intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump golangci/golangci-lint-action from 6.1.0 to 6.1.1 #199

Closed dependabot[bot] closed 4 days ago

dependabot[bot] commented 5 days ago

Bumps golangci/golangci-lint-action from 6.1.0 to 6.1.1.

Release notes

Sourced from golangci/golangci-lint-action's releases.

v6.1.1

What's Changed

Changes

Documentation

Dependencies

New Contributors

Full Changelog: https://github.com/golangci/golangci-lint-action/compare/v6.1.0...v6.1.1

Commits
  • 971e284 build(deps-dev): bump the dev-dependencies group with 3 updates (#1108)
  • bbe7eb5 build(deps): bump @​types/node from 22.5.5 to 22.7.4 in the dependencies group...
  • ebae5ce build(deps-dev): bump the dev-dependencies group with 3 updates (#1105)
  • 06c3f3a build(deps): bump @​types/node from 22.5.4 to 22.5.5 in the dependencies group...
  • 56689d8 build(deps-dev): bump the dev-dependencies group with 3 updates (#1103)
  • c7bab6f fix: clean go install output (#1102)
  • 33f56cc build(deps-dev): bump the dev-dependencies group with 3 updates (#1099)
  • e954224 build(deps): bump @​types/node from 22.5.2 to 22.5.4 in the dependencies group...
  • 68de804 build(deps): bump @​types/node from 22.5.1 to 22.5.2 in the dependencies group...
  • 22a3756 build(deps-dev): bump the dev-dependencies group with 2 updates (#1097)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 5 days ago

DryRun Security Summary

The provided code change updates the GitHub Actions workflow configuration file for a Go project, primarily by updating the version of the golangci-lint-action used, and the overall workflow includes some security-related checks, such as static code analysis and vulnerability scanning, which are good practices to improve the security posture of the application.

Expand for full summary
**Summary:** The provided code change is an update to the GitHub Actions workflow configuration file (.github/workflows/ci.yaml) for a Go project. The primary change is an update to the version of the golangci-lint-action used in the workflow. While this update is not particularly interesting from a security perspective, the overall GitHub Actions workflow does include some security-related checks, such as the use of the dominikh/staticcheck-action for static code analysis and the Trivy security scanner for vulnerability scanning. These security-focused steps are a good practice and help to improve the overall security posture of the application. However, the specific code change in the provided patch does not directly address any security concerns. **Files Changed:** - `.github/workflows/ci.yaml`: This file is the GitHub Actions workflow configuration for the Go project. The primary change in this patch is an update to the version of the golangci-lint-action used in the workflow, from `aaa42aa0628b4ae2578232a66b541047968fac86` to `971e284b6050e8a5849b72094c50ab08da042db8`. While this update is not particularly interesting from a security perspective, the overall workflow does include some security-related checks, such as the use of the dominikh/staticcheck-action for static code analysis and the Trivy security scanner for vulnerability scanning.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.