Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump dependencies using scripts/bump-deps.sh #1419

Merged
merged 1 commit into from
Nov 21, 2024

Conversation

github-actions[bot]
Copy link

This PR created by create-pull-request must be closed and reopened manually to trigger automated checks.

@github-actions github-actions bot requested a review from a team as a code owner November 12, 2024 10:04
@github-actions github-actions bot added the dependencies Pull requests that update a dependency file label Nov 12, 2024
@austinvazquez austinvazquez reopened this Nov 12, 2024
Copy link
Author

github-actions bot commented Nov 12, 2024

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 13 package(s) with unknown licenses.
See the Details below.

License Issues

cmd/go.mod

PackageVersionLicenseIssue Type
golang.org/x/sync0.9.0NullUnknown License
golang.org/x/sys0.27.0NullUnknown License
golang.org/x/term0.26.0NullUnknown License
golang.org/x/text0.20.0NullUnknown License
golang.org/x/time0.8.0NullUnknown License
github.com/hanwen/go-fuse/v22.7.0NullUnknown License

go.mod

PackageVersionLicenseIssue Type
golang.org/x/crypto0.29.0NullUnknown License
golang.org/x/sync0.9.0NullUnknown License
golang.org/x/sys0.27.0NullUnknown License
golang.org/x/term0.26.0NullUnknown License
golang.org/x/text0.20.0NullUnknown License
golang.org/x/time0.8.0NullUnknown License
github.com/hanwen/go-fuse/v22.7.0NullUnknown License
Allowed Licenses: Apache-2.0, BSD-2-Clause, BSD-2-Clause-FreeBSD, BSD-3-Clause, MIT, ISC, Python-2.0, PostgreSQL, X11, Zlib
Excluded from license check: pkg:golang/github.com/hashicorp/go-retryablehttp, pkg:golang/github.com/hashicorp/errwrap, pkg:golang/github.com/hashicorp/go-cleanhttp, pkg:golang/github.com/hashicorp/go-multierror

OpenSSF Scorecard

Scorecard details
PackageVersionScoreDetails
gomod/github.com/containerd/containerd 1.7.24 🟢 8.5
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
License🟢 10license file detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
CII-Best-Practices🟢 5badge detected: Passing
Fuzzing🟢 10project is fuzzed
Binary-Artifacts🟢 10no binaries found in the repo
Security-Policy🟢 9security policy file detected
Branch-Protection🟢 8branch protection is not maximal on development and all release branches
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST🟢 10SAST tool is run on all commits
Vulnerabilities🟢 100 existing vulnerabilities detected
Pinned-Dependencies🟢 6dependency not pinned by hash detected -- score normalized to 6
gomod/github.com/containerd/continuity 0.4.5 🟢 7.3
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Code-Review🟢 10all changesets reviewed
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
Pinned-Dependencies⚠️ 2dependency not pinned by hash detected -- score normalized to 2
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Security-Policy🟢 9security policy file detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 10SAST tool is run on all commits
gomod/github.com/hanwen/go-fuse/v2 2.7.0 🟢 4.8
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1030 commit(s) and 22 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
SAST⚠️ 0no SAST tool detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 9license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Vulnerabilities🟢 100 existing vulnerabilities detected
gomod/golang.org/x/sync 0.9.0 UnknownUnknown
gomod/golang.org/x/sys 0.27.0 UnknownUnknown
gomod/golang.org/x/term 0.26.0 UnknownUnknown
gomod/golang.org/x/text 0.20.0 UnknownUnknown
gomod/golang.org/x/time 0.8.0 UnknownUnknown
gomod/github.com/containerd/containerd 1.7.24 🟢 8.5
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
License🟢 10license file detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
CII-Best-Practices🟢 5badge detected: Passing
Fuzzing🟢 10project is fuzzed
Binary-Artifacts🟢 10no binaries found in the repo
Security-Policy🟢 9security policy file detected
Branch-Protection🟢 8branch protection is not maximal on development and all release branches
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
SAST🟢 10SAST tool is run on all commits
Vulnerabilities🟢 100 existing vulnerabilities detected
Pinned-Dependencies🟢 6dependency not pinned by hash detected -- score normalized to 6
gomod/github.com/containerd/continuity 0.4.5 🟢 7.3
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Code-Review🟢 10all changesets reviewed
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
Pinned-Dependencies⚠️ 2dependency not pinned by hash detected -- score normalized to 2
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Security-Policy🟢 9security policy file detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 10SAST tool is run on all commits
gomod/github.com/hanwen/go-fuse/v2 2.7.0 🟢 4.8
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1030 commit(s) and 22 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
SAST⚠️ 0no SAST tool detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 9license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Vulnerabilities🟢 100 existing vulnerabilities detected
gomod/golang.org/x/crypto 0.29.0 UnknownUnknown
gomod/golang.org/x/sync 0.9.0 UnknownUnknown
gomod/golang.org/x/sys 0.27.0 UnknownUnknown
gomod/golang.org/x/term 0.26.0 UnknownUnknown
gomod/golang.org/x/text 0.20.0 UnknownUnknown
gomod/golang.org/x/time 0.8.0 UnknownUnknown

Scanned Files

  • cmd/go.mod
  • go.mod

@sondavidb sondavidb force-pushed the create-pull-request/patch branch from 8bb1a8c to a1755f3 Compare November 12, 2024 18:44
@austinvazquez
Copy link
Contributor

Still having to avoid the continuity update?

austinvazquez
austinvazquez previously approved these changes Nov 18, 2024
@sondavidb
Copy link
Contributor

Yeah unless we tag our containerd version to containerd/containerd@4a8b079 we'll have to keep doing this.

Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
@github-actions github-actions bot force-pushed the create-pull-request/patch branch from 6a98d4c to e5f8916 Compare November 21, 2024 15:05
@austinvazquez austinvazquez reopened this Nov 21, 2024
Copy link
Contributor

@austinvazquez austinvazquez left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM on green

@austinvazquez austinvazquez merged commit 82e5892 into main Nov 21, 2024
18 checks passed
@austinvazquez austinvazquez deleted the create-pull-request/patch branch November 21, 2024 17:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants