Skip to content

Commit

Permalink
fix CI errors
Browse files Browse the repository at this point in the history
  • Loading branch information
Xavier Basty committed Feb 2, 2024
1 parent 887199b commit 63d384b
Show file tree
Hide file tree
Showing 4 changed files with 29 additions and 25 deletions.
22 changes: 0 additions & 22 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 0 additions & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ tracing = "0.1"
tracing-subscriber = { version = "0.3", features = ["json"] }
metrics = "0.20"
axum-prometheus = "0.3"
prometheus = "0.13"

# Serialisation
serde = { version = "1.0", features = ["derive"] }
Expand Down
27 changes: 27 additions & 0 deletions deny.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
[licenses]
unused-allowed-license = "deny"
copyleft = "deny"
allow = [
"Apache-2.0",
"MIT",
"Unlicense",
"BSD-3-Clause",
"0BSD",
"ISC"
]

exceptions = [{ name = "unicode-ident", allow = ["Unicode-DFS-2016"] }]

[licenses.private]
ignore = true

# TODO We should be able to remove `ignore-sources` once we add `publish = false` to all the crates sourced from here.
ignore-sources = [
"https://github.com/WalletConnect/utils-rs.git",
"https://github.com/WalletConnect/WalletConnectRust.git",
]

[[licenses.clarify]]
name = "ring"
expression = "ISC"
license-files = [{ path = "LICENSE", hash = 0xbd0eed23 }]
4 changes: 2 additions & 2 deletions src/http_server/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -318,7 +318,7 @@ fn build_content_security_header(domains: Vec<Domain>) -> String {
#[test]
fn test_build_content_security_header() {
fn case(domains: &[&str], expected: &str) {
let domains = domains.into_iter().map(|s| Domain::from(s.to_string()));
let domains = domains.iter().map(|s| Domain::from(s.to_string()));
let got = build_content_security_header(domains.collect());
assert_eq!(&got, expected);
}
Expand Down Expand Up @@ -348,5 +348,5 @@ fn csrf_validation_checks_jwt_header_and_payload() {
let valid_header_invalid_payload =
"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.<svg/onload=alert(document.domain)>";

assert!(!CsrfToken::validate_format(&valid_header_invalid_payload))
assert!(!CsrfToken::validate_format(valid_header_invalid_payload))
}

0 comments on commit 63d384b

Please sign in to comment.