Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add GHA tooling #331

Merged
merged 3 commits into from
Jun 26, 2023
Merged

Add GHA tooling #331

merged 3 commits into from
Jun 26, 2023

Conversation

corydolphin
Copy link
Owner

@corydolphin corydolphin commented Jun 24, 2023

Travis seems to be complaining about running out of seats. Travis seems deprecated, moving to GHA.

@corydolphin corydolphin force-pushed the switch-to-gha branch 3 times, most recently from 2750573 to d3f536f Compare June 25, 2023 22:39
@corydolphin corydolphin force-pushed the switch-to-gha branch 2 times, most recently from 1f49d76 to 48cdd2d Compare June 25, 2023 23:00
@corydolphin corydolphin merged commit 0b74401 into main Jun 26, 2023
8 checks passed
@corydolphin corydolphin deleted the switch-to-gha branch June 26, 2023 05:35
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Sep 6, 2023
## 4.0.0
* Remove support for Python versions older than 3.8 by @WAKayser in corydolphin/flask-cors#330
* Add GHA tooling by @corydolphin in corydolphin/flask-cors#331

## 3.1.01
* Include examples to specify that schema and port must be included in … by @YPCrumble in corydolphin/flask-cors#294
* two small changes to the documentation, based on issue #290 by @bbbart in corydolphin/flask-cors#291
* Fix typo by @sunarch in corydolphin/flask-cors#304
* FIX: typo in CSRF by @sattamjh in corydolphin/flask-cors#315
* Test against recent Python versions by @pylipp in corydolphin/flask-cors#314
* Correct spelling mistakes by @EdwardBetts in corydolphin/flask-cors#311
* 'Access-Control-Allow-Private-Network = true' header for http response by @chelo-kjml in corydolphin/flask-cors#318
* docs: Fix a few typos by @timgates42 in corydolphin/flask-cors#323
* [Docs] Fix typo in configuration documentation by @sachit-shroff in corydolphin/flask-cors#316
emmeowzing added a commit to premiscale/premiscale that referenced this pull request Jun 1, 2024
[![Mend
Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com)

This PR contains the following updates:

| Package | Change | Age | Adoption | Passing | Confidence |
|---|---|---|---|---|---|
| [flask-cors](https://github.com/corydolphin/flask-cors) | `==3.0.10`
-> `==4.0.1` |
[![age](https://developer.mend.io/api/mc/badges/age/pypi/flask-cors/4.0.1?slim=true)](https://docs.renovatebot.com/merge-confidence/)
|
[![adoption](https://developer.mend.io/api/mc/badges/adoption/pypi/flask-cors/4.0.1?slim=true)](https://docs.renovatebot.com/merge-confidence/)
|
[![passing](https://developer.mend.io/api/mc/badges/compatibility/pypi/flask-cors/3.0.10/4.0.1?slim=true)](https://docs.renovatebot.com/merge-confidence/)
|
[![confidence](https://developer.mend.io/api/mc/badges/confidence/pypi/flask-cors/3.0.10/4.0.1?slim=true)](https://docs.renovatebot.com/merge-confidence/)
|

---

> [!WARNING]
> Some dependencies could not be looked up. Check the Dependency
Dashboard for more information.

### GitHub Vulnerability Alerts

#### [CVE-2024-1681](https://nvd.nist.gov/vuln/detail/CVE-2024-1681)

corydolphin/flask-cors is vulnerable to log injection when the log level
is set to debug. An attacker can inject fake log entries into the log
file by sending a specially crafted GET request containing a CRLF
sequence in the request path. This vulnerability allows attackers to
corrupt log files, potentially covering tracks of other attacks,
confusing log post-processing tools, and forging log entries. The issue
is due to improper output neutralization for logs.

---

### Release Notes

<details>
<summary>corydolphin/flask-cors (flask-cors)</summary>

###
[`v4.0.1`](https://github.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#401)

[Compare
Source](https://github.com/corydolphin/flask-cors/compare/4.0.0...4.0.1)

##### Security

- Address
[CVE-2024-1681](https://github.com/advisories/GHSA-84pr-m4jr-85g5)
which is a log injection vulnerability when the log level is set to
debug by [@&#8203;aneshujevic](https://github.com/aneshujevic) in
[corydolphin/flask-cors#351

###
[`v4.0.0`](https://github.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#400)

[Compare
Source](https://github.com/corydolphin/flask-cors/compare/3.0.10...4.0.0)

- Remove support for Python versions older than 3.8 by
[@&#8203;WAKayser](https://github.com/WAKayser) in
[corydolphin/flask-cors#330
- Add GHA tooling by
[@&#8203;corydolphin](https://github.com/corydolphin) in
[corydolphin/flask-cors#331

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "" (UTC), Automerge - At any time (no
schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Mend
Renovate](https://www.mend.io/free-developer-tools/renovate/). View
repository job log
[here](https://developer.mend.io/github/premiscale/premiscale).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4zNDAuMTAiLCJ1cGRhdGVkSW5WZXIiOiIzNy4zNzcuOCIsInRhcmdldEJyYW5jaCI6Im1hc3RlciIsImxhYmVscyI6W119-->
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant