Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump golang.org/x/vuln from 1.0.4 to 1.1.2 #541

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 24, 2024

Bumps golang.org/x/vuln from 1.0.4 to 1.1.2.

Release notes

Sourced from golang.org/x/vuln's releases.

v1.1.2

This release brings the support for the VEX output format.

Integration

Govulncheck now supports OpenVex output format via -format openvex flag option. Please see here for more details on the actual encoding.

v1.1.1

This release brings some minor improvements to govulncheck textual output and performance optimizations for package and module scan modes.

The major change brought by this release is the support for SARIF output format.

Integration

Govulncheck now supports Static Analysis Results Interchange Format (SARIF) output format via -format sarif flag option. Please see here for more details on the actual encoding.

v1.1.0

This release brings minor improvements to govulncheck inner workings and a few bug fixes (#66139, #65590).

Integration

Govulncheck JSON now also contains scan mode as part of the Config message.

Further, the Position in trace frames now contains only paths relative to their enclosing module. This could potentially break some existing clients, hence the bump of the minor version.

Note that this change is made to allow for easier preservation of privacy by the clients as now the file positions do not contain information about the local machine. This is also a portable solution. Clients can reconstruct full paths for their local machine by joining the Position relative paths with paths of the enclosing modules on the local machine.

Commits
  • 3740f5c internal/osv: add review status
  • 29462d7 vulncheck: update documentation for vex
  • 2736e1d cmd/govulncheck/integration/stackrox-scanner: update expectations
  • 65c6e2b cmd/govulncheck/integration/k8s: update expectations
  • 03e66a6 internal/govulncheck: add more comments for emitted OSVs
  • f30059c go.mod: update golang.org/x dependencies
  • 84735a3 internal/scan: increase telemetry counter for show flag
  • fb2a687 internal/scan: add format and scan level telemetry
  • f5e77b8 internal/cmd/govulncheck: remove unnecessary binary dependency
  • 1201340 cmd/govulncheck/integration: update go in integration tests
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [golang.org/x/vuln](https://github.com/golang/vuln) from 1.0.4 to 1.1.2.
- [Release notes](https://github.com/golang/vuln/releases)
- [Commits](golang/vuln@v1.0.4...v1.1.2)

---
updated-dependencies:
- dependency-name: golang.org/x/vuln
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jun 24, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Jun 24, 2024

The following labels could not be found: A:automerge.

Copy link

codecov bot commented Jun 24, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Please upload report for BASE (release/v2.x.x@c07adef). Learn more about missing BASE report.

Additional details and impacted files
@@                Coverage Diff                @@
##             release/v2.x.x     #541   +/-   ##
=================================================
  Coverage                  ?   43.52%           
=================================================
  Files                     ?       62           
  Lines                     ?     2766           
  Branches                  ?        0           
=================================================
  Hits                      ?     1204           
  Misses                    ?     1430           
  Partials                  ?      132           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@aljo242 aljo242 merged commit e56839b into release/v2.x.x Jun 25, 2024
11 of 12 checks passed
@aljo242 aljo242 deleted the dependabot/go_modules/release/v2.x.x/golang.org/x/vuln-1.1.2 branch June 25, 2024 02:24
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant