Open-CMSIS-Pack / cbuild2cmake

A command line tool that generates CMakeLists.txt file from *.cbuild.yml files generated by csolution
Apache License 2.0
3 stars 2 forks source link

Bump goreleaser/goreleaser-action from 5.0.0 to 5.1.0 #112

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 2 months ago

Bumps goreleaser/goreleaser-action from 5.0.0 to 5.1.0.

Release notes

Sourced from goreleaser/goreleaser-action's releases.

v5.1.0

Important

This version changes the default behavior of latest to ~> v1.

The next major of this action (v6), will change this to ~> v2, and will be launched together with GoReleaser v2.

What's Changed

New Contributors

Full Changelog: https://github.com/goreleaser/goreleaser-action/compare/v5.0.0...v5.1.0

Commits
  • 5742e2a chore: re-generate
  • 70ccc5d chore(deps): bump @​actions/http-client from 2.2.0 to 2.2.1 (#451)
  • d55bec7 chore(deps): bump semver from 7.6.0 to 7.6.2 (#462)
  • f1dbd53 feat: lock this major version of the action to use '~> v1' as 'latest' (#461)
  • 2953d07 chore(deps): update http-client
  • 62d4b8a chore: use corepack to install yarn (#458)
  • f09f1a7 chore(deps): bump tar from 6.1.14 to 6.2.1 (#456)
  • 9937f9b Revert "docs: Upgrade setup-go action version in README (#455)"
  • b7f6f16 docs: Upgrade setup-go action version in README (#455)
  • c21f56a docs: update readme
  • Additional commits viewable in compare view


Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
github-actions[bot] commented 2 months ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/goreleaser/goreleaser-action 5742e2a039330cbb23ebf35f046f814d4c6ff811 :green_circle: 4.8
Details
CheckScoreReason
Maintained:green_circle: 98 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 9
Code-Review:green_circle: 5Found 9/18 approved changesets -- score normalized to 5
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
Security-Policy:warning: 0security policy file not detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities:green_circle: 64 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
actions/goreleaser/goreleaser-action 7ec5c2b0c6cdda6e8bbb49444bc797dd33d74dd8 :green_circle: 4.8
Details
CheckScoreReason
Maintained:green_circle: 98 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 9
Code-Review:green_circle: 5Found 9/18 approved changesets -- score normalized to 5
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
Security-Policy:warning: 0security policy file not detected
SAST:warning: 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities:green_circle: 64 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0

Scanned Manifest Files

.github/workflows/release.yml
  • goreleaser/goreleaser-action@5742e2a039330cbb23ebf35f046f814d4c6ff811
  • goreleaser/goreleaser-action@7ec5c2b0c6cdda6e8bbb49444bc797dd33d74dd8
codeclimate[bot] commented 2 months ago

Code Climate has analyzed commit ab1a369a and detected 0 issues on this pull request.

View more on Code Climate.