Eyad Issa
216218b214
* Stop publishing the obsolete arti-hyper crate * Update curve25519-dalek to avoid a low-severity timing vulnerability. (TROVE-2024-007) * With full vanguards, client rendezvous circuits do not reuse the final vanguard as the rendezvous point. (TROVE-2024-008) * Some RPC development * Add skeleton, including (experimental): arti-relay crate, relay cargo feature in arti-client, relay command line argument to arti * Add a key material export facility for some of our TLS implementations. * Tolerate removal of files from Arti's cache directory. OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=23
59 lines
2.1 KiB
Plaintext
59 lines
2.1 KiB
Plaintext
<services>
|
|
<service name="obs_scm" mode="manual">
|
|
<param name="url">https://gitlab.torproject.org/tpo/core/arti.git</param>
|
|
<param name="versionformat">@PARENT_TAG@~@TAG_OFFSET@</param>
|
|
<param name="scm">git</param>
|
|
<param name="revision">arti-v1.2.5</param>
|
|
<param name="match-tag">*</param>
|
|
<param name="versionrewrite-pattern">arti-v(\d+\.\d+\.\d+)</param>
|
|
<param name="versionrewrite-replacement">\1</param>
|
|
<param name="changesgenerate">enable</param>
|
|
</service>
|
|
|
|
<service name="set_version" mode="manual" />
|
|
<service name="cargo_vendor" mode="manual">
|
|
<param name="srcdir">arti</param>
|
|
<param name="compression">zst</param>
|
|
<param name="update">true</param>
|
|
|
|
<!--
|
|
From https://gitlab.torproject.org/tpo/core/arti/-/blob/2db5ccf16d2f977c073ba3f142513b920fb7b6a1/maint/cargo_audit
|
|
-->
|
|
|
|
<!--
|
|
This is a real but theoretical unaligned read. It might happen only on
|
|
Windows and only with a custom global allocator, which we don't do in our
|
|
arti binary. The bad crate is depended on by env-logger and clap.
|
|
This is being discussed by those crates' contributors here:
|
|
https://github.com/clap-rs/clap/pull/4249
|
|
https://github.com/rust-cli/env_logger/pull/246
|
|
-->
|
|
<param name="i-accept-the-risk">RUSTSEC-2021-0145</param>
|
|
|
|
<!--
|
|
As of 28 Nov 2023, all versions of the rsa crate have a variable
|
|
timing attack that can leak private keys.
|
|
|
|
We do not use (yet) do any private-key rsa operations in arti:
|
|
we only use it to verify signatures.
|
|
-->
|
|
<param name="i-accept-the-risk">RUSTSEC-2023-0071</param>
|
|
|
|
|
|
<!--
|
|
This is not a vulnerability but an unmaintained warning for
|
|
`generational-arena`. It is only used by arti-rpcserver (which is
|
|
experimental).
|
|
-->
|
|
<param name="i-accept-the-risk">RUSTSEC-2024-0014</param>
|
|
|
|
</service>
|
|
|
|
<service name="cargo_audit" mode="manual">
|
|
<param name="srcdir">arti</param>
|
|
</service>
|
|
|
|
|
|
<service name="tar" mode="buildtime" />
|
|
</services>
|