SHA256
1
0
forked from pool/arti
arti/_service
Eyad Issa 216218b214 - Update to version 1.2.5:
* Stop publishing the obsolete arti-hyper crate
  * Update curve25519-dalek to avoid a low-severity timing 
    vulnerability. (TROVE-2024-007)
  * With full vanguards, client rendezvous circuits
    do not reuse the final vanguard as the rendezvous point.
    (TROVE-2024-008)
  * Some RPC development
  * Add skeleton, including (experimental): arti-relay crate,
    relay cargo feature in arti-client,
    relay command line argument to arti
  * Add a key material export facility for some of our TLS 
    implementations.
  * Tolerate removal of files from Arti's cache directory.

OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=23
2024-07-14 18:32:52 +00:00

59 lines
2.1 KiB
Plaintext

<services>
<service name="obs_scm" mode="manual">
<param name="url">https://gitlab.torproject.org/tpo/core/arti.git</param>
<param name="versionformat">@PARENT_TAG@~@TAG_OFFSET@</param>
<param name="scm">git</param>
<param name="revision">arti-v1.2.5</param>
<param name="match-tag">*</param>
<param name="versionrewrite-pattern">arti-v(\d+\.\d+\.\d+)</param>
<param name="versionrewrite-replacement">\1</param>
<param name="changesgenerate">enable</param>
</service>
<service name="set_version" mode="manual" />
<service name="cargo_vendor" mode="manual">
<param name="srcdir">arti</param>
<param name="compression">zst</param>
<param name="update">true</param>
<!--
From https://gitlab.torproject.org/tpo/core/arti/-/blob/2db5ccf16d2f977c073ba3f142513b920fb7b6a1/maint/cargo_audit
-->
<!--
This is a real but theoretical unaligned read. It might happen only on
Windows and only with a custom global allocator, which we don't do in our
arti binary. The bad crate is depended on by env-logger and clap.
This is being discussed by those crates' contributors here:
https://github.com/clap-rs/clap/pull/4249
https://github.com/rust-cli/env_logger/pull/246
-->
<param name="i-accept-the-risk">RUSTSEC-2021-0145</param>
<!--
As of 28 Nov 2023, all versions of the rsa crate have a variable
timing attack that can leak private keys.
We do not use (yet) do any private-key rsa operations in arti:
we only use it to verify signatures.
-->
<param name="i-accept-the-risk">RUSTSEC-2023-0071</param>
<!--
This is not a vulnerability but an unmaintained warning for
`generational-arena`. It is only used by arti-rpcserver (which is
experimental).
-->
<param name="i-accept-the-risk">RUSTSEC-2024-0014</param>
</service>
<service name="cargo_audit" mode="manual">
<param name="srcdir">arti</param>
</service>
<service name="tar" mode="buildtime" />
</services>