GitHub
06/06/2025, 11:03 AMDockerfile-bundle-base
We recommend upgrading to ruby:3.4.1-alpine
, as this image has only 1 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: [](https://camo.githubusercontent.com/f82c11851918b0602a740e54b3daafac8640eee84c215fb7d0e9efa73a483927/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949795a475a68596a4134596930354e47566b4c5452684e3259744f544d334d7930324d575a695a47466c4d5459335a4449694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a4a6b5a6d46694d4468694c546b305a5751744e4745335a6930354d7a637a4c5459785a6d4a6b595755784e6a646b4d694a3966513d3d)
🧐 View latest project report
📜 Customise PR templates
🛠️ Adjust project settings
📚 Read about Snyk's upgrade logic
---
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:03 AMDockerfile-release-base
We recommend upgrading to ruby:3.4.1-alpine
, as this image has only 2 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: [](https://camo.githubusercontent.com/de8dc44dda2466838e3da146cfc45c29b40814b21e1f7709fe08bb8ab7753c33/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a6c4e7a59784d5759794d6930774d7a51314c5452694e5755744f4751784f4331684d7a59354d32466b59575933597a63694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d55334e6a45785a6a49794c54417a4e4455744e4749315a5330345a4445344c57457a4e6a6b7a595752685a6a646a4e794a3966513d3d)
🧐 View latest project report
📜 Customise PR templates
🛠️ Adjust project settings
📚 Read about Snyk's upgrade logic
---
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:03 AMDockerfile-bundle-base
We recommend upgrading to ruby:3.4.2-alpine
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----- |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-9143](https://github.com/advisories/GHSA-q764-r57m-9wp9 "CVE-2024-9143") [SNYK-ALPINE320-OPENSSL-8235201](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8235201) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-9143](https://github.com/advisories/GHSA-q764-r57m-9wp9 "CVE-2024-9143") [SNYK-ALPINE320-OPENSSL-8235201](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8235201) | 364 |
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: [](https://camo.githubusercontent.com/faf3db7a4690d96bba4c7539b61d854517dbba712667c6ec31f365b75ef1ef44/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a684d7a41314e7a4d304d533034596d597a4c5451344f5467744f4755795a53316d4e6d466d4d7a5269596a466c4e4755694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d457a4d4455334d7a51784c5468695a6a4d744e4467354f4330345a544a6c4c5759325957597a4e474a694d5755305a534a3966513d3d)
🧐 View latest project report
📜 Customise PR templates
🛠️ Adjust project settings
📚 <https://docs.…
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:03 AMDockerfile-release-base
We recommend upgrading to ruby:3.4.2-alpine
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----- |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 436 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-12797](https://github.com/advisories/GHSA-79v4-65xg-pq4g "CVE-2024-12797") [SNYK-ALPINE320-OPENSSL-8710359](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8710359) | 436 |
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: <https://camo.githubusercontent.com/fb4c8090329e4e6483aef1b3cf3579df7d01bf74bff28323fed87aa40f30a79b/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949774e7a45774d5752695a533078595745314c5451334e6a6b745954566a5a53316b4e6a59354d3251785a6a6b774d7a6b694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a41334d5441785a474a6c4c544668595455744e4463324f5331684e574e6c4c5751324e6a6b7a5a44466d4f54417a4f534a3966513d3d|[](https://camo.githubusercontent.com/fb4c8090329e4e6483aef1b3cf3579df7d01bf74bff28323fed87aa40f30a79b/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949774e7a45774d5752695a533078595745314c5451334e6a6b745954566a5a53316b4e6a59354d3251785a6a6b774d7a6b694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a4…
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:03 AMDockerfile-release-base
We recommend upgrading to ruby:3.4.3-alpine
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----- |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-9143](https://github.com/advisories/GHSA-q764-r57m-9wp9 "CVE-2024-9143") [SNYK-ALPINE320-OPENSSL-8235201](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8235201) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-12797](https://github.com/advisories/GHSA-79v4-65xg-pq4g "CVE-2024-12797") [SNYK-ALPINE320-OPENSSL-8710359](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8710359) | 364 |
