Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump gitleaks to v8.22.0 in pre-commit configuration #660

Merged
merged 1 commit into from
Dec 22, 2024

Conversation

jkreileder
Copy link
Owner

Update the pre-commit configuration to use gitleaks version 8.22.0.

@jkreileder jkreileder self-assigned this Dec 22, 2024
@jkreileder jkreileder added the pre-commit Pull requests that update a pre-commit file label Dec 22, 2024
@jkreileder jkreileder enabled auto-merge (squash) December 22, 2024 12:41
Copy link

codecov bot commented Dec 22, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 100.00%. Comparing base (14d770d) to head (63769f1).
Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff            @@
##              main      #660   +/-   ##
=========================================
  Coverage   100.00%   100.00%           
=========================================
  Files            8         8           
  Lines          151       151           
  Branches        15        15           
=========================================
  Hits           151       151           
Flag Coverage Δ
python-3.10 100.00% <ø> (ø)
python-3.11 100.00% <ø> (ø)
python-3.12 100.00% <ø> (ø)
python-3.13 100.00% <ø> (ø)
python-3.9 100.00% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link

Test Results

  5 files  ±0    5 suites  ±0   21s ⏱️ ±0s
 36 tests ±0   36 ✅ ±0  0 💤 ±0  0 ❌ ±0 
180 runs  ±0  180 ✅ ±0  0 💤 ±0  0 ❌ ±0 

Results for commit 63769f1. ± Comparison against base commit 14d770d.

Copy link

🔍 Vulnerabilities of jkreileder/cf-ips-to-hcloud-fw:pr-660

📦 Image Reference jkreileder/cf-ips-to-hcloud-fw:pr-660
digestsha256:2f773b5329260f426b42e727ec62ee85936fd9dc29163240d50fde4ec36219fe
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
platformlinux/amd64
size28 MB
packages62
📦 Base Image python:3-alpine
also known as
  • 3-alpine3.20
  • 3.13-alpine
  • 3.13-alpine3.20
  • 3.13.1-alpine
  • 3.13.1-alpine3.20
  • alpine
  • alpine3.20
digestsha256:7bc78c6d338ab35ff94c90207c8b5457185f50f1fc059089f0b0069c8184280c
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0

Copy link

Recommended fixes for image jkreileder/cf-ips-to-hcloud-fw:pr-660

Base image is python:3-alpine

Name3.13.1-alpine3.20
Digestsha256:7bc78c6d338ab35ff94c90207c8b5457185f50f1fc059089f0b0069c8184280c
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed2 weeks ago
Size19 MB
Packages41
Flavoralpine
OS3.20
Runtime3.13.1
The base image is also available under the supported tag(s): 3-alpine3.20, 3.13-alpine, 3.13-alpine3.20, 3.13.1-alpine, 3.13.1-alpine3.20, alpine, alpine3.20

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.
TagDetailsPushedVulnerabilities
3-alpine
Newer image for same tag
Also known as:
  • alpine
  • alpine3.21
  • 3.13.1-alpine
  • 3.13.1-alpine3.21
  • 3.13-alpine
  • 3.13-alpine3.21
  • 3-alpine3.21
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Newer image for same tag
  • Image is smaller by 2.2 MB
  • Tag is preferred tag
  • Tag was pushed more recently
  • Image has same number of vulnerabilities
  • Image contains similar number of packages
  • 3-alpine was pulled 51K times last month
Image details:
  • Size: 17 MB
  • Flavor: alpine
  • OS: 3.21
  • Runtime: 3.13.1
2 weeks ago



Change base image

✅ There are no tag recommendations at this time.

