From 3ac8fed01c7b32ab70210f182e557d4cb8c45fec Mon Sep 17 00:00:00 2001 From: William Woodruff Date: Wed, 3 May 2023 15:51:58 -0400 Subject: [PATCH] README: prep 1.0.7 (#40) Signed-off-by: William Woodruff --- README.md | 40 ++++++++++++++++++++-------------------- 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/README.md b/README.md index d02d762..f2881e3 100644 --- a/README.md +++ b/README.md @@ -32,7 +32,7 @@ jobs: - uses: actions/checkout@v3 - name: install run: python -m pip install . - - uses: pypa/gh-action-pip-audit@v1.0.6 + - uses: pypa/gh-action-pip-audit@v1.0.7 ``` Or, with a virtual environment: @@ -48,7 +48,7 @@ jobs: python -m venv env/ source env/bin/activate python -m pip install . - - uses: pypa/gh-action-pip-audit@v1.0.6 + - uses: pypa/gh-action-pip-audit@v1.0.7 with: virtual-environment: env/ ``` @@ -72,7 +72,7 @@ The `inputs` setting controls what sources `pip-audit` runs on. To audit one or more requirements-style inputs: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: inputs: requirements.txt dev-requirements.txt ``` @@ -80,7 +80,7 @@ To audit one or more requirements-style inputs: To audit a project that uses `pyproject.toml` for its dependencies: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: # NOTE: this can be `.`, for the current directory inputs: path/to/project/ @@ -108,7 +108,7 @@ Example: use the virtual environment specified at `env/`, relative to the current directory: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: virtual-environment: env/ # Note the absence of `input:`, since we're auditing the environment. @@ -128,7 +128,7 @@ installed directly into the current environment are included. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: local: true ``` @@ -145,7 +145,7 @@ It's directly equivalent to `pip-audit --vulnerability-service=...`. To audit with OSV instead of PyPI: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: vulnerability-service: osv ``` @@ -160,7 +160,7 @@ It's directly equivalent to `pip-audit --require-hashes ...`. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: # NOTE: only works with requirements-style inputs inputs: requirements.txt @@ -177,7 +177,7 @@ It's directly equivalent to `pip-audit --no-deps ...`. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: # NOTE: only works with requirements-style inputs inputs: requirements.txt @@ -195,7 +195,7 @@ is rendered at the end of the action. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: summary: false ``` @@ -214,7 +214,7 @@ indices to search (such as a corporate index with private packages), see Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: index-url: https://example.corporate.local/simple ``` @@ -229,7 +229,7 @@ indexes to search when resolving dependencies. Each URL is whitespace-separated. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: extra-index-urls: | https://example.corporate.local/simple @@ -246,7 +246,7 @@ ignore (i.e., exclude from the results) if present. Each ID is whitespace-separa Example ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: ignore-vulns: | GHSA-XXXX-YYYYYY @@ -276,7 +276,7 @@ Example Example: ```yaml - - uses: pypa/gh-action-pip-audit@v1.0.6 + - uses: pypa/gh-action-pip-audit@v1.0.7 with: internal-be-careful-allow-failure: true ``` @@ -290,7 +290,7 @@ to `pip-audit`. Example: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: internal-be-careful-extra-flags: --not-a-real-pip-audit-flag ``` @@ -307,7 +307,7 @@ If you're auditing a requirements file, consider setting `no-deps: true` or `require-hashes: true`: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: inputs: requirements.txt require-hashes: true @@ -316,7 +316,7 @@ If you're auditing a requirements file, consider setting `no-deps: true` or or: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: inputs: requirements.txt no-deps: true @@ -337,7 +337,7 @@ by the host system itself, or other Python projects that happen to be installed. To minimize external dependencies, you can opt into a virtual environment: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: # must be populated earlier in the CI virtual-environment: env/ @@ -347,7 +347,7 @@ and, more aggressively, specify that only dependencies marked as "local" in the virtual environment should be included: ```yaml -- uses: pypa/gh-action-pip-audit@v1.0.6 +- uses: pypa/gh-action-pip-audit@v1.0.7 with: # must be populated earlier in the CI virtual-environment: env/ @@ -383,7 +383,7 @@ jobs: run: | pipx run pipfile-requirements Pipfile.lock > requirements.txt - - uses: pypa/gh-action-pip-audit@v1.0.6 + - uses: pypa/gh-action-pip-audit@v1.0.7 with: inputs: requirements.txt ```