Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7 #221

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

build(deps): bump github.com/hashicorp/go-retryablehttp

96f1436
Select commit
Loading
Failed to load commit list.
Open

build(deps): bump github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7 #221

build(deps): bump github.com/hashicorp/go-retryablehttp
96f1436
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Sensitive Files Analyzer succeeded Jun 24, 2024 in 0s

DryRun Security

Details

Sensitive Files Analyzer Findings: 4 detected

⚠️ Potential Sensitive File go.mod (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.mod
CodeLink

compage/go.mod

Lines 145 to 151 in 96f1436

github.com/gorilla/mux v1.8.1 // indirect
github.com/grpc-ecosystem/grpc-gateway/v2 v2.19.1 // indirect
github.com/hashicorp/go-cleanhttp v0.5.2 // indirect
github.com/hashicorp/go-retryablehttp v0.7.7 // indirect
github.com/hashicorp/hcl v1.0.1-vault-5 // indirect
github.com/imdario/mergo v0.3.16 // indirect
github.com/in-toto/in-toto-golang v0.9.0 // indirect
⚠️ Potential Sensitive File go.sum (click for details)
Type Potential Sensitive File
Description Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename go.sum
CodeLink

compage/go.sum

Lines 412 to 423 in 96f1436

github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
github.com/hashicorp/go-cleanhttp v0.5.2 h1:035FKYIWjmULyFRBKPs8TBQoi0x6d9G4xc9neXJWAZQ=
github.com/hashicorp/go-cleanhttp v0.5.2/go.mod h1:kO/YDlP8L1346E6Sodw+PrpBSV4/SoxCXGY6BqNFT48=
github.com/hashicorp/go-hclog v1.6.3 h1:Qr2kF+eVWjTiYmU7Y31tYlP1h0q/X3Nl3tPGdaB11/k=
github.com/hashicorp/go-hclog v1.6.3/go.mod h1:W4Qnvbt70Wk/zYJryRzDRU/4r0kIg0PVHBcfoyhpF5M=
github.com/hashicorp/go-multierror v1.1.1 h1:H5DkEtf6CXdFp0N0Em5UCwQpXMWke8IA0+lD48awMYo=
github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM=
github.com/hashicorp/go-retryablehttp v0.7.7 h1:C8hUCYzor8PIfXHa4UrZkU4VvK8o9ISHxT2Q8+VepXU=
github.com/hashicorp/go-retryablehttp v0.7.7/go.mod h1:pkQpWZeYWskR+D1tR2O5OcBFOxfA7DoAO6xtkuQnHTk=
github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5Oi2viEzc=
github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8=
github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 h1:UpiO20jno/eV1eVZcxqWnUohyKRe1g8FPV/xH1s/2qs=
⚠️ Potential Sensitive File vendor/github.com/hashicorp/go-retryablehttp/Makefile (click for details)
Type Potential Sensitive File
Description Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf /, changing file permissions, tampering with dependencies, and more.
Filename vendor/github.com/hashicorp/go-retryablehttp/Makefile
CodeLink
test:
go vet ./...
go test -v -race ./...
updatedeps:
go get -f -t -u ./...
⚠️ Potential Sensitive File vendor/github.com/hashicorp/hcl/Makefile (click for details)
Type Potential Sensitive File
Description Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf /, changing file permissions, tampering with dependencies, and more.
Filename vendor/github.com/hashicorp/hcl/Makefile
CodeLink
TEST?=./...
default: test
fmt: generate
go fmt ./...
test: generate
go get -t ./...
go test $(TEST) $(TESTARGS)
generate:
go generate ./...
updatedeps:
go get -u golang.org/x/tools/cmd/stringer
.PHONY: default generate test updatedeps