Compare commits
2 Commits
a01a2171ff
...
494eea998d
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
494eea998d | ||
|
|
15f05a1999 |
@@ -18,6 +18,7 @@ A `### Breaking` section is used in addition to Keep a Changelog's standard sect
|
|||||||
- CI security scanning now uses GitHub Marketplace actions (`securego/gosec` and `golang/govulncheck-action`) instead of manual tool installation, improving reliability and caching.
|
- CI security scanning now uses GitHub Marketplace actions (`securego/gosec` and `golang/govulncheck-action`) instead of manual tool installation, improving reliability and caching.
|
||||||
- CI setup compatibility fix: gosec scanner now references the correct public action source (`securego/gosec`), resolving action clone failures in Gitea runners.
|
- CI setup compatibility fix: gosec scanner now references the correct public action source (`securego/gosec`), resolving action clone failures in Gitea runners.
|
||||||
- Code formatting validation added to CI pipelines: pushes and pull requests with code not matching `go fmt ./...` output will be rejected.
|
- Code formatting validation added to CI pipelines: pushes and pull requests with code not matching `go fmt ./...` output will be rejected.
|
||||||
|
- Applied `go fmt` normalization to core tests (`list_test.go` and `track_test.go`) to satisfy the new formatting gate.
|
||||||
- Dependencies updated to resolve security vulnerabilities: `cloudflare/circl` to v1.6.3, `go-git/v5` to v5.17.0, `golang.org/x/crypto` to v0.49.0, and `golang.org/x/net` to v0.52.0.
|
- Dependencies updated to resolve security vulnerabilities: `cloudflare/circl` to v1.6.3, `go-git/v5` to v5.17.0, `golang.org/x/crypto` to v0.49.0, and `golang.org/x/net` to v0.52.0.
|
||||||
- CI workflows now include explicit caching for Go modules and build artifacts to reduce pipeline execution time.
|
- CI workflows now include explicit caching for Go modules and build artifacts to reduce pipeline execution time.
|
||||||
- Security hardening: file and directory creation now uses restrictive permissions (`0o750` for directories, `0o600` for files) instead of world-accessible defaults. Executable wrapper scripts are created with restricted permissions and then explicitly made executable via `chmod`.
|
- Security hardening: file and directory creation now uses restrictive permissions (`0o750` for directories, `0o600` for files) instead of world-accessible defaults. Executable wrapper scripts are created with restricted permissions and then explicitly made executable via `chmod`.
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ type TrackSuite struct {
|
|||||||
app *core.App
|
app *core.App
|
||||||
}
|
}
|
||||||
|
|
||||||
//NB: this has nothing to do with jogging
|
// NB: this has nothing to do with jogging
|
||||||
func TestTrackSuite(t *testing.T) {
|
func TestTrackSuite(t *testing.T) {
|
||||||
suite.Run(t, new(TrackSuite))
|
suite.Run(t, new(TrackSuite))
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user