nam20485 / OdbDesign

A free open source cross-platform C++ library for parsing ODB++ Design archives, accessing their data, and building net list product models. Exposed via a REST API packaged inside of a Docker image.
https://nam20485.github.io/OdbDesign/
MIT License
32 stars 12 forks source link

Bump docker/login-action from 3.0.0 to 3.1.0 #296

Closed dependabot[bot] closed 5 months ago

dependabot[bot] commented 5 months ago

Bumps docker/login-action from 3.0.0 to 3.1.0.

Release notes

Sourced from docker/login-action's releases.

v3.1.0

Full Changelog: https://github.com/docker/login-action/compare/v3.0.0...v3.1.0

Commits
  • e92390c Merge pull request #685 from docker/dependabot/npm_and_yarn/aws-sdk-dependenc...
  • 1e752e2 chore: update generated content
  • 51c6097 build(deps): bump the aws-sdk-dependencies group with 2 updates
  • 8f079fb Merge pull request #676 from docker/dependabot/npm_and_yarn/proxy-agent-depen...
  • 16fa768 chore: update generated content
  • 46d1619 build(deps): bump the proxy-agent-dependencies group with 2 updates
  • 8c291c5 Merge pull request #682 from docker/dependabot/npm_and_yarn/docker/actions-to...
  • ec726f4 build(deps): bump @​docker/actions-toolkit from 0.14.0 to 0.18.0
  • 5139682 Merge pull request #677 from docker/dependabot/npm_and_yarn/undici-5.28.3
  • 6d4e2ba chore: update generated content
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
github-actions[bot] commented 5 months ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/docker/login-action e92390c5fb421da1463c202d546fed0ec5c39f20 :green_circle: 6.3
Details
CheckScoreReason
Code-Review:green_circle: 5Found 2/4 approved changesets -- score normalized to 5
Maintained:green_circle: 1016 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Security-Policy:green_circle: 9security policy file detected
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 8SAST tool detected but not run on all commits
Vulnerabilities:green_circle: 82 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
actions/docker/login-action 343f7c4344506bcbf9b4de18042ae17996df046d :green_circle: 6.3
Details
CheckScoreReason
Code-Review:green_circle: 5Found 2/4 approved changesets -- score normalized to 5
Maintained:green_circle: 1016 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Security-Policy:green_circle: 9security policy file detected
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 8SAST tool detected but not run on all commits
Vulnerabilities:green_circle: 82 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
actions/docker/login-action e92390c5fb421da1463c202d546fed0ec5c39f20 :green_circle: 6.3
Details
CheckScoreReason
Code-Review:green_circle: 5Found 2/4 approved changesets -- score normalized to 5
Maintained:green_circle: 1016 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Security-Policy:green_circle: 9security policy file detected
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 8SAST tool detected but not run on all commits
Vulnerabilities:green_circle: 82 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
actions/docker/login-action 343f7c4344506bcbf9b4de18042ae17996df046d :green_circle: 6.3
Details
CheckScoreReason
Code-Review:green_circle: 5Found 2/4 approved changesets -- score normalized to 5
Maintained:green_circle: 1016 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Security-Policy:green_circle: 9security policy file detected
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 8SAST tool detected but not run on all commits
Vulnerabilities:green_circle: 82 existing vulnerabilities detected
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0

Scanned Manifest Files

.github/workflows/docker-publish.yml
  • docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20
  • docker/login-action@343f7c4344506bcbf9b4de18042ae17996df046d
.github/workflows/docker-scout-scan.yml
  • docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20
  • docker/login-action@343f7c4344506bcbf9b4de18042ae17996df046d