DefectDojo / django-DefectDojo

DevSecOps, ASPM, Vulnerability Management. All on one platform.
https://defectdojo.com
BSD 3-Clause "New" or "Revised" License
3.49k stars 1.48k forks source link

Bump coverage from 7.5.3 to 7.5.4 #10447

Closed dependabot[bot] closed 1 week ago

dependabot[bot] commented 1 week ago

Bumps coverage from 7.5.3 to 7.5.4.

Changelog

Sourced from coverage's changelog.

Version 7.5.4 — 2024-06-22

  • If you attempt to combine statement coverage data with branch coverage data, coverage.py used to fail with the message "Can't combine arc data with line data" or its reverse, "Can't combine line data with arc data." These messages used internal terminology, making it hard for people to understand the problem. They are now changed to mention "branch coverage data" and "statement coverage data."

  • Fixed a minor branch coverage problem with wildcard match/case cases using names or guard clauses.

  • Started testing on 3.13 free-threading (nogil) builds of Python. I'm not claiming full support yet. Closes issue 1799_.

.. _issue 1799: nedbat/coveragepy#1799

.. _changes_7-5-3:

Commits
  • 22c09c6 docs: sample HTML for 7.5.4
  • 9e16381 docs: prep for 7.5.4
  • fba9b9e docs: link issue 1799 from the changelog
  • f124de8 build: no longer download kits to upload them
  • 9516cf6 build: hash-pin all actions
  • c6e0985 build: finish up the publish action
  • 4a49458 build: get the latest dist run id for publishing
  • fb15efa build: pin hashes for publishing actions
  • c20af95 build: use the correct item: github.event.action
  • ccbab15 build: dump all the github actions data
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 1 week ago

Hi there :wave:, @dryrunsecurity here, below is a summary of our analysis and findings.

DryRun Security Status Findings
Server-Side Request Forgery Analyzer :white_check_mark: 0 findings
Configured Codepaths Analyzer :white_check_mark: 0 findings
IDOR Analyzer :white_check_mark: 0 findings
Sensitive Files Analyzer :grey_exclamation: 1 finding
SQL Injection Analyzer :white_check_mark: 0 findings
Authn/Authz Analyzer :white_check_mark: 0 findings
Secrets Analyzer :white_check_mark: 0 findings

[!Note] :green_circle: Risk threshold not exceeded.

Change Summary (click to expand) The following is a summary of changes in this pull request made by me, your security buddy :robot:. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. **Summary:** The provided code change is an update to the `requirements.txt` file for the DefectDojo application, which is a web-based tool for managing software vulnerabilities. The key changes include a minor version update to the `coverage` package, as well as the inclusion of several security-related packages, such as `defusedxml` for mitigating XML-based attacks, `django-auditlog` for logging and auditing changes, `django-ratelimit` for protecting against brute-force attacks, `argon2-cffi` for secure password hashing, `blackduck` for integrating with the BlackDuck software composition analysis tool, and `vulners` for checking for known vulnerabilities in the application's dependencies. Overall, the changes appear to be routine updates to the application's dependencies, with a focus on maintaining security and stability. **Files Changed:** - `requirements.txt`: This file has been updated to include the following changes: - The `coverage` package has been updated from version 7.5.3 to 7.5.4. - Several security-related packages have been included, such as `defusedxml`, `django-auditlog`, `django-ratelimit`, `argon2-cffi`, `blackduck`, and `vulners`. - These packages are important for mitigating various security risks, such as XML-based attacks, brute-force attacks, and open-source vulnerabilities, as well as for logging and auditing changes to the application.

Powered by DryRun Security