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: <https://camo.githubusercontent.com/320b6346e99e53e3650a1db6d966fa87d3b9c6f9880c3b125dad4cd9b3abd4bf/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a6a4d4463794d6a49775953316b4f44686a4c54526c5a6a67744f5459334f5330304e444d345a444d794d47466d4d6d59694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d4d774e7a49794d6a42684c5751344f474d744e47566d4f4330354e6a63354c5451304d7a686b4d7a4977595759795a694a3966513d3d|[](https://camo.githubusercontent.com/320b6346e99e53e3650a1db6d966fa87d3b9c6f9880c3b125dad4cd9b3abd4bf/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a6a4d4463794d6a49775953316b4f44686a4c54526c5a6a67744f5459334f5330304e444d345a444d794d47466d4d6d59694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d4d7…
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:03 AMDockerfile-bundle-base
We recommend upgrading to ruby:3.4.3-alpine
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----- |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-9143](https://github.com/advisories/GHSA-q764-r57m-9wp9 "CVE-2024-9143") [SNYK-ALPINE320-OPENSSL-8235201](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8235201) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-12797](https://github.com/advisories/GHSA-79v4-65xg-pq4g "CVE-2024-12797") [SNYK-ALPINE320-OPENSSL-8710359](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8710359) | 364 |
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: <https://camo.githubusercontent.com/a1c40731fdfd98f1f058bd29c8469d4328fb77190df4e98685bb862d17920e30/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949784d7a6b794d6a4e6b4e6930794f4755774c5452684e544174596d466b5969307a4d47566d597a566a5a54426d5a6a45694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a457a4f5449794d3251324c5449345a5441744e4745314d433169595752694c544d775a575a6a4e574e6c4d475a6d4d534a3966513d3d|[](https://camo.githubusercontent.com/a1c40731fdfd98f1f058bd29c8469d4328fb77190df4e98685bb862d17920e30/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949784d7a6b794d6a4e6b4e6930794f4755774c5452684e544174596d466b5969307a4d47566d597a566a5a54426d5a6a45694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a457a…
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:20 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by github-actions[bot]
<https://github.com/pact-foundation/pact-ruby-standalone/commit/6ca462713527adc1999ead7482e2d7a01ee8c4fa|6ca46271>
- chore(release): version 2.4.25
pact-foundation/pact-ruby-standaloneGitHub
06/06/2025, 11:20 AMcurl -fsSL <https://raw.githubusercontent.com/pact-foundation/pact-ruby-standalone/master/install.sh> | PACT_CLI_VERSION=v2.4.25 bash
### MacOS
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-osx-x86_64.tar.gz>
tar xzf pact-2.4.25-osx-x86_64.tar.gz
#### arm64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-osx-arm64.tar.gz>
tar xzf pact-2.4.25-osx-arm64.tar.gz
### Linux
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-linux-x86_64.tar.gz>
tar xzf pact-2.4.25-linux-x86_64.tar.gz
#### arm64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-linux-arm64.tar.gz>
tar xzf pact-2.4.25-linux-arm64.tar.gz
### Windows
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-windows-x86_64.zip>
unzip pact-2.4.25-windows-x86_64.zip
#### x86
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.25/pact-2.4.25-windows-x86.zip>
unzip pact-2.4.25-windows-x86.zip
# Pact Ruby Standalone
[Build](https://github.com/pact-foundation/pact-ruby-standalone/workflows/Build/badge.svg)
Creates a standalone pact command line executable using the ruby pact implementation and Traveling Ruby
## Package contents
This version (2.4.25) of the Pact standalone executables package contains:
• pact gem 1.66.1
• pact-mock_service gem 3.12.3
• pact-support gem 1.21.2
• pact-provider-verifier gem 1.39.1
• pact_broker-client gem 1.77.0
• pact-message gem 0.11.1
Binaries will be extracted into `pact/bin`:
./pact/bin/
├── pact
├── pact-broker
├── pactflow
├── pact-message
├── pact-mock-service
├── pact-provider-verifier
└── pact-stub-service
### Windows Users
Please append .bat
to any of the provided binaries
eg.
