Update outdated dependencies (#2425)

This updates some older dependencies to address a few cargo audit warnings.

The majority of warnings come from network dependencies which will be addressed in #2389. 

This PR contains some minor dep updates that are not network related.

Co-authored-by: Michael Sproul <michael@sigmaprime.io>
This commit is contained in:
Age Manning 2021-07-05 00:54:17 +00:00
parent 206486006c
commit 73d002ef92
10 changed files with 691 additions and 655 deletions

1322
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@ -1,4 +1,4 @@
FROM rust:1.50.0 AS builder FROM rust:1.53.0 AS builder
RUN apt-get update && apt-get -y upgrade && apt-get install -y cmake RUN apt-get update && apt-get -y upgrade && apt-get install -y cmake
COPY . lighthouse COPY . lighthouse
ARG PORTABLE ARG PORTABLE

View File

@ -5,7 +5,7 @@ authors = ["Sigma Prime <contact@sigmaprime.io>"]
edition = "2018" edition = "2018"
[dependencies] [dependencies]
discv5 = { git = "https://github.com/sigp/discv5 ", rev = "02d2c896c66f8dc2b848c3996fedcd98e1dfec69", features = ["libp2p"] } discv5 = { version = "0.1.0-beta.5", features = ["libp2p"] }
unsigned-varint = { version = "0.6.0", features = ["codec"] } unsigned-varint = { version = "0.6.0", features = ["codec"] }
types = { path = "../../consensus/types" } types = { path = "../../consensus/types" }
hashset_delay = { path = "../../common/hashset_delay" } hashset_delay = { path = "../../common/hashset_delay" }

View File

@ -34,5 +34,5 @@ futures = "0.3.8"
store = { path = "../store" } store = { path = "../store" }
environment = { path = "../../lighthouse/environment" } environment = { path = "../../lighthouse/environment" }
tree_hash = "0.1.1" tree_hash = "0.1.1"
discv5 = { git = "https://github.com/sigp/discv5 ", rev = "02d2c896c66f8dc2b848c3996fedcd98e1dfec69", features = ["libp2p"] } discv5 = { version = "0.1.0-beta.5", features = ["libp2p"] }
sensitive_url = { path = "../../common/sensitive_url" } sensitive_url = { path = "../../common/sensitive_url" }

View File

@ -121,7 +121,7 @@ mod post {
testcase( testcase(
"unix:/run/foo.socket", "unix:/run/foo.socket",
&format!( &format!(
"[Reqwest - Builder] Url {{ scheme: \"unix\", username: \"\", password: None, host: None, port: None, path: \"/run/foo.socket/sign/{}\", query: None, fragment: None }}", "[Reqwest - Builder] Url {{ scheme: \"unix\", cannot_be_a_base: false, username: \"\", password: None, host: None, port: None, path: \"/run/foo.socket/sign/{}\", query: None, fragment: None }}",
PUBLIC_KEY_1 PUBLIC_KEY_1
), ),
); );
@ -129,7 +129,7 @@ mod post {
testcase( testcase(
"http://127.0.0.1:0", "http://127.0.0.1:0",
&format!( &format!(
"[Reqwest - Request] Url {{ scheme: \"http\", username: \"\", password: None, host: Some(Ipv4(127.0.0.1)), port: Some(0), path: \"/sign/{}\", query: None, fragment: None }}", "[Reqwest - Request] Url {{ scheme: \"http\", cannot_be_a_base: false, username: \"\", password: None, host: Some(Ipv4(127.0.0.1)), port: Some(0), path: \"/sign/{}\", query: None, fragment: None }}",
PUBLIC_KEY_1 PUBLIC_KEY_1
), ),
); );

View File

@ -8,7 +8,6 @@ edition = "2018"
[dependencies] [dependencies]
rand = "0.7.3" rand = "0.7.3"
aes-ctr = "0.6.0"
hmac = "0.10.1" hmac = "0.10.1"
pbkdf2 = { version = "0.6.0", default-features = false } pbkdf2 = { version = "0.6.0", default-features = false }
scrypt = { version = "0.5.0", default-features = false } scrypt = { version = "0.5.0", default-features = false }
@ -23,6 +22,7 @@ eth2_ssz = "0.1.2"
serde_json = "1.0.58" serde_json = "1.0.58"
eth2_key_derivation = { path = "../eth2_key_derivation" } eth2_key_derivation = { path = "../eth2_key_derivation" }
unicode-normalization = "0.1.16" unicode-normalization = "0.1.16"
aes = { version = "0.7", features = ["ctr"] }
[dev-dependencies] [dev-dependencies]
tempfile = "3.1.0" tempfile = "3.1.0"

View File

@ -7,9 +7,9 @@ use crate::json_keystore::{
Kdf, KdfModule, Scrypt, Sha256Checksum, Version, Kdf, KdfModule, Scrypt, Sha256Checksum, Version,
}; };
use crate::Uuid; use crate::Uuid;
use aes_ctr::cipher::generic_array::GenericArray; use aes::cipher::generic_array::GenericArray;
use aes_ctr::cipher::{NewStreamCipher, SyncStreamCipher}; use aes::cipher::{NewCipher, StreamCipher};
use aes_ctr::Aes128Ctr as AesCtr; use aes::Aes128Ctr as AesCtr;
use bls::{Keypair, PublicKey, SecretKey, ZeroizeHash}; use bls::{Keypair, PublicKey, SecretKey, ZeroizeHash};
use eth2_key_derivation::PlainText; use eth2_key_derivation::PlainText;
use hmac::Hmac; use hmac::Hmac;

View File

@ -8,7 +8,7 @@ edition = "2018"
clap = "2.33.3" clap = "2.33.3"
environment = { path = "../../lighthouse/environment" } environment = { path = "../../lighthouse/environment" }
hex = "0.4.2" hex = "0.4.2"
httpmock = "0.5.1" httpmock = "0.5.8"
remote_signer_client = { path = "../../remote_signer/client" } remote_signer_client = { path = "../../remote_signer/client" }
remote_signer_consumer = { path = "../../common/remote_signer_consumer" } remote_signer_consumer = { path = "../../common/remote_signer_consumer" }
reqwest = { version = "0.11.0", features = ["blocking", "json"] } reqwest = { version = "0.11.0", features = ["blocking", "json"] }