Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7 #221

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jun 24, 2024

Bumps github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7.

Changelog

Sourced from github.com/hashicorp/go-retryablehttp's changelog.

0.7.7 (May 30, 2024)

BUG FIXES:

  • client: avoid potentially leaking URL-embedded basic authentication credentials in logs (#158)

0.7.6 (May 9, 2024)

ENHANCEMENTS:

  • client: support a RetryPrepare function for modifying the request before retrying (#216)
  • client: support HTTP-date values for Retry-After header value (#138)
  • client: avoid reading entire body when the body is a *bytes.Reader (#197)

BUG FIXES:

  • client: fix a broken check for invalid server certificate in go 1.20+ (#210)
Commits
  • 1542b31 v0.7.7
  • defb9f4 v0.7.7
  • a99f07b Merge pull request #158 from dany74q/danny/redacted-url-in-logs
  • 8a28c57 Merge branch 'main' into danny/redacted-url-in-logs
  • 86e852d Merge pull request #227 from hashicorp/dependabot/github_actions/actions/chec...
  • 47fe99e Bump actions/checkout from 4.1.5 to 4.1.6
  • 490fc06 Merge pull request #226 from testwill/ioutil
  • f3e9417 chore: remove refs to deprecated io/ioutil
  • d969eaa Merge pull request #225 from hashicorp/manicminer-patch-2
  • 2ad8ed4 v0.7.6
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/hashicorp/go-retryablehttp](https://github.com/hashicorp/go-retryablehttp) from 0.7.5 to 0.7.7.
- [Changelog](https://github.com/hashicorp/go-retryablehttp/blob/main/CHANGELOG.md)
- [Commits](hashicorp/go-retryablehttp@v0.7.5...v0.7.7)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/go-retryablehttp
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jun 24, 2024
Copy link

dryrunsecurity bot commented Jun 24, 2024

Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.

DryRun Security Status Findings
Server-Side Request Forgery Analyzer 0 findings
Configured Codepaths Analyzer 0 findings
IDOR Analyzer 0 findings
SQL Injection Analyzer 0 findings
Secrets Analyzer 0 findings
Authn/Authz Analyzer 1 finding
Sensitive Files Analyzer 4 findings

Note

🟢 Risk threshold not exceeded.

Change Summary (click to expand)

The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective.

Summary:

The changes in this pull request are primarily focused on updating dependencies, improving error handling, and expanding support for various operating systems and CPU architectures in the Go standard library and related packages. While the changes do not introduce any obvious security vulnerabilities, there are a few areas that warrant closer attention from an application security perspective:

  1. Dependency Management: The updates to the go-retryablehttp library include a fix for a potential security issue related to leaking URL-embedded basic authentication credentials in logs. Keeping dependencies up-to-date and monitoring for security-related updates is an important security practice.

  2. Error Handling and Input Validation: Several changes involve improving error handling and input validation, such as the addition of the isCertError function to better handle certificate-related errors. Proper error handling and input validation are crucial for maintaining the overall security of the application.

  3. Platform-specific Functionality: The changes expand support for various operating systems, including z/OS and ARM64 architectures. While these changes are primarily focused on improving compatibility and performance, it's important to ensure that the platform-specific functionality is implemented securely and does not introduce any new vulnerabilities.

Files Changed:

  • vendor/github.com/hashicorp/go-retryablehttp/*: Several files in this directory were updated, including changes to improve error handling, redact sensitive information from logs, and add a new function to prepare requests for retries.
  • vendor/golang.org/x/sys/cpu/*: Changes were made to improve the detection of CPU features, particularly related to the Scalable Vector Extension (SVE) and SVE2 instruction sets on ARM64 architectures.
  • vendor/golang.org/x/sys/unix/*: Multiple files were updated to add support for the z/OS operating system, including changes to system call handling, error reporting, and memory management.

Overall, the changes in this pull request appear to be focused on improving the reliability, performance, and platform support of the Go standard library and related packages. While there are no immediate security concerns, it's important to continue monitoring the changes and dependencies for any potential security-related updates or issues.

Powered by DryRun Security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants