Skip to content

Conversation

@sramakintel
Copy link
Contributor

@sramakintel sramakintel commented Aug 16, 2024

Description

Resumbit PR #310 after facing challenge in fix its commit history.

Related Issue

Changes Made

  • The code follows the project's coding standards.
  • No Intel Internal IP is present within the changes.
  • The documentation has been updated to reflect any changes in functionality.

Validation

  • I have tested any changes in container groups locally with test_runner.py with all existing tests passing, and I have added new tests where applicable.
    output_itex.zip

Signed-off-by: Srikanth Ramakrishna <srikanth.ramakrishna@intel.com>
@sramakintel
Copy link
Contributor Author

Raised a security vulnerability issue on jupyterhub's repo. The fix is in require.js npm package but it needs to be reflected in the next update of jupyterhub.

@tylertitsworth tylertitsworth changed the title rework PR 310 for review ITEX XPU Updates Aug 16, 2024
@tylertitsworth tylertitsworth merged commit d952100 into main Aug 16, 2024
@tylertitsworth tylertitsworth deleted the sramakr1/update_ipex_xpu_pr2 branch August 16, 2024 21:13
@github-actions
Copy link

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 1 package(s) with unknown licenses.
See the Details below.

License Issues

tensorflow/xpu-requirements.txt

PackageVersionLicenseIssue Type
intel-extension-for-tensorflow2.15.0.1NullUnknown License

OpenSSF Scorecard

PackageVersionScoreDetails
pip/intel-extension-for-tensorflow 2.15.0.1 🟢 6.3
Details
CheckScoreReason
Code-Review⚠️ 0Found 1/30 approved changesets -- score normalized to 0
Maintained🟢 1030 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices🟢 5badge detected: Passing
License🟢 9license file detected
Signed-Releases⚠️ -1no releases found
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Branch-Protection🟢 3branch protection is not maximal on development and all release branches
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Vulnerabilities🟢 100 existing vulnerabilities detected
pip/tensorflow 2.15.1 🟢 7.8
Details
CheckScoreReason
Binary-Artifacts🟢 7binaries present in source code
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
CI-Tests🟢 927 out of 28 merged PRs checked by a CI test -- score normalized to 9
CII-Best-Practices🟢 5badge detected: Passing
Code-Review⚠️ 0Found 2/29 approved changesets -- score normalized to 0
Contributors🟢 10project has 21 contributing companies or organizations
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Dependency-Update-Tool🟢 10update tool detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Maintained🟢 1030 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
Packaging🟢 10packaging workflow detected
Pinned-Dependencies⚠️ 1dependency not pinned by hash detected -- score normalized to 1
SAST🟢 4SAST tool is not run on all commits -- score normalized to 4
Security-Policy🟢 10security policy file detected
Signed-Releases⚠️ -1no releases found
Token-Permissions🟢 9detected GitHub workflow tokens with excessive permissions
Vulnerabilities🟢 100 existing vulnerabilities detected

Scanned Manifest Files

tensorflow/xpu-requirements.txt
  • intel-extension-for-tensorflow@2.15.0.1
  • tensorflow@2.15.1
  • intel-extension-for-tensorflow@2.15.0.0
  • tensorflow@2.15.0

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

tylertitsworth pushed a commit that referenced this pull request Sep 25, 2024
Signed-off-by: Srikanth Ramakrishna <srikanth.ramakrishna@intel.com>
jitendra42 pushed a commit to jitendra42/ai-containers that referenced this pull request Oct 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants