Skip to content

v2.2

v2.2 #107

Workflow file for this run

name: Geyser CI
on:
push:
branches:
- master
- 'v*.*'
tags:
- 'v*.*.*'
pull_request:
branches:
- master
- 'v*.*'
jobs:
security_audit:
name: security_audit
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
submodules: recursive
- name: Install cargo-audit from crates.io
uses: baptiste0928/cargo-install@v3
with:
crate: cargo-audit
- run: |
cargo audit \
#
# Crate: ed25519-dalek
# Version: 1.0.1
# Title: Double Public Key Signing Function Oracle Attack on `ed25519-dalek`
# Date: 2022-06-11
# ID: RUSTSEC-2022-0093
# URL: https://rustsec.org/advisories/RUSTSEC-2022-0093
# Solution: Upgrade to >=2
--ignore RUSTSEC-2022-0093 \
# Crate: idna
# Version: 0.1.5
# Title: `idna` accepts Punycode labels that do not produce any non-ASCII when decoded
# Date: 2024-12-09
# ID: RUSTSEC-2024-0421
# URL: https://rustsec.org/advisories/RUSTSEC-2024-0421
# Solution: Upgrade to >=1.0.0
# need to solve this depentant tree:
# jsonrpc-core-client v18.0.0 -> jsonrpc-client-transports v18.0.0 -> url v1.7.2 -> idna v0.1.5
--ignore RUSTSEC-2024-0421 \
# === programs/sbf ===
#
# Crate: curve25519-dalek
# Version: 3.2.1
# Title: Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub`
# Date: 2024-06-18
# ID: RUSTSEC-2024-0344
# URL: https://rustsec.org/advisories/RUSTSEC-2024-0344
# Solution: Upgrade to >=4.1.3
--ignore RUSTSEC-2024-0344 \
# Crate: tonic
# Version: 0.9.2
# Title: Remotely exploitable Denial of Service in Tonic
# Date: 2024-10-01
# ID: RUSTSEC-2024-0376
# URL: https://rustsec.org/advisories/RUSTSEC-2024-0376
# Solution: Upgrade to >=0.12.3
--ignore RUSTSEC-2024-0376 \
# Crate: ring
# Version: 0.16.20
# Title: Some AES functions may panic when overflow checking is enabled.
# Date: 2025-03-06
# ID: RUSTSEC-2025-0009
# URL: https://rustsec.org/advisories/RUSTSEC-2025-0009
# Solution: Upgrade to >=0.17.12
# Dependency tree:
# ring 0.16.20
#
# Crate: ring
# Version: 0.17.3
# Title: Some AES functions may panic when overflow checking is enabled.
# Date: 2025-03-06
# ID: RUSTSEC-2025-0009
# URL: https://rustsec.org/advisories/RUSTSEC-2025-0009
# Solution: Upgrade to >=0.17.12
# Dependency tree:
# ring 0.17.3
--ignore RUSTSEC-2025-0009
lint:
name: lint
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions-rust-lang/setup-rust-toolchain@v1
with:
components: rustfmt, clippy
- name: Install cargo-sort from crates.io
uses: baptiste0928/cargo-install@v3
with:
crate: cargo-sort
version: "1.0.9"
- name: Cargo sort
run: cargo sort --workspace --check
- name: run clippy
run: cargo clippy --all-features -- -D clippy::all
- run: cargo fmt --all --check
build:
name: build
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions-rust-lang/setup-rust-toolchain@v1
- run: cargo build --release
test:
name: test
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions-rust-lang/setup-rust-toolchain@v1
- run: cargo test --all-features --all-targets
release:
name: release
runs-on: ubuntu-latest
needs: [build, test, lint]
if: ${{ startsWith(github.ref, 'refs/tags/') }}
steps:
- uses: actions/checkout@v4
- uses: actions-rust-lang/setup-rust-toolchain@v1
- run: cargo build --release
- name: Create release
uses: softprops/action-gh-release@v1
if: startsWith(github.ref, 'refs/tags/')
with:
files: ./target/release/libgeyser_grpc_plugin_server.so