.\pact\bin\pact-broker.bat
## Installation
See the release page.
## Supported Platforms
Ruby is not required on the host platform, Ruby 3.3.5 is provided in the distributable.
| OS | Ruby | Architecture | Supported |
| ------- | ----- | --------------- | --------- |
| MacOS | 3.3.5 | x86_64 | ✅ |
| MacOS | 3.3.5 | aarch64 (arm64) | ✅ |
| Linux | 3.3.5 | x86_64 | ✅ |
| Linux | 3.3.5 | aarch64 (arm64) | ✅ |
| Windows | 3.3.5 | x86_64 | ✅ |
| Windows | 3.3.5 | x86 | ✅ |
| Windows | 3.3.5 | aarch64 (arm64) | 🚧 |
🚧 - Tested under emulation mode x86 / x86_64 in Windows on ARM
## Usage
### pact-mock-service
Commands:
pact-mock-service control # Run a Pact mock service control s...
pact-mock-service control-restart # Start a Pact mock service control...
pact-mock-service control-start # Start a Pact mock service control...
pact-mock-service control-stop # Stop a Pact mock service control ...
pact-mock-service help [COMMAND] # Describe available commands or on...
pact-mock-service restart # Start or restart a mock service. ...
pact-mock-service service # Start a mock service. If the cons...
pact-mock-service start # Start a mock service. If the cons...
pact-mock-service stop -p, --port=PORT # Stop a Pact mock service
pact-mock-service version # Show the pact-mock-service gem version
Usage:
pact-mock-service service
Options:
[--consumer=CONSUMER] # Consumer name
[--provider=PROVIDER] # Provider name
-p, [--port=PORT] # Port on which to run the service
-h, [--host=HOST] # Host on which to bind the service
# Default: localhost
-d, [--pact-dir=PACT_DIR] # Directory to which the pacts will be written
-m, [--pact-file-write-mode=PACT_FILE_WRITE_MODE] # `overwrite` or `merge`. Use `merge` when running multiple mock service instances in parallel for the same consumer/provider pair. Ensure the pact file is deleted before running tests when using this option so that interactions deleted from the code are not maintained in the file.
# Default: overwrite
-i, [--pact-specification-version=PACT_SPECIFICATION_VERSION] # The pact specification version to use when writing the pact. Note that only versions 1 and 2 are currently supported.
# Default: 2
-l, [--log=LOG] # File to which to log output
[--log-level=LOG_LEVEL] # Log level. Options are DEBUG INFO WARN ERROR
# Default: DEBUG
-o, [--cors=CORS] # Support browser security in tests by responding to OPTIONS requests and adding CORS headers to mocked responses
[--ssl], [--no-ssl], [--skip-ssl] # Use a self-signed SSL cert to run the service over HTTPS
# Default: false
[--sslcert=SSLCERT] # Specify the path to the SSL cert to use when running the service over HTTPS
[--sslkey=SSLKEY] # Specify the path to the SSL key to use when running the service over HTTPS
Start a mock service. If the consumer, provider and pact-dir options are provided, the pact will be written automatically on shutdown (INT).
### pact-stub-service
```
Usage:
pact-stub-service PACT_URI ...
Options:
-p, [--port=PORT] # Port on which to run the service
-h, [--host=HOST] # Host on which to bind the service
# Default: localhost
-l, [--log=LOG] # File to which to log output
-n, [--broker-username=BROKER_USERNAME] # Pact Broker basic auth username
-p, [--broker-password=BROKER_PASSWORD] # Pact Broker basic auth password
-k, [--broker-token=BROKER_TOKEN] # Pact Broker bearer token (can also be set using the PACT_BROKER_TOKEN environment variable)
[--log-level=LOG_LEVEL] # Log level. Options are DEBUG INFO WARN ERROR
# Default: DEBUG
-o, [--cors=CORS] # Support browser security in tests by responding to OPTIONS requests and adding CORS headers to mocked responses
[--ssl], [--no-ssl], [--skip-ssl] # Use a self-signed SSL cert to run the service over HTTPS
# Default: false
[--sslcert=SSLCERT] # Specify the path to the SSL cert to use when running the service over HTTPS
[--sslkey=SSLKEY] # Specify the path to the SSL key to use when running the service over HTTPS
Description:
Start a stub service with the given pa…
pact-foundation/pact-ruby-standaloneGitHub
06/26/2025, 9:25 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by github-actions[bot]
<https://github.com/pact-foundation/pact-ruby-standalone/commit/96adfcecd07a29af3b9ddb5f69a5dded0dce184e|96adfcec>
- feat(gems): update non-pact gems
pact-foundation/pact-ruby-standaloneGitHub
06/26/2025, 9:26 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by github-actions[bot]
<https://github.com/pact-foundation/pact-ruby-standalone/commit/41e529b2220b180049aede88622e1501687eed11|41e529b2>
- chore(release): version 2.4.26
pact-foundation/pact-ruby-standaloneGitHub
06/26/2025, 9:26 AMcurl -fsSL <https://raw.githubusercontent.com/pact-foundation/pact-ruby-standalone/master/install.sh> | PACT_CLI_VERSION=v2.4.26 bash
### MacOS
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-osx-x86_64.tar.gz>
tar xzf pact-2.4.26-osx-x86_64.tar.gz
#### arm64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-osx-arm64.tar.gz>
tar xzf pact-2.4.26-osx-arm64.tar.gz
### Linux
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-linux-x86_64.tar.gz>
tar xzf pact-2.4.26-linux-x86_64.tar.gz
#### arm64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-linux-arm64.tar.gz>
tar xzf pact-2.4.26-linux-arm64.tar.gz
### Windows
#### x86_64
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-windows-x86_64.zip>
unzip pact-2.4.26-windows-x86_64.zip
#### x86
curl -LO <https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v2.4.26/pact-2.4.26-windows-x86.zip>
unzip pact-2.4.26-windows-x86.zip
# Pact Ruby Standalone
[Build](https://github.com/pact-foundation/pact-ruby-standalone/workflows/Build/badge.svg)
Creates a standalone pact command line executable using the ruby pact implementation and Traveling Ruby
## Package contents
This version (2.4.26) of the Pact standalone executables package contains:
• pact gem 1.66.1
• pact-mock_service gem 3.12.3
• pact-support gem 1.21.2
• pact-provider-verifier gem 1.39.1
• pact_broker-client gem 1.77.0
• pact-message gem 0.11.1
Binaries will be extracted into `pact/bin`:
./pact/bin/
├── pact
├── pact-broker
├── pactflow
├── pact-message
├── pact-mock-service
├── pact-provider-verifier
└── pact-stub-service
### Windows Users
Please append .bat
to any of the provided binaries
eg.
.\pact\bin\pact-broker.bat
## Installation
See the release page.
## Supported Platforms
Ruby is not required on the host platform, Ruby 3.3.5 is provided in the distributable.
| OS | Ruby | Architecture | Supported |
| ------- | ----- | --------------- | --------- |
| MacOS | 3.3.5 | x86_64 | ✅ |
| MacOS | 3.3.5 | aarch64 (arm64) | ✅ |
| Linux | 3.3.5 | x86_64 | ✅ |
| Linux | 3.3.5 | aarch64 (arm64) | ✅ |
| Windows | 3.3.5 | x86_64 | ✅ |
| Windows | 3.3.5 | x86 | ✅ |
| Windows | 3.3.5 | aarch64 (arm64) | 🚧 |
🚧 - Tested under emulation mode x86 / x86_64 in Windows on ARM
## Usage
### pact-mock-service
Commands:
pact-mock-service control # Run a Pact mock service control s...
pact-mock-service control-restart # Start a Pact mock service control...
pact-mock-service control-start # Start a Pact mock service control...
pact-mock-service control-stop # Stop a Pact mock service control ...
pact-mock-service help [COMMAND] # Describe available commands or on...
pact-mock-service restart # Start or restart a mock service. ...
pact-mock-service service # Start a mock service. If the cons...
pact-mock-service start # Start a mock service. If the cons...
pact-mock-service stop -p, --port=PORT # Stop a Pact mock service
pact-mock-service version # Show the pact-mock-service gem version
Usage:
pact-mock-service service
Options:
[--consumer=CONSUMER] # Consumer name
[--provider=PROVIDER] # Provider name
-p, [--port=PORT] # Port on which to run the service
-h, [--host=HOST] # Host on which to bind the service
# Default: localhost
-d, [--pact-dir=PACT_DIR] # Directory to which the pacts will be written
-m, [--pact-file-write-mode=PACT_FILE_WRITE_MODE] # `overwrite` or `merge`. Use `merge` when running multiple mock service instances in parallel for the same consumer/provider pair. Ensure the pact file is deleted before running tests when using this option so that interactions deleted from the code are not maintained in the file.
# Default: overwrite
-i, [--pact-specification-version=PACT_SPECIFICATION_VERSION] # The pact specification version to use when writing the pact. Note that only versions 1 and 2 are currently supported.
# Default: 2
-l, [--log=LOG] # File to which to log output
[--log-level=LOG_LEVEL] # Log level. Options are DEBUG INFO WARN ERROR
# Default: DEBUG
-o, [--cors=CORS] # Support browser security in tests by responding to OPTIONS requests and adding CORS headers to mocked responses
[--ssl], [--no-ssl], [--skip-ssl] # Use a self-signed SSL cert to run the service over HTTPS
# Default: false
[--sslcert=SSLCERT] # Specify the path to the SSL cert to use when running the service over HTTPS
[--sslkey=SSLKEY] # Specify the path to the SSL key to use when running the service over HTTPS
Start a mock service. If the consumer, provider and pact-dir options are provided, the pact will be written automatically on shutdown (INT).
### pact-stub-service
```
Usage:
pact-stub-service PACT_URI ...
Options:
-p, [--port=PORT] # Port on which to run the service
-h, [--host=HOST] # Host on which to bind the service
# Default: localhost
-l, [--log=LOG] # File to which to log output
-n, [--broker-username=BROKER_USERNAME] # Pact Broker basic auth username
-p, [--broker-password=BROKER_PASSWORD] # Pact Broker basic auth password
-k, [--broker-token=BROKER_TOKEN] # Pact Broker bearer token (can also be set using the PACT_BROKER_TOKEN environment variable)
[--log-level=LOG_LEVEL] # Log level. Options are DEBUG INFO WARN ERROR
# Default: DEBUG
-o, [--cors=CORS] # Support browser security in tests by responding to OPTIONS requests and adding CORS headers to mocked responses
[--ssl], [--no-ssl], [--skip-ssl] # Use a self-signed SSL cert to run the service over HTTPS
# Default: false
[--sslcert=SSLCERT] # Specify the path to the SSL cert to use when running the service over HTTPS
[--sslkey=SSLKEY] # Specify the path to the SSL key to use when running the service over HTTPS
Description:
Start a stub service with the given pa…
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 12:54 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/a458ad695336d409e078e3163efbfb145afa6bdf|a458ad69>
- Add renovate.json
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 12:54 AMGemfile
(bundler)
• packaging/Gemfile
(bundler)
• Dockerfile-bundle-base
(dockerfile)
• Dockerfile-package-base
(dockerfile)
• Dockerfile-release-base
(dockerfile)
• Dockerfile.alpine.arm64
(dockerfile)
• Dockerfile.alpine.x64
(dockerfile)
• Dockerfile.debian.slim
(dockerfile)
• Dockerfile.ubuntu
(dockerfile)
• .github/workflows/build.yml
(github-actions)
• .github/workflows/manual_release.yml
(github-actions)
• .github/workflows/release.yml
(github-actions)
• .github/workflows/smartbear-issue-label-added.yml
(github-actions)
• .github/workflows/triage.yml
(github-actions)
• .github/workflows/update.yml
(github-actions)
### Configuration Summary
Based on the default config's presets, Renovate will:
• Start dependency updates only once this onboarding PR is merged
• Hopefully safe environment variables to allow users to configure.
• Show all Merge Confidence badges for pull requests.
• Enable Renovate Dependency Dashboard creation.
• Use semantic commit type fix
for dependencies and chore
for all others if semantic commits are in use.
• Ignore node_modules
, bower_components
, vendor
and various test/tests (except for nuget) directories.
• Group known monorepo packages together.
• Use curated list of recommended non-monorepo package groupings.
• Apply crowd-sourced package replacement rules.
• Apply crowd-sourced workarounds for known problems with packages.
🔡 Do you want to change how Renovate upgrades your dependencies? Add your custom config to renovate.json
in this branch. Renovate will update the Pull Request description the next time it runs.
---
### What to Expect
With your current configuration, Renovate will create 9 Pull Requests:
chore(deps): update dependency webrick to v1.9.1
• Schedule: ["at any time"]
• Branch name: renovate/webrick-1.x
• Merge into: master
• Upgrade webrick to "1.9.1"
chore(deps): update dependency bigdecimal to v3.2.2
• Schedule: ["at any time"]
• Branch name: renovate/bigdecimal-3.x
• Merge into: master
• Upgrade bigdecimal to "3.2.2"
chore(deps): update dependency json to v2.12.2
• Schedule: ["at any time"]
• Branch name: renovate/json-2.x
• Merge into: master
• Upgrade json to "2.12.2"
chore(deps): update ruby docker tag to v3.4.4
• Schedule: ["at any time"]
• Branch name: renovate/ruby-3.x
• Merge into: master
• Upgrade ruby to 3.4.4-alpine
• Upgrade ruby to 3.4.4-slim
chore(deps): update ruby/setup-ruby action to v1.245.0
• Schedule: ["at any time"]
• Branch name: renovate/ruby-setup-ruby-1.x
• Merge into: master
• Upgrade ruby/setup-ruby to v1.245.0
chore(deps): update debian docker tag to v12
• Schedule: ["at any time"]
• Branch name: renovate/debian-12.x
• Merge into: master
• Upgrade debian to 12-slim
chore(deps): update dependency octokit to v10
• Schedule: ["at any time"]
• Branch name: renovate/major-octokit-monorepo
• Merge into: master
• Upgrade octokit to '~> 10.0'
chore(deps): update dependency rake to v13
• Schedule: ["at any time"]
• Branch name: renovate/rake-13.x
• Merge into: master
• Upgrade rake to '~> 13.0'
chore(deps): update peter-evans/repository-dispatch action to v3
• Schedule: ["at any time"]
• Branch name: renovate/peter-evans-repository-dispatch-3.x
• Merge into: master
• Upgrade peter-evans/repository-dispatch to v3
🚸 Branch creation will be limited to maximum 2 per hour, so it doesn't swamp any CI resources or overwhelm the project. See docs for prhourlylimit
for details.
---
❓ Got questions? Check out Renovate's Docs, particularly the Getting Started section.
If you need any further assistance then you can also request help here.
---
This PR was generated by Mend Renovate. View the repository job log.
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 12:54 AMGitHub
06/27/2025, 12:55 AMGitHub
06/27/2025, 12:55 AMGemfile
•rake '~> 13.0'
•octokit '~> 10.0'
•conventional-changelog '~> 1.3'
•bump '~> 0.5'
packaging/Gemfile
•pact "1.66.1"
•pact-message "0.11.1"
•pact-mock_service "3.12.3"
•pact-provider-verifier "1.39.1"
•pact_broker-client "1.77.0"
•webrick "1.9.1"
•json "2.7.1"
•dockerfilebigdecimal "3.1.5"
Dockerfile-bundle-base
•ruby 3.3.5-alpine
Dockerfile-package-base
•ruby 3.3.5-slim
Dockerfile-release-base
•ruby 3.3.5-alpine
Dockerfile.alpine.arm64 Dockerfile.alpine.x64 Dockerfile.debian.slim
•debian 12-slim
Dockerfile.ubuntugithub-actions
.github/workflows/build.yml
•actions/checkout v4
•ruby/setup-ruby v1.245.0
•actions/upload-artifact v4
•actions/checkout v4
•actions/download-artifact v4
.github/workflows/manual_release.yml
•actions/checkout v4
•ruby/setup-ruby v1.245.0
•ncipollo/release-action v1
•peter-evans/repository-dispatch v3
.github/workflows/release.yml
•actions/checkout v4
•ruby/setup-ruby v1.245.0
•ncipollo/release-action v1
•peter-evans/repository-dispatch v3
.github/workflows/smartbear-issue-label-added.yml .github/workflows/triage.yml .github/workflows/update.yml
•actions/checkout v4
•ruby/setup-ruby v1.245.0
•--- • Check this box to trigger a request for Renovate to run again on this repository pact-foundation/pact-ruby-standalonepeter-evans/repository-dispatch v3
GitHub
06/27/2025, 1:01 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/be28ecff15bcc016b4105a3a5890b7e0a55e562d|be28ecff>
- chore(deps): update dependency webrick to v1.9.1
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 1:01 AMGitHub
06/27/2025, 1:01 AMGitHub
06/27/2025, 6:31 AMGitHub
06/27/2025, 6:31 AMGitHub
06/27/2025, 10:36 AMREADME.md
by @areitz in https://github.com/octokit/octokit.rb/pull/1724
• Update rubocop requirement from 1.67.0 to 1.68.0 by @dependabot in https://github.com/octokit/octokit.rb/pull/1725
• Update rubocop requirement from 1.68.0 to 1.69.2 by @dependabot in https://github.com/octokit/octokit.rb/pull/1730
• feat: add missing method delete_issue_comment_reaction()
by @GrantBirki in https://github.com/octokit/octokit.rb/pull/1734
• Fix string validation errors by @hennevogel in https://github.com/octokit/octokit.rb/pull/1740
• Bump major version to v10.0.0 by @kfcampbell in https://github.com/octokit/octokit.rb/pull/1749
#### New Contributors
• @pbstriker38 made their first contribution in https://github.com/octokit/octokit.rb/pull/1720
• @areitz made their first contribution in https://github.com/octokit/octokit.rb/pull/1724
• @GrantBirki made their first contribution in https://github.com/octokit/octokit.rb/pull/1734
• @hennevogel made their first contribution in https://github.com/octokit/octokit.rb/pull/1740
Full Changelog: octokit/octokit.rb@v9.2.0...v10.0.0
### `v9.2.0`
Compare Source
#### What's Changed
##### Features
• feat: enable and disable automated security features by @jprosevear in https://github.com/octokit/octokit.rb/pull/1705
• Add support for file comments in PRs by <https://redirect.git…
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 10:37 AMrequire_relative
in the Rake codebase by @koic in https://github.com/ruby/rake/pull/566
• Provide a 'Changelog' link on rubygems.org/gems/rake by @mark-young-atg in https://github.com/ruby/rake/pull/572
• Remove dependency on win32ole
by @Earlopain in https://github.com/ruby/rake/pull/573
• Switch changelog_uri to releases tab by @fynsta in https://github.com/ruby/rake/pull/577
• chore: refactor/reformat the heredocs (in tests) ... by @pvdb in https://github.com/ruby/rake/pull/589
• chore: remove $trace
global variable / option by @pvdb in https://github.com/ruby/rake/pull/592
• Link to Jim's last rake
commit (not the git tree with that SHA) by @pvdb in https://github.com/ruby/rake/pull/593
• chore: refactor how temporary files are created (in tests) by @pvdb in https://github.com/ruby/rake/pull/590
• refactor: use $LOADED_FEATURES
built-in instead of $"
by @pvdb in https://github.com/ruby/rake/pull/605
• refactor: remove "exposed" @system_dir
instance variable (in helper method) by @pvdb in https://github.com/ruby/rake/pull/604
• refactor: simplify Rake::Application#system_dir
method by @pvdb in https://github.com/ruby/rake/pull/591
