Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github.com/securego/gosec/v2 from 2.20.1-0.20240822074752-ab3f6c1c83a0 to 2.21.2 in /tools/mod #18595

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 16, 2024

Bumps github.com/securego/gosec/v2 from 2.20.1-0.20240822074752-ab3f6c1c83a0 to 2.21.2.

Release notes

Sourced from github.com/securego/gosec/v2's releases.

v2.21.2

Changelog

  • abfe8cfd6d5687c96abf31f8e7f57982df2a6e4f Update the SARIF schema URL (#1217)
  • 0396179112d5e2071365e5ecb2a75d77e90852f8 Update go version to 1.23.1 and 1.22.7 (#1216)
  • 5e53c8b9f7f77380e95960e6095392f49977e63d chore(deps): update all dependencies (#1215)
  • 014751c91c04fe3fe05e381dea9faadbd4ce8e78 Update gosec version to v2.21.1 in github action (#1213)

v2.21.1

Changelog

  • 0ce4453ddd8cca1291d2056cf903b545baad95a0 Rollback the SARIF version to 2.1 since github doesn't support 2.2 (#1210)
  • ea26e8431f53a5d229b1c07ffe3529008a01c25e Update gosec in github action to v2.21.0 (#1208)

v2.21.0

Changelog

  • b278b40c5266eb2b52f41c57d9e6509d9360a2a6 Update cosign version to v2.4.0 in release github workflow (#1207)
  • eaedce9a8b64ce207e25553232bcc7541e0044e7 Improvement the int conversion overflow logic to handle bound checks (#1194)
  • ea5b2766bb1abd38e13375c0e2d789f8ab2b789c fix: G602 support for nested conditionals with bounds check (#1201)
  • 11d69032b0856c96afd4c493967ab7a30e20ff5e Update go.mod to sue go 1.22.0 toolchain
  • 655527dfb4df16091cbdc0a10bd89c2d5d9312a5 chore(deps): update all dependencies
  • 08985601695d7b6eb13330521c80859adc9d72aa Make variable name more clear
  • ac67231ec5a73f1525942d5ef482d1152e61ac3f Make variable names more explicity and reduce duplications
  • e0414c46402de6813677e1868b6c0f82270fdb80 Fix formatting
  • c7003fc7e5e7f05783097793d4410d50896e06d4 Refactor to reduce some fuctions and variable names
  • 2401936458ea4c80b8c83a3500d9354ca3914605 Pass the value argument directly since is an interface
  • f5d312825f753d7c598fcd5e80e2c9c6f9cb1776 Added suggested changes
  • a14ca4ac59d9b519d1b195afe6098ff13d574d32 Added another test case in order to increase code coverage
  • a6dd589bae11a5eb18408a4a75e63e46833a01a3 Removed function parameter which is always the same
  • b4c746962f33c83ec64ce337e546bd0cc6529cd1 Formatting problems(CI was not passing)
  • 7f8f654235b42704bab6c65c3459a2824bccadd3 Updated analyzer to use new way of initialization
  • a26215cf23be85d473f6d5a1e059a02406ea5d55 Migrated the rule to the analyzers folder
  • 3f6e1e7326fe7849aaaaf35698907a1a7c504997 Refractored code a little bit
  • 0eb8143c23b649a345370fd169baff6525c34bd9 Added new rule G407(hardcoded IV/nonce)
  • 4ae73c8ba3a6b38e3c1bafad75f59cb4910e389f Fix conversion overflow false positive when using ParseUint
  • c52dc0ea4e0fed5898f6b1d1f1028bd20ac0fa86 Add a build step to measure the scan perfomance
  • bcec04e784830d45797201cb889246bf266cd941 Fix conversion overflow false positives when they are checked or pre-determined
  • 71e397b9944c50b3f8f9e0e3e1904047c7b3967e Update go.mod
  • aec45b0b7dd15c03d89d67e16b93f41df8ece85b chore(deps): update all dependencies
  • ab3f6c1c83a0c80fcb8c95838de10cc3cf0d8ba2 Fix false positive in conversion overflow check from uint8/int8 type
  • a39ec5a16bca81f2442050ce3d2d442911ace4cc Disable staticcheck SA1019 rule
  • a1b2ab80af682c279271a7d3e3cf939e0e5c2847 Update the golangci linters
  • 8467f012e0d6238433e299fd0499ee29342000c3 Add more test to cover more use cases for G115 rule
  • 81cda2f91fbe1bf4735feb55febcae03e697a92b Allow excluding analyzers globally (#1180)
  • 18135b439cbafc52ac712528099193a0d6b18a33 Update to Go 1.23.0 (#1183)
  • 91c708a62031dd4b92ae057c8835b975bf80c134 chore(deps): update all dependencies (#1182)
  • 92bac42afce8fee2756fb7d7f491328bd069ebec Read the AI API key also from an environment variable (#1181)
  • 56f943b802579b69d96f0999a7943c588e600ae7 Add support to generate auto fixes using LLM (AI) (#1177)
  • f33fd4bf29722188b24b4a55b512d12adcd8b216 chore(deps): update all dependencies
  • 55a47f37740ea50048d4396051e2a60c794bec1d chore(deps): update all dependencies
  • a5d9ef67e2c945ab409da174596ee8be564633fe chore(deps): update all dependencies
  • 68424445af83e15ed94b4d9b26ee00089d2a87d6 chore(deps): update dependency babel-standalone to v7.24.10

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/securego/gosec/v2](https://github.com/securego/gosec) from 2.20.1-0.20240822074752-ab3f6c1c83a0 to 2.21.2.
- [Release notes](https://github.com/securego/gosec/releases)
- [Changelog](https://github.com/securego/gosec/blob/master/.goreleaser.yml)
- [Commits](https://github.com/securego/gosec/commits/v2.21.2)

---
updated-dependencies:
- dependency-name: github.com/securego/gosec/v2
  dependency-type: indirect
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Sep 16, 2024
@k8s-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign ahrtr for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot
Copy link

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a etcd-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@codecov-commenter
Copy link

⚠️ Please install the 'codecov app svg image' to ensure uploads and comments are reliably processed by Codecov.

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 68.79%. Comparing base (7f399ee) to head (403fa0d).

Current head 403fa0d differs from pull request most recent head add2f87

Please upload reports for the commit add2f87 to get more accurate results.

❗ Your organization needs to install the Codecov GitHub app to enable full functionality.

Additional details and impacted files

see 25 files with indirect coverage changes

@@           Coverage Diff           @@
##             main   #18595   +/-   ##
=======================================
  Coverage   68.78%   68.79%           
=======================================
  Files         420      420           
  Lines       35474    35474           
=======================================
+ Hits        24402    24404    +2     
+ Misses       9652     9645    -7     
- Partials     1420     1425    +5     

Continue to review full report in Codecov by Sentry.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 7f399ee...add2f87. Read the comment docs.

@henrybear327
Copy link
Contributor

Fully indirect, suggest closing directly

./tools/mod/go.mod:     github.com/securego/gosec/v2 v2.21.2 // indirect

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/tooling dependencies Pull requests that update a dependency file go Pull requests that update Go code needs-ok-to-test size/M
Development

Successfully merging this pull request may close these issues.

3 participants