miracum / fhir-pseudonymizer

A REST service to pseudonymize and anonymize FHIR® resources.
MIT License
15 stars 2 forks source link

chore(deps): update quay.io/keycloak/keycloak docker tag to v24 #165

Closed renovate[bot] closed 7 months ago

renovate[bot] commented 7 months ago

Mend Renovate

This PR contains the following updates:

Package Update Change
quay.io/keycloak/keycloak major 23.0.7 -> 24.0.2

Configuration

📅 Schedule: Branch creation - "every 3 months on the first day of the month" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by Mend Renovate. View repository job log here.

github-actions[bot] commented 7 months ago

Target ghcr.io/miracum/fhir-pseudonymizer:pr-165 (ubuntu 22.04)

Vulnerabilities (3)

Package ID Severity Installed Version Fixed Version
libc6 CVE-2016-20013 LOW 2.35-0ubuntu3.6
libgcc-s1 CVE-2022-27943 LOW 12.3.0-1ubuntu1~22.04
libstdc++6 CVE-2022-27943 LOW 12.3.0-1ubuntu1~22.04

No Misconfigurations found

Target opt/fhir-pseudonymizer/FhirPseudonymizer.deps.json

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
Microsoft.IdentityModel.JsonWebTokens CVE-2024-21319 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
Microsoft.IdentityModel.JsonWebTokens GHSA-59j7-ghrg-fj52 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
System.IdentityModel.Tokens.Jwt CVE-2024-21319 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
System.IdentityModel.Tokens.Jwt GHSA-59j7-ghrg-fj52 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2

No Misconfigurations found

Target opt/fhir-pseudonymizer/packages.lock.json

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
Microsoft.IdentityModel.JsonWebTokens CVE-2024-21319 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
Microsoft.IdentityModel.JsonWebTokens GHSA-59j7-ghrg-fj52 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
System.IdentityModel.Tokens.Jwt CVE-2024-21319 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2
System.IdentityModel.Tokens.Jwt GHSA-59j7-ghrg-fj52 MEDIUM 7.0.3 5.7.0, 6.34.0, 7.1.2

No Misconfigurations found

Target usr/share/dotnet/shared/Microsoft.NETCore.App/8.0.2/Microsoft.NETCore.App.deps.json

Vulnerabilities (1)

Package ID Severity Installed Version Fixed Version
Microsoft.NETCore.App.Runtime.linux-x64 CVE-2024-21392 HIGH 8.0.2 8.0.3, 7.0.17

No Misconfigurations found

github-actions[bot] commented 7 months ago

🦙 MegaLinter status: ⚠️ WARNING

Descriptor Linter Files Fixed Errors Elapsed time
✅ ACTION actionlint 5 0 0.13s
✅ BASH bash-exec 1 0 0.01s
✅ BASH shellcheck 1 0 0.02s
✅ BASH shfmt 1 0 0.03s
✅ CSHARP csharpier 95 0 6.29s
⚠️ CSHARP roslynator 3 3 34.09s
✅ DOCKERFILE hadolint 1 0 0.11s
✅ EDITORCONFIG editorconfig-checker 181 0 1.4s
✅ JSON eslint-plugin-jsonc 27 0 10.52s
✅ JSON jsonlint 27 0 0.38s
✅ JSON prettier 27 0 4.9s
✅ JSON v8r 27 0 10.71s
✅ MARKDOWN markdownlint 4 0 1.79s
✅ PROTOBUF protolint 4 0 6.1s
✅ REPOSITORY checkov yes no 15.13s
✅ REPOSITORY dustilock yes no 0.03s
✅ REPOSITORY gitleaks yes no 0.4s
✅ REPOSITORY git_diff yes no 0.23s
✅ REPOSITORY grype yes no 12.76s
✅ REPOSITORY kics yes no 24.52s
✅ REPOSITORY secretlint yes no 1.47s
✅ REPOSITORY syft yes no 0.42s
✅ REPOSITORY trivy yes no 8.39s
✅ REPOSITORY trivy-sbom yes no 3.09s
✅ REPOSITORY trufflehog yes no 11.33s
✅ XML xmllint 2 0 0.04s
✅ YAML prettier 29 0 4.72s
✅ YAML v8r 29 0 34.53s
✅ YAML yamllint 29 0 2.85s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

_MegaLinter is graciously provided by OX Security_

github-actions[bot] commented 7 months ago

Code Coverage

Package Line Rate Branch Rate Health
FhirPseudonymizer.Tests 100% 100%
FhirPseudonymizer 74% 65%
Summary 81% (816 / 1008) 68% (93 / 136)

Minimum allowed line rate is 50%


iter8 report


Experiment summary:
*******************

  Experiment completed: true
  No task failures: true
  Total number of tasks: 7
  Number of completed tasks: 7
  Number of completed loops: 1

Whether or not service level objectives (SLOs) are satisfied:
*************************************************************

  SLO Conditions                 | Satisfied
  --------------                 | ---------
  http/error-count <= 0          | true
  http/latency-mean (msec) <= 25 | true
  http/latency-p99 (msec) <= 85  | true

Latest observed values for metrics:
***********************************

  Metric                     | value
  -------                    | -----
  http/error-count           | 0.00
  http/error-rate            | 0.00
  http/latency-max (msec)    | 841.51
  http/latency-mean (msec)   | 13.30
  http/latency-min (msec)    | 2.40
  http/latency-p50 (msec)    | 6.95
  http/latency-p75 (msec)    | 11.87
  http/latency-p90 (msec)    | 37.42
  http/latency-p95 (msec)    | 48.92
  http/latency-p99 (msec)    | 63.89
  http/latency-p99.9 (msec)  | 78.41
  http/latency-stddev (msec) | 17.95
  http/request-count         | 25000.00
miracum-bot commented 7 months ago

:tada: This PR is included in version 2.21.8 :tada:

The release is available on GitHub release

Your semantic-release bot :package::rocket: