Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency fluentassertions to v7 #172

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 3, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
FluentAssertions (source) 6.12.0 -> 7.0.0 age adoption passing confidence

Release Notes

fluentassertions/fluentassertions (FluentAssertions)

v7.0.0

Compare Source

What's Changed

Breaking Changes
Fixes
Documentation
Others

New Contributors

Full Changelog: fluentassertions/fluentassertions@6.12.2...7.0.0

v6.12.2

Compare Source

What's Changed
Others

Full Changelog: fluentassertions/fluentassertions@6.12.1...6.12.2

v6.12.1

Compare Source

What's Changed
Improvements
  • Improve BeEmpty() and BeNullOrEmpty() performance for IEnumerable<T>, by materializing only the first item - #​2530
Fixes
  • Fixed formatting error when checking nullable DateTimeOffset with BeWithin(...).Before(...) - #​2312
  • BeEquivalentTo will now find and can map subject properties that are implemented through an explicitly-implemented interface - #​2152
  • Fixed that the because and becauseArgs were not passed down the equivalency tree - #​2318
  • BeEquivalentTo can again compare a non-generic IDictionary with a generic one - #​2358
  • Fixed that the FormattingOptions were not respected in inner AssertionScope - #​2329
  • Capitalize true and false in failure messages and make them formattable to a custom BooleanFormatter - #​2390, #​2393
  • Improved the failure message for NotBeOfType when wrapped in an AssertionScope and the subject is null - #​2399
  • Improved the failure message for BeWritable/BeReadable when wrapped in an AssertionScope and the subject is read-only/write-only - #​2399
  • Improved the failure message for ThrowExactly[Async] when wrapped in an AssertionScope and no exception is thrown - #​2398
  • Improved the failure message for [Not]HaveExplicitProperty when wrapped in an AssertionScope and not implementing the interface - #​2403
  • Improved the failure message for [Not]HaveExplicitMethod when wrapped in an AssertionScope and not implementing the interface - #​2403
  • Changed BeEquivalentTo to exclude private protected members from the comparison - #​2417
  • Fixed using BeEquivalentTo on an empty ArraySegment - #​2445, #​2511
  • BeEquivalentTo with a custom comparer can now handle null values - #​2489
  • Ensured that nested calls to AssertionScope(context) create a chained context - #​2607
  • One overload of the AssertionScope constructor would not create an actual scope associated with the thread - #​2607
  • Fixed ThrowWithinAsync not respecting OperationCanceledException - #​2614
  • Fixed using BeEquivalentTo with an IEqualityComparer targeting nullable types - #​2648

Full Changelog: fluentassertions/fluentassertions@6.12.0...6.12.1


Configuration

📅 Schedule: Branch creation - "* 0-3 1 * *" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Dec 3, 2024

Trivy image scan report

ghcr.io/miracum/vfps:pr-172 (ubuntu 24.04)

5 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 1 LOW: 4)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3t64 CVE-2024-6119 MEDIUM 3.0.13-0ubuntu3.1 3.0.13-0ubuntu3.4
libssl3t64 CVE-2024-2511 LOW 3.0.13-0ubuntu3.1 3.0.13-0ubuntu3.2
libssl3t64 CVE-2024-4603 LOW 3.0.13-0ubuntu3.1 3.0.13-0ubuntu3.2
libssl3t64 CVE-2024-4741 LOW 3.0.13-0ubuntu3.1 3.0.13-0ubuntu3.2
libssl3t64 CVE-2024-5535 LOW 3.0.13-0ubuntu3.1 3.0.13-0ubuntu3.2

No Misconfigurations found

opt/vfps/Vfps.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/share/dotnet/shared/Microsoft.AspNetCore.App/8.0.7/Microsoft.AspNetCore.App.deps.json

1 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
Microsoft.AspNetCore.App.Runtime.linux-x64 CVE-2024-38229 HIGH 8.0.7 9.0.0-rc.2.24474.3, 8.0.10

No Misconfigurations found

usr/share/dotnet/shared/Microsoft.NETCore.App/8.0.7/Microsoft.NETCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

Copy link

github-actions bot commented Dec 3, 2024

🦙 MegaLinter status: ⚠️ WARNING

Descriptor Linter Files Fixed Errors Elapsed time
✅ ACTION actionlint 9 0 0.18s
⚠️ CSHARP csharpier 46 1 3.68s
⚠️ CSHARP roslynator 5 2 65.09s
✅ DOCKERFILE hadolint 1 0 0.09s
✅ EDITORCONFIG editorconfig-checker 105 0 0.26s
✅ JSON jsonlint 9 0 1.43s
✅ JSON prettier 9 0 0.71s
✅ MARKDOWN markdownlint 3 0 0.4s
⚠️ MARKDOWN markdown-table-formatter 3 1 0.28s
✅ PROTOBUF protolint 5 0 5.12s
✅ REPOSITORY checkov yes no 23.12s
✅ REPOSITORY dustilock yes no 0.01s
✅ REPOSITORY gitleaks yes no 0.16s
✅ REPOSITORY git_diff yes no 0.01s
✅ REPOSITORY grype yes no 16.92s
✅ REPOSITORY kics yes no 18.96s
✅ REPOSITORY secretlint yes no 0.85s
✅ REPOSITORY syft yes no 2.52s
✅ REPOSITORY trivy yes no 11.1s
✅ REPOSITORY trivy-sbom yes no 0.23s
✅ REPOSITORY trufflehog yes no 4.2s
✅ XML xmllint 1 0 0.03s
✅ YAML prettier 24 0 2.08s
✅ YAML yamllint 24 0 1.35s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

MegaLinter is graciously provided by OX Security

Copy link

github-actions bot commented Dec 3, 2024

Code Coverage

Package Line Rate Branch Rate Health
Vfps 94% 60%
Vfps.Tests 99% 100%
Summary 95% (442 / 463) 66% (33 / 50)

Minimum allowed line rate is 50%


ghz run statistics

Summary:
  Count:	5000
  Total:	8.84 s
  Slowest:	639.48 ms
  Fastest:	8.57 ms
  Average:	84.91 ms
  Requests/sec:	565.50

Response time histogram:
  8.566   [1]    |
  71.658  [2008] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
  134.749 [2693] |∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎
  197.840 [247]  |∎∎∎∎
  260.931 [1]    |
  324.022 [0]    |
  387.113 [0]    |
  450.204 [0]    |
  513.295 [8]    |
  576.386 [41]   |∎
  639.477 [1]    |

Latency distribution:
  10 % in 41.53 ms 
  25 % in 60.39 ms 
  50 % in 79.18 ms 
  75 % in 98.41 ms 
  90 % in 120.33 ms 
  95 % in 159.12 ms 
  99 % in 198.41 ms 

Status code distribution:
  [OK]   5000 responses   

iter8 report

Experiment summary:
*******************

  Experiment completed: true
  No task failures: true
  Total number of tasks: 6
  Number of completed tasks: 6
  Number of completed loops: 1

Whether or not service level objectives (SLOs) are satisfied:
*************************************************************

  SLO Conditions                  | Satisfied
  --------------                  | ---------
  grpc/error-rate <= 0            | true
  grpc/latency/mean (msec) <= 200 | true
  grpc/latency/p99 (msec) <= 400  | true
  

Latest observed values for metrics:
***********************************

  Metric                   | value
  -------                  | -----
  grpc/error-count         | 0.00
  grpc/error-rate          | 0.00
  grpc/latency/mean (msec) | 129.08
  grpc/latency/p99 (msec)  | 398.00
  grpc/request-count       | 50000.00
  

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants