Address vulnerabilities reported within the tools directory (#2633)
## Motivation and Context
Addresses vulnerabilities reported by `cargo audit` within the
repository.
## Description
This commit addresses vulnerabilities within the tools directory
reported by `cargo audit`. Mostly they have been fixed by regenerating
`Cargo.lock` files. Two exceptions:
- `crate-hasher` needs to drop the `temp_dir` crate and switch over to
the `tempfile` crate
- `canary-runner` needs to upgrade the `octorust` crate
## Testing
After the PR, no vulnerabilities reported from the crates that have been
patched. Ran `cargo t` on the updated crates.
Furthermore, no vulnerabilities reported currently within `rust-runtime`
and `aws/rust-runtime`:
```
➜ rust-runtime git:(ysaito/fix-cargo-audit) pwd
smithy-rs/rust-runtime
➜ rust-runtime git:(ysaito/fix-cargo-audit) rm Cargo.lock && cargo generate-lockfile && cargo audit
Updating crates.io index
Fetching advisory database from `https://github.com/RustSec/advisory-db.git`
Loaded 543 security advisories
Updating crates.io index
Scanning Cargo.lock for vulnerabilities (314 crate dependencies)
➜ rust-runtime git:(ysaito/fix-cargo-audit) pwd
smithy-rs/aws/rust-runtime
➜ rust-runtime git:(ysaito/fix-cargo-audit) rm Cargo.lock && cargo generate-lockfile && cargo audit
Updating crates.io index
Fetching advisory database from `https://github.com/RustSec/advisory-db.git`
Loaded 543 security advisories
Updating crates.io index
Scanning Cargo.lock for vulnerabilities (249 crate dependencies)
```
----
_By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice._
Co-authored-by:
Yuki Saito <awsaito@amazon.com>
Loading
Please sign in to comment