Copy link

Overview

Image reference jkreileder/cf-ips-to-hcloud-fw:1 quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-660
- digest 70eafa0243eb 2f773b532926
- tag 1 pr-660
- provenance e4eb5d1 8a732d5
- vulnerabilities critical: 0 high: 0 medium: 2 low: 0 critical: 0 high: 0 medium: 0 low: 0
- platform linux/amd64 linux/amd64
- size 22 MB 28 MB (+6.3 MB)
- packages 64 62 (-2)
Base Image python:3-alpine
also known as:
3-alpine3.20
3.13-alpine
3.13-alpine3.20
alpine
alpine3.20
python:3-alpine
also known as:
3-alpine3.20
3.13-alpine
3.13-alpine3.20
3.13.1-alpine
3.13.1-alpine3.20
alpine
alpine3.20
- vulnerabilities critical: 0 high: 0 medium: 2 low: 0 critical: 0 high: 0 medium: 0 low: 0
Environment Variables (2 changes)
  • + 1 added
  • ± 1 changed
  • 4 unchanged
 GPG_KEY=7169605F62C751356D054A26A821E680E5FA6305
 PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 PYTHONDONTWRITEBYTECODE=1
 PYTHONFAULTHANDLER=1
+PYTHON_SHA256=9cf9427bee9e2242e3877dd0f6b641c1853ca461f39d6503ce260a59c80bf0d9
-PYTHON_VERSION=3.13.0
+PYTHON_VERSION=3.13.1
Labels (3 changes)
  • ± 3 changed
  • 5 unchanged
-org.opencontainers.image.created=2024-11-08T09:30:05.868Z
+org.opencontainers.image.created=2024-12-22T12:42:30.167Z
 org.opencontainers.image.description=Update Hetzner Cloud firewall rules with current Cloudflare IP ranges
 org.opencontainers.image.licenses=MIT
-org.opencontainers.image.revision=e4eb5d1df244d0bc3ea7f09542b95c5368fbc7ab
+org.opencontainers.image.revision=8a732d5afa0a5fb1711c52b1250a1b852f811bd4
 org.opencontainers.image.source=https://github.com/jkreileder/cf-ips-to-hcloud-fw
 org.opencontainers.image.title=cf-ips-to-hcloud-fw
 org.opencontainers.image.url=https://github.com/jkreileder/cf-ips-to-hcloud-fw
-org.opencontainers.image.version=1.0.14
+org.opencontainers.image.version=pr-660
Policies (0 improved, 1 worsened, 2 missing data)
Policy Name jkreileder/cf-ips-to-hcloud-fw:1 quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-660 Change Standing
Default non-root user No Change
No AGPL v3 licenses No Change
No fixable critical or high vulnerabilities No Change
No high-profile vulnerabilities No Change
No outdated base images ❓ No data
No unapproved base images ❓ No data
Supply chain attestations ⚠️ 2 +2 Worsened
Packages and Vulnerabilities (18 package changes and 2 vulnerability changes)
  • ➖ 2 packages removed
  • ♾️ 16 packages changed
  • 46 packages unchanged
  • ✔️ 2 vulnerabilities removed
Changes for packages of type apk (10 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-660
♾️ .python-rundeps 20241017.164351 20241205.142133
expat 2.6.3-r0
critical: 0 high: 0 medium: 1 low: 0
Removed vulnerabilities (1):
  • medium : CVE--2024--50602
♾️ libcrypto3 3.3.2-r0 3.3.2-r1
libexpat 2.6.3-r0
♾️ libncursesw 6.4_p20240420-r1 6.4_p20240420-r2
♾️ libpanelw 6.4_p20240420-r1 6.4_p20240420-r2
♾️ libssl3 3.3.2-r0 3.3.2-r1
♾️ ncurses 6.4_p20240420-r1 6.4_p20240420-r2
♾️ ncurses-terminfo-base 6.4_p20240420-r1 6.4_p20240420-r2
♾️ openssl 3.3.2-r0 3.3.2-r1
critical: 0 high: 0 medium: 1 low: 0
Removed vulnerabilities (1):
  • medium : CVE--2024--9143
Changes for packages of type generic (1 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-660
♾️ python 3.13.0 3.13.1
Changes for packages of type pypi (7 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-660
♾️ anyio 4.6.2.post1 4.7.0
♾️ certifi 2024.8.30 2024.12.14
♾️ cf-ips-to-hcloud-fw 1.0.14 1.0.15.dev0
♾️ cloudflare 3.1.0 3.1.1
♾️ httpcore 1.0.6 1.0.7
♾️ pip 24.2 24.3.1
♾️ six 1.16.0 1.17.0

@jkreileder jkreileder merged commit 271919b into main Dec 22, 2024
59 checks passed
@jkreileder jkreileder deleted the bump-precommit branch December 22, 2024 12:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
pre-commit Pull requests that update a pre-commit file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant