diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index 5fba6f8..b0eadee 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -36,7 +36,6 @@ jobs: poetry run doc8 -q doc poetry check poetry run pip check - poetry run safety check --full-report poetry run python -m readme_renderer ./README.rst -o /tmp/README.html - name: Upload coverage to Codecov diff --git a/.safety-policy.yml b/.safety-policy.yml deleted file mode 100644 index 9e832be..0000000 --- a/.safety-policy.yml +++ /dev/null @@ -1,14 +0,0 @@ -# Safety Security and License Configuration file -# We recommend checking this file into your source control in the root of your Python project -# If this file is named .safety-policy.yml and is in the same directory where you run `safety check` it will be used by default. -# Otherwise, you can use the flag `safety check --policy-file ` to specify a custom location and name for the file. -# To validate and review your policy file, run the validate command: `safety validate policy_file --path ` -security: # configuration for the `safety check` command - ignore-cvss-severity-below: 0 # A severity number between 0 and 10. Some helpful reference points: 9=ignore all vulnerabilities except CRITICAL severity. 7=ignore all vulnerabilities except CRITICAL & HIGH severity. 4=ignore all vulnerabilities except CRITICAL, HIGH & MEDIUM severity. - ignore-cvss-unknown-severity: False # True or False. We recommend you set this to False. - ignore-vulnerabilities: # Here you can list multiple specific vulnerabilities you want to ignore (optionally for a time period) - # We recommend making use of the optional `reason` and `expires` keys for each vulnerability that you ignore. - 45185: - reason: dev dependency, remedy will require dropping support for python 3.6 - #expires: '2022-10-21' # datetime string - date this ignore will expire, best practice to use this variable - continue-on-vulnerability-error: False # Suppress non-zero exit codes when vulnerabilities are found. Enable this in pipelines and CI/CD processes if you want to pass builds that have vulnerabilities. We recommend you set this to False. diff --git a/CONTRIBUTING.rst b/CONTRIBUTING.rst index 89885ea..52f37dc 100644 --- a/CONTRIBUTING.rst +++ b/CONTRIBUTING.rst @@ -63,7 +63,6 @@ justified is acceptable: poetry run doc8 -q doc poetry check poetry run pip check - poetry run safety check --full-report poetry run python -m readme_renderer ./README.rst