-
Notifications
You must be signed in to change notification settings - Fork 0
fix: Recreate SnmpEngine after each call. #2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,6 @@ | ||
| version: 2 | ||
| updates: | ||
| - package-ecosystem: "pip" | ||
| directory: "/" | ||
| schedule: | ||
| interval: "daily" |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,23 @@ | ||
| fail-on-severity: 'low' | ||
| allow-licenses: | ||
| - 'BSD-2-Clause' | ||
| - 'BSD-3-Clause' | ||
| - 'BSD-3-Clause-Clear' | ||
| - 'BSD-2-Clause-Views' | ||
| - 'MIT' | ||
| - 'Apache-2.0' | ||
| - 'ISC' | ||
| - 'BlueOak-1.0.0' | ||
| - '0BSD' | ||
| - 'Python-2.0' | ||
| - 'LGPL-3.0' | ||
| - 'MPL-2.0' | ||
| fail-on-scopes: | ||
| - 'runtime' | ||
| - 'development' | ||
| - 'unknown' | ||
| license-check: true | ||
| vulnerability-check: true | ||
| allow-dependencies-licenses: | ||
| - 'pkg:pypi/PyGithub@2.2.0' | ||
| - 'pkg:pypi/psycopg2-binary' |
This file was deleted.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,17 @@ | ||
| name: Check Code Standard | ||
|
|
||
| on: | ||
| pull_request: | ||
| types: [opened, synchronize] | ||
|
|
||
| jobs: | ||
| run_check_standard: | ||
| strategy: | ||
| fail-fast: false | ||
| matrix: | ||
| python_version: ['3.10', '3.13'] | ||
| uses: intel/mfd/.github/workflows/check_code_standard.yml@main | ||
| with: | ||
| REPOSITORY_NAME: ${{ github.event.pull_request.head.repo.full_name }} | ||
| BRANCH_NAME: ${{ github.head_ref }} | ||
| PYTHON_VERSION: ${{ matrix.python_version }} | ||
| Original file line number | Diff line number | Diff line change | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,12 @@ | |||||||||||||||||||||||||||||
| name: Title + Commit Validation | |||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||
| on: | |||||||||||||||||||||||||||||
| pull_request: | |||||||||||||||||||||||||||||
| types: [opened, synchronize] | |||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||
| jobs: | |||||||||||||||||||||||||||||
| validate_pr_format: | |||||||||||||||||||||||||||||
| uses: intel/mfd/.github/workflows/check_pr_format.yml@main | |||||||||||||||||||||||||||||
| with: | |||||||||||||||||||||||||||||
| REPOSITORY_NAME: ${{ github.event.pull_request.head.repo.full_name }} | |||||||||||||||||||||||||||||
| BRANCH_NAME: ${{ github.head_ref }} | |||||||||||||||||||||||||||||
|
Comment on lines
+9
to
+12
Check warningCode scanning / CodeQL Workflow does not contain permissions Medium
Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}
Copilot AutofixAI 3 months ago In general, this should be fixed by explicitly setting the GITHUB_TOKEN permissions for the workflow or for the specific job to the minimum required. Since the snippet only shows a job that calls a reusable workflow and we cannot see internals of the called workflow, the safest non-breaking change within this file is to add a conservative permissions block at the job level that grants Concretely, in
Suggested changeset
1
.github/workflows/check_pr_format.yml
Copilot is powered by AI and may make mistakes. Always verify output.
Refresh and try again.
|
|||||||||||||||||||||||||||||
| Original file line number | Diff line number | Diff line change | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,9 @@ | |||||||||||||||||||||||||||||
| name: Dependency Review | |||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||
| on: | |||||||||||||||||||||||||||||
| pull_request: | |||||||||||||||||||||||||||||
| types: [opened, synchronize] | |||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||
| jobs: | |||||||||||||||||||||||||||||
| dependency_review: | |||||||||||||||||||||||||||||
| uses: intel/mfd/.github/workflows/dependency_review.yml@main | |||||||||||||||||||||||||||||
Check warningCode scanning / CodeQL Workflow does not contain permissions Medium
Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}
Copilot AutofixAI 3 months ago To fix the problem, explicitly define a Concretely, in permissions:
contents: readThis change preserves existing functionality while constraining the default token permissions used by the reusable workflow.
Suggested changeset
1
.github/workflows/dependency_review.yml
Copilot is powered by AI and may make mistakes. Always verify output.
Refresh and try again.
|
|||||||||||||||||||||||||||||
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Copilot Autofix
AI 3 months ago
In general, the fix is to explicitly declare a
permissions:block in the workflow, restricting the GITHUB_TOKEN to the minimum privileges needed. Since this workflow only runs onpull_requestand delegates to a reusable workflow that presumably reads code and PR metadata, a safe and minimal set is to grantcontents: readandpull-requests: read. This prevents unintended write access by default while still allowing the workflow to inspect the repository contents and pull request information.The best way to fix this specific file without changing existing functionality is to add a top‑level
permissions:section (applies to all jobs) just after theon:block and beforejobs:. This will ensure all jobs in this workflow, includingrun_check_standard, run with a read‑only token appropriate for checks. No imports or additional methods are needed, as this is purely a YAML configuration change in.github/workflows/check_code_standard.yml.Concretely:
.github/workflows/check_code_standard.yml.permissions:block at the root level (same indentation ason:andjobs:).contents: readpull-requests: read