draft
atul-fusionpact wants to merge 3 commits intomainfrom
Draft
Conversation
- Update cargo-deny config to latest schema; enforce license policy, bans - Bump prometheus -> 0.14 to resolve protobuf RUSTSEC; update slab -> 0.4.11 - Update config -> 0.14 to drop yaml-rust advisory - Adjust secret scanning to ignore docs/examples false-positives - Run container scan and reproducible build on PRs/develop to avoid skips
Configure cargo-deny for license and ban checks. Add comprehensive license data. Co-authored-by: atul <atul@fusionpact.com>
|
Cursor Agent can help with this pull request. Just |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
📋 Description
This PR addresses multiple failing and skipped security checks within the repository's CI/CD pipeline. It modernizes the
cargo-denyconfiguration, resolves identified dependency vulnerabilities, enables previously skipped container vulnerability and reproducible build scans, and refines secret scanning exclusions to reduce false positives.Related Issue(s): Closes #
🔧 Type of Change
Please select the type of change this PR introduces:
📚 Library/Component Affected
Please check the libraries or components affected by this PR:
🧪 Testing
Please describe the testing you've performed:
cargo test --workspace)Test Coverage
📝 Checklist
Please ensure your PR meets these requirements:
Code Quality
cargo clippy --workspace)cargo fmt --all)Documentation
Testing & Security
Dependencies
🔗 Related Issues
Link any related issues, discussions, or previous PRs:
📸 Screenshots/Demonstrations
If applicable, add screenshots, GIFs, or command output demonstrating the changes:
🚀 Performance Impact
If applicable, describe any performance implications:
Benchmarks (if applicable)
# Include benchmark results cargo bench💭 Additional Context
This PR addresses the following security-related issues:
cargo-denyConfiguration: Thedeny.tomlhas been updated to the latest schema, resolving parsing errors and ensuring proper enforcement of license policies and crate bans (e.g.,openssl/openssl-sys).prometheus,slab, andconfighave been upgraded to resolve known RUSTSEC advisories (e.g., RUSTSEC-2024-0437, RUSTSEC-2025-0047, RUSTSEC-2024-0320 by droppingyaml-rust).security.ymlworkflow now ensures thatContainer Vulnerability ScanandReproducible Build Verificationjobs run onpull_requestevents and pushes to thedevelopbranch, in addition tomain.Dependency Security Auditjob has been made more robust by attemptingcargo-auditfirst and falling back tocargo deny check advisoriesifcargo-auditcannot be installed due to toolchain issues.docs/**,examples/**,README.md) to reduce false positives, while maintaining core repository scanning.Breaking Changes
If this PR introduces breaking changes, please describe:
Future Work
List any follow-up tasks or known limitations:
🧑💻 Reviewer Notes
Areas of focus for reviewers:
deny.tomlto ensure the new schema and policies align with project requirements.security.ymlworkflow changes, particularly theifconditions for the container scan and reproducible build jobs, and the fallback logic for the dependency audit.Cargo.tomlandCargo.lockare appropriate and do not introduce regressions.Testing instructions:
cargo build --workspace.cargo deny check --all-featuresto verify the updated configuration.cargo audit(if installable) orcargo deny check advisoriesto confirm vulnerability resolution.📋 Maintainer Checklist (for maintainers)
Your contribution helps advance enterprise Bitcoin adoption