-
Notifications
You must be signed in to change notification settings - Fork 1
Release v0.1.3 #60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release v0.1.3 #60
Conversation
Bumps [ruff](https://github.com/astral-sh/ruff) from 0.11.8 to 0.11.9. - [Release notes](https://github.com/astral-sh/ruff/releases) - [Changelog](https://github.com/astral-sh/ruff/blob/main/CHANGELOG.md) - [Commits](astral-sh/ruff@0.11.8...0.11.9) --- updated-dependencies: - dependency-name: ruff dependency-version: 0.11.9 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Bump ruff from 0.11.8 to 0.11.9
Bumps [ruff](https://github.com/astral-sh/ruff) from 0.11.9 to 0.11.10. - [Release notes](https://github.com/astral-sh/ruff/releases) - [Changelog](https://github.com/astral-sh/ruff/blob/main/CHANGELOG.md) - [Commits](astral-sh/ruff@0.11.9...0.11.10) --- updated-dependencies: - dependency-name: ruff dependency-version: 0.11.10 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Bumps [ASFHyP3/actions](https://github.com/asfhyp3/actions) from 0.18.1 to 0.19.0. - [Release notes](https://github.com/asfhyp3/actions/releases) - [Changelog](https://github.com/ASFHyP3/actions/blob/develop/CHANGELOG.md) - [Commits](ASFHyP3/actions@v0.18.1...v0.19.0) --- updated-dependencies: - dependency-name: ASFHyP3/actions dependency-version: 0.19.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
…/actions-0.19.0 Bump ASFHyP3/actions from 0.18.1 to 0.19.0
Bump ruff from 0.11.9 to 0.11.10
--- updated-dependencies: - dependency-name: ruff dependency-version: 0.11.11 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Bump ruff from 0.11.10 to 0.11.11
Download opera burst db during docker build
Developer checklist
Reviewer checklist
|
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
|
Golden test run: |
publish docker container to GHCR
Bumps [ASFHyP3/actions](https://github.com/asfhyp3/actions) from 0.19.0 to 0.20.0. - [Release notes](https://github.com/asfhyp3/actions/releases) - [Changelog](https://github.com/ASFHyP3/actions/blob/develop/CHANGELOG.md) - [Commits](ASFHyP3/actions@v0.19.0...v0.20.0) --- updated-dependencies: - dependency-name: ASFHyP3/actions dependency-version: 0.20.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
…/actions-0.20.0 bump ASFHyP3/actions from 0.19.0 to 0.20.0
| call-changelog-check-workflow: | ||
| # Docs: https://github.com/ASFHyP3/actions | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-changelog-check.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-changelog-check.yml@v0.20.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 8 months ago
To fix the issue, we will add a permissions block at the root of the workflow file. This block will specify the minimal permissions required for the workflow to function. Based on the context, the workflow appears to check for changelog updates, which likely requires read access to the repository contents. Therefore, we will set contents: read as the permission.
-
Copy modified lines R3-R5
| @@ -2,2 +2,5 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| on: |
| call-labeled-pr-check-workflow: | ||
| # Docs: https://github.com/ASFHyP3/actions | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-labeled-pr-check.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-labeled-pr-check.yml@v0.20.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 8 months ago
To fix the issue, we need to add a permissions block to the workflow. This block should specify the least privileges required for the workflow to function correctly. Since the workflow interacts with pull requests (e.g., checking labels), it likely requires contents: read and pull-requests: read. If additional permissions are needed, they should be added explicitly based on the functionality of the reusable workflow.
The permissions block should be added at the root level of the workflow, ensuring it applies to all jobs unless overridden by job-specific permissions.
-
Copy modified lines R3-R6
| @@ -2,2 +2,6 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
| pull-requests: read | ||
|
|
||
| on: |
|
|
||
| call-mypy-workflow: | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-mypy.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-mypy.yml@v0.20.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 8 months ago
To fix the issue, we need to add a permissions block to the root of the workflow file. This block will define the minimum required permissions for the workflow. Since the workflow calls reusable workflows, we should assume the most basic permissions (contents: read) unless the reusable workflows explicitly require additional permissions. If the reusable workflows need more permissions, they should ideally define them internally.
The fix involves:
- Adding a
permissionsblock at the root level of the workflow file. - Setting
contents: readas the default permission, which is sufficient for most basic CI workflows.
-
Copy modified lines R5-R7
| @@ -4,2 +4,5 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| jobs: |
add note to readme that validtion is still ongoing
|
Golden tests with ghcr image: https://github.com/ASFHyP3/hyp3-testing/actions/runs/15354527364 |
845172464411.dkr.ecr.us-west-2.amazonaws.com/asfhyp3/hyp3-opera-rtcand845172464411.dkr.ecr.us-west-2.amazonaws.com/opera_pge/rtc_s1