Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump golang.org/x/vuln from 1.1.3 to 1.1.4 in /tools in the tools group #80

Closed

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 15, 2025

Bumps the tools group in /tools with 1 update: golang.org/x/vuln.

Updates golang.org/x/vuln from 1.1.3 to 1.1.4

Release notes

Sourced from golang.org/x/vuln's releases.

v1.1.4

This release fixes some minor govulncheck bugs (#70157) and introduces performance improvements, saving up to 15% of execution time for large programs in our experiments.

Govulncheck now emits an SBOM message in the JSON output, containing minimal information about the artifacts being scanned. This information is used to communicate a more informative progress message in the textual -show verbose mode.

This release also brings a new feature when scanning binaries. Govulncheck now also checks for known vulnerabilities in the main module of the binary, in addition to transitive dependencies. This is useful when, say, one downloads and wants to check a binary developed in a third-party module that might have its own vulnerabilities.

Commits
  • d1f3801 go.mod: update golang.org/x dependencies
  • 681aa92 go.mod: update golang.org/x dependencies
  • 58ab492 cmd/govulncheck: remove unnecessary fixups
  • e45fa10 cmd/govulncheck: better mask new (sbom) versions
  • bf472d2 cmd/govulncheck: mask dirty dependency versions
  • 072d4ef cmd/govulncheck: add missing test data
  • 0481857 cmd/govulncheck: set gotypesalias=1 when using >=1.23 toolchain
  • d0fc691 go.mod: update golang.org/x dependencies
  • dba032f internal/sarif: use empty arrays instead of nils
  • 47cd072 cmd/govulncheck/testdata: expand set of go versions in fixup
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the tools group in /tools with 1 update: [golang.org/x/vuln](https://github.com/golang/vuln).


Updates `golang.org/x/vuln` from 1.1.3 to 1.1.4
- [Release notes](https://github.com/golang/vuln/releases)
- [Commits](golang/vuln@v1.1.3...v1.1.4)

---
updated-dependencies:
- dependency-name: golang.org/x/vuln
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: tools
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from AlekSi as a code owner January 15, 2025 01:55
@dependabot dependabot bot added deps PRs that update dependencies not ready Issues that are not ready to be worked on; PRs that should skip CI labels Jan 15, 2025
Copy link
Contributor Author

dependabot bot commented on behalf of github Jan 22, 2025

Looks like golang.org/x/vuln is updatable in another way, so this is no longer needed.

@dependabot dependabot bot closed this Jan 22, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/tools/tools-3ef3affbfc branch January 22, 2025 01:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
deps PRs that update dependencies not ready Issues that are not ready to be worked on; PRs that should skip CI
Projects
Status: In progress
Development

Successfully merging this pull request may close these issues.

1 participant