Skip to content

Releases: actions/dependency-review-action

3.0.0

11 Nov 15:19
Compare
Choose a tag to compare

Breaking Changes

By default the action now expects SPDX-compliant licenses everywhere. If you were previously using license names in the allow or deny lists make sure they're valid!

What's Changed

Support for external configuration files

You can now specify a configuration file external to your repository. This allows organizations to have a single configuration file for all their repos.

Broader license support

We've added support for a much broader set of project licenses by using GitHub's Licenses API.

SPDX Compliance

All of our license-related code now expects SPDX-compliant licenses or expressions. This allows us to standardize on a license naming scheme that already supports OR/AND expressions.

Disable individual checks

You can now use the boolean options license-check and vulnerability-check to disable either one of the checks. More information in our configuration options.

Thanks

Contributors for this release include:

Thanks everyone!
Full Changelog: v2...v3.0.0

2.5.1

24 Oct 15:11
Compare
Choose a tag to compare

Adding some quality-of-life improvements to the local development experience. You can now pass a flag to the scripts/scan_pr script using the -c/--config-file flags to use an external configuration file:

Example:

  scripts/scan_pr https://github.com/actions/dependency-review-action/pull/294

2.5.0

13 Oct 15:09
Compare
Choose a tag to compare

Fallback on GitHub Licenses API data for missing Dependency Review API Licenses. This should improve our license coverage.

2.4.1

11 Oct 13:47
Compare
Choose a tag to compare

This patch release fixes the bugs below:

  • Display the dependency name instead of the manifest name in the detailed list of dependents.
  • Fix an issue where undefined GHSAs would remove filter out all changes.

2.4.0

23 Sep 20:14
375c537
Compare
Choose a tag to compare

We've added a new configuration option:

  • allow-ghsas: Specify a list of various GitHub Advisory IDs you want the action to skip and not fail on.
  dependency-review:
    runs-on: ubuntu-latest
    steps:
      - name: 'Checkout Repository'
        uses: actions/checkout@v3
      - name: 'Dependency Review'
        uses: actions/dependency-review-action@v2
        with: 
          allow-ghsas: 'GHSA-abcd-1234-5679, GHSA-efgh-1234-5679'

2.3.0

22 Sep 12:31
Compare
Choose a tag to compare

We're adding back support for an external configuration file. You can use the config-file configuration string to specify a path to a YAML configuration file where you can specify any options you want:

  dependency-review:
    runs-on: ubuntu-latest
    steps:
      - name: 'Checkout Repository'
        uses: actions/checkout@v3
      - name: 'Dependency Review'
        uses: actions/dependency-review-action@v2
        with: 
          - config-file: ./.github/dependency-review-config.yml

2.2.0

20 Sep 20:15
2b96ea7
Compare
Choose a tag to compare

We've added a new configuration option:

  • fail-on-scopes: Specify whether you want the action to fail on vulnerabilities or license restrictions in dependencies that are runtime, development, or both. By default the action will only fail on runtime dependencies.

2.1.0

18 Aug 14:41
Compare
Choose a tag to compare

This release includes a couple of new features (thanks @WillDaSilva and @tspascoal):

  1. The Action now includes a summary of the vulnerabilities and licenses detected:

Screenshot 2022-08-18 at 16 28 37

You can see a live example by visiting: https://github.com/future-funk/redesigned-custom-spood/actions/runs/2883016064

  1. You can now use the Action in events different to pull_request. You just need to provide a head-sha and base-sha in your config file:
name: Dependency Review
  uses: actions/dependency-review-action@v2
  with:
    # You can pass any git refs here
    # base-ref: ${{ your_base_ref }}
    # head-ref: ${{ your_head_ref }}

2.0.4

14 Jul 07:33
Compare
Choose a tag to compare

The previous release did not include the right package.json, no major changes.

2.0.3

14 Jul 07:17
b83777f
Compare
Choose a tag to compare
  • Fixed a bug where removed changes were being inspected and reported as vulnerable (#155, thanks @kachick!)