cjkrolak / ThermostatSupervisor

supervisor to detect and correct thermostat deviations
MIT License
0 stars 0 forks source link

Bump pypa/gh-action-pypi-publish from 1.10.0 to 1.10.1 #820

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps pypa/gh-action-pypi-publish from 1.10.0 to 1.10.1.

Release notes

Sourced from pypa/gh-action-pypi-publish's releases.

v1.10.1

🚑🔏 Oopsie... We missed a tiny bug in the attestations feature the other day

The problem was that the distribution file validity check was failing on any valid distribution being present and ready to be signed. What a silly mistake! It's now been fixed via https://github.com/pypa/gh-action-pypi-publish/commit/0ab0b79, though. So everything's good!

-- @​webknjaz💰

[!IMPORTANT] ✨ Despite this minor hiccup, we invite you to still opt into trying this feature out early. It can be enabled like this:

  with:
    attestations: true

Leave feedback in the v1.10.0 release discussion or the PR.

🪞 Full Diff: https://github.com/pypa/gh-action-pypi-publish/compare/v1.10.0...v1.10.1

🧔‍♂️ Release Manager: @​webknjaz 🇺🇦

🙏 Special Thanks to @​hugovk💰 for promptly validating the bug fix, mere minutes after I pushed it — I even haven't finished writing this text by then!

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 1 month ago

DryRun Security Summary

The provided code change is a GitHub Actions workflow file that automates the process of publishing a Python package to the Python Package Index (PyPI) when a new release is created, including setting up a Python environment, installing dependencies, building the package, and using a third-party GitHub Action to publish the package to PyPI.

Expand for full summary
**Summary:** The provided code change is a GitHub Actions workflow file named `python-publish.yml` that is responsible for publishing a Python package to the Python Package Index (PyPI) when a new release is created. The workflow sets up a Python environment, installs the necessary dependencies, builds the Python package, and then uses the `pypa/gh-action-pypi-publish` GitHub Action to publish the package to PyPI. From an application security perspective, the main points of interest are the dependency management, secure API token storage, and the usage of a third-party GitHub Action. It's important to ensure that the dependencies are up-to-date and do not contain any known security vulnerabilities, and that the PyPI API token is securely stored as a GitHub secret. Additionally, while GitHub Actions are generally considered secure, it's important to review the source code of any third-party actions used in the workflow to ensure they are from a trusted and reputable source. Overall, the code change appears to be a standard Python package publication workflow, and there don't seem to be any obvious security concerns. However, as an application security engineer, it's always a good practice to thoroughly review the code changes, dependencies, and any third-party actions used in the workflow to ensure the overall security of the application. **Files Changed:** - `.github/workflows/python-publish.yml`: This file is a GitHub Actions workflow that is responsible for publishing a Python package to PyPI when a new release is created. The workflow sets up a Python environment, installs dependencies, builds the package, and then uses the `pypa/gh-action-pypi-publish` GitHub Action to publish the package to PyPI.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.