Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade: Bump github.com/sigstore/sigstore from 1.8.6 to 1.8.7 #127

Merged

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 15, 2024

Bumps github.com/sigstore/sigstore from 1.8.6 to 1.8.7.

Release notes

Sourced from github.com/sigstore/sigstore's releases.

v1.8.7

Dependencies updates only

What's Changed

Full Changelog: sigstore/sigstore@v1.8.6...v1.8.7

Commits
  • cb8b4bb sync go mod
  • 2506e5d build(deps): Bump the all group across 1 directory with 4 updates
  • 9a70270 build(deps): Bump google.golang.org/grpc in /pkg/signature/kms/gcp
  • f6b4bb5 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • aebd23d build(deps): Bump actions/upload-artifact in the all group
  • ec4bc1a build(deps): Bump the all group across 1 directory with 2 updates
  • aeb9782 build(deps): Bump golang.org/x/crypto
  • 016e2e3 build(deps): Bump github.com/sigstore/sigstore
  • 8243831 build(deps): Bump hashicorp/vault in /test/e2e in the all group
  • 51d791e build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/sigstore/sigstore](https://github.com/sigstore/sigstore) from 1.8.6 to 1.8.7.
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.6...v1.8.7)

---
updated-dependencies:
- dependency-name: github.com/sigstore/sigstore
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jul 15, 2024
Copy link

dryrunsecurity bot commented Jul 15, 2024

DryRun Security Summary

The pull request updates the versions of several Go dependencies, including github.com/google/go-containerregistry, github.com/sigstore/sigstore, github.com/coreos/go-oidc/v3, and github.com/go-jose/go-jose/v4, which may include bug fixes, security patches, or feature improvements, and the go.mod and go.sum files have been updated accordingly.

Expand for full summary

Summary:

The changes in this pull request primarily focus on updating the versions of several Go dependencies used in the project. These updates include the github.com/google/go-containerregistry, github.com/sigstore/sigstore, github.com/coreos/go-oidc/v3, and github.com/go-jose/go-jose/v4 dependencies. From an application security perspective, these dependency updates are generally a positive change, as they may include bug fixes, security patches, or feature improvements. However, it's important to review the release notes or changelogs for these dependencies to understand the specific changes and their potential impact on the application.

Additionally, the changes update the github.com/coreos/go-oidc/v3 dependency from version 3.10.0 to 3.11.0, which is a minor version update. This type of update typically indicates that the changes are non-breaking and likely include bug fixes or small feature additions. While this change is not immediately concerning, it's always a good practice to review the release notes or changelog to understand the specific changes and any potential security implications.

Files Changed:

  1. go.mod: This file has been updated to reflect the changes in the Go dependencies used in the project. The key changes include:

    • github.com/google/go-containerregistry updated from version 0.19.2 to 0.20.0.
    • github.com/sigstore/sigstore updated from version 1.8.6 to 1.8.7.
    • github.com/coreos/go-oidc/v3 updated from version 3.10.0 to 3.11.0.
    • github.com/go-jose/go-jose/v4 updated from version 4.0.1 to 4.0.2.
  2. go.sum: This file has been updated to reflect the changes in the github.com/coreos/go-oidc/v3 dependency, which has been updated from version 3.10.0 to 3.11.0.

Code Analysis

We ran 7 analyzers against 2 files and 1 analyzer had findings. 6 analyzers had no findings.

Analyzer Findings
Sensitive Files Analyzer 2 findings

Riskiness

🟢 Risk threshold not exceeded.

View PR in the DryRun Dashboard.

Copy link

guardrails bot commented Jul 15, 2024

⚠️ We detected 2 security issues in this pull request:

Vulnerable Libraries (2)
Severity Details
High pkg:golang/github.com/google/[email protected] upgrade to: > v0.20.0
High pkg:golang/github.com/sigstore/[email protected] upgrade to: > v1.8.7

More info on how to fix Vulnerable Libraries in Go.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

@santoshkal santoshkal merged commit 4eaad14 into main Jul 15, 2024
11 of 12 checks passed
@santoshkal santoshkal deleted the dependabot/go_modules/github.com/sigstore/sigstore-1.8.7 branch July 15, 2024 18:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant