From d5cb2c8fbb625e24b8872b906596fe61faa7f7ed Mon Sep 17 00:00:00 2001 From: DaniPopes <57450786+DaniPopes@users.noreply.github.com> Date: Fri, 16 Jun 2023 07:50:19 +0200 Subject: [PATCH] chore: add CODEOWNERS, update deny.toml and ci.yml --- .github/CODEOWNERS | 10 ++++++++++ .github/workflows/ci.yml | 6 ++++++ deny.toml | 35 +---------------------------------- 3 files changed, 17 insertions(+), 34 deletions(-) create mode 100644 .github/CODEOWNERS diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS new file mode 100644 index 000000000..98f3bbec1 --- /dev/null +++ b/.github/CODEOWNERS @@ -0,0 +1,10 @@ +* @danipopes @prestwich + +crates/dyn-abi/ @prestwich +crates/json-abi/ @prestwich +crates/primitives/ @danipopes @prestwich +crates/rlp/ @prestwich +crates/rlp-derive/ @prestwich +crates/sol-macro/ @danipopes +crates/sol-types/ @danipopes @prestwich +crates/syn-solidity/ @danipopes diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 9e6b06de6..f98aa9d74 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -12,6 +12,7 @@ jobs: test: name: test ${{ matrix.rust }} ${{ matrix.flags }} runs-on: ubuntu-latest + timeout-minutes: 30 strategy: fail-fast: false matrix: @@ -32,6 +33,7 @@ jobs: wasm: name: check WASM runs-on: ubuntu-latest + timeout-minutes: 30 steps: - uses: actions/checkout@v3 - uses: dtolnay/rust-toolchain@stable @@ -43,6 +45,7 @@ jobs: feature-checks: name: feature checks runs-on: ubuntu-latest + timeout-minutes: 30 steps: - uses: actions/checkout@v3 - uses: dtolnay/rust-toolchain@stable @@ -54,6 +57,7 @@ jobs: clippy: name: clippy runs-on: ubuntu-latest + timeout-minutes: 30 steps: - uses: actions/checkout@v3 - uses: dtolnay/rust-toolchain@clippy @@ -64,6 +68,7 @@ jobs: docs: name: docs runs-on: ubuntu-latest + timeout-minutes: 30 steps: - uses: actions/checkout@v3 - uses: dtolnay/rust-toolchain@nightly @@ -76,6 +81,7 @@ jobs: fmt: name: fmt runs-on: ubuntu-latest + timeout-minutes: 30 steps: - uses: actions/checkout@v3 - uses: dtolnay/rust-toolchain@nightly diff --git a/deny.toml b/deny.toml index 156b9731f..8d7bf3ea1 100644 --- a/deny.toml +++ b/deny.toml @@ -1,6 +1,3 @@ -# This section is considered when running `cargo deny check advisories` -# More documentation for the advisories section can be found here: -# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html [advisories] vulnerability = "deny" unmaintained = "warn" @@ -8,37 +5,16 @@ unsound = "warn" yanked = "warn" notice = "warn" -# This section is considered when running `cargo deny check bans`. -# More documentation about the 'bans' section can be found here: -# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html [bans] -# Lint level for when multiple versions of the same crate are detected multiple-versions = "warn" -# Lint level for when a crate version requirement is `*` wildcards = "deny" highlight = "all" -# List of crates to deny -deny = [ - # Each entry the name of a crate and a version range. If version is - # not specified, all versions will be matched. - #{ name = "ansi_term", version = "=0.11.0" }, -] -# Certain crates/versions that will be skipped when doing duplicate detection. -skip = [] -# Similarly to `skip` allows you to skip certain crates during duplicate -# detection. Unlike skip, it also includes the entire tree of transitive -# dependencies starting at the specified crate, up to a certain depth, which is -# by default infinite -skip-tree = [] [licenses] unlicensed = "deny" confidence-threshold = 0.9 # copyleft = "deny" -# List of explicitly allowed licenses -# See https://spdx.org/licenses/ for list of possible licenses -# [possible values: any SPDX 3.7 short identifier (+ optional exception)]. allow = [ "MIT", "MIT-0", @@ -56,8 +32,6 @@ allow = [ "LicenseRef-webpki", ] -# Allow 1 or more licenses on a per-crate basis, so that particular licenses -# aren't accepted for every possible crate as with the normal allow list exceptions = [ # CC0 is a permissive license but somewhat unclear status for source code # so we prefer to not have dependencies using it @@ -75,13 +49,6 @@ name = "webpki" expression = "LicenseRef-webpki" license-files = [{ path = "LICENSE", hash = 0x001c7e6c }] -# This section is considered when running `cargo deny check sources`. -# More documentation about the 'sources' section can be found here: -# https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html [sources] -# Lint level for what to happen when a crate from a crate registry that is not -# in the allow list is encountered unknown-registry = "deny" -# Lint level for what to happen when a crate from a git repository that is not -# in the allow list is encountered -unknown-git = "warn" # TODO: switch back to deny once `ruint` is released +unknown-git = "deny"