• Remove unused argument by @takmar in https://github.com/ruby/rake/pull/623
• Use latest RDoc release instead of Ruby 3.2's default version by @st0012 in https://github.com/ruby/rake/pull/630
• Enabled trusted publisher for rubygems.org by @hsbt in https://github.com/ruby/rake/pull/634
• refactor: use Dir.home
to find `rake`'s standard system dir by @pvdb in https://github.com/ruby/rake/pull/608
• Fix RDoc links in Rake Information section by <https:/…
pact-foundation/pact-ruby-standaloneGitHub
06/27/2025, 5:12 PMGitHub
06/28/2025, 4:46 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/9d148c4d24351a636bd9715ccb16c260341fe867|9d148c4d>
- chore(deps): update peter-evans/repository-dispatch action to v3
pact-foundation/pact-ruby-standaloneGitHub
06/28/2025, 4:46 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/59285dcb50d7bc6fdb099fa94fd528189e5e0694|59285dcb>
- chore(deps): update dependency rake to v13
pact-foundation/pact-ruby-standaloneGitHub
06/28/2025, 4:47 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/a278bd1fd30187bfa4db6f1b8fdc46c13aa7ee13|a278bd1f>
- chore(deps): update debian docker tag to v12
pact-foundation/pact-ruby-standaloneGitHub
06/28/2025, 4:47 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/0aadcb205d4ccb8bfdcf527b0ee3d7ab0b052241|0aadcb20>
- chore(deps): update ruby/setup-ruby action to v1.245.0
pact-foundation/pact-ruby-standaloneGitHub
06/28/2025, 4:47 AMDockerfile-bundle-base
We recommend upgrading to ruby:3.4.4-alpine
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| Issue | Score | |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----- |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2025-26519](https://github.com/advisories/GHSA-xpv5-92cc-8f65 "CVE-2025-26519") [SNYK-ALPINE320-MUSL-8720638](https://snyk.io/vuln/SNYK-ALPINE320-MUSL-8720638) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-9143](https://github.com/advisories/GHSA-q764-r57m-9wp9 "CVE-2024-9143") [SNYK-ALPINE320-OPENSSL-8235201](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8235201) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-13176](https://github.com/advisories/GHSA-r9fv-h47r-823f "CVE-2024-13176") [SNYK-ALPINE320-OPENSSL-8690013](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8690013) | 364 |
| [[low severity](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67 "low severity")](https://camo.githubusercontent.com/6b3fab2d4fee347050a15f32c90cf4a87d4569393bb24a45d1aa184b9c4c8a36/68747470733a2f2f7265732e636c6f7564696e6172792e636f6d2f736e796b2f696d6167652f75706c6f61642f775f32302c685f32302f76313536313937373831392f69636f6e2f6c2e706e67) | [CVE-2024-12797](https://github.com/advisories/GHSA-79v4-65xg-pq4g "CVE-2024-12797") [SNYK-ALPINE320-OPENSSL-8710359](https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-8710359) | 364 |
---
Important
• Check the changes in this PR to ensure they won't cause issues with your project.
• Max score is 1000. Note that the real score may have changed since the PR was raised.
• This PR was automatically created by Snyk using the credentials of a real user.
---
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information: <https://camo.githubusercontent.com/fb4f829dccead14e74aab64f0f693fd548bf8ba0c774503ebf84d34ce3aced8b/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949335a4463344d6d4a6c4d53316a4e4749774c54526b4e7a4574596a557a5969316b4d7a4e6c596a45784e7a5a684d546b694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a646b4e7a6779596d55784c574d30596a41744e4751334d5331694e544e694c57517a4d3256694d5445334e6d45784f534a3966513d3d|[](https://camo.githubusercontent.com/fb4f829dccead14e74aab64f0f693fd548bf8ba0c774503ebf84d34ce3aced8b/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949335a4463344d6d4a6c4d53316a4e4749774c54526b4e7a4574596a557a5969316b4d7a4e6c596a45784e7a5a684d546b694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a646b…
pact-foundation/pact-ruby-standaloneGitHub
06/28/2025, 4:51 AM<https://github.com/pact-foundation/pact-ruby-standalone/tree/master|master>
by JP-Ellis
<https://github.com/pact-foundation/pact-ruby-standalone/commit/41a20b0a0f8cc003942e2fef44422a778eaaba88|41a20b0a>
- chore(deps): update dependency octokit to v10
pact-foundation/pact-ruby-standalone