turkdevops / play-with-docker

You know it, you use it, now it's time to improve it. PWD!.
http://play-with-docker.com
MIT License
0 stars 0 forks source link

Bump golang.org/x/text from 0.3.3 to 0.3.8 #67

Open dependabot[bot] opened 1 year ago

dependabot[bot] commented 1 year ago

Bumps golang.org/x/text from 0.3.3 to 0.3.8.

Commits
  • 434eadc language: reject excessively large Accept-Language strings
  • 23407e7 go.mod: ignore cyclic dependency for tagging
  • b18d3dd secure/precis: replace bytes.Compare with bytes.Equal
  • 795e854 all: replace io/ioutil with io and os package
  • b0ca10f internal/language: bump script types to uint16 and update registry
  • ba9b0e1 go.mod: update x/tools to HEAD
  • d03b418 A+C: delete AUTHORS and CONTRIBUTORS
  • b4bca84 language/display: fix Tag method comment
  • ea49e3e go.mod: update x/tools to HEAD
  • 78819d0 go.mod: update to golang.org/x/text v0.1.10
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/turkdevops/play-with-docker/network/alerts).
guardrails[bot] commented 1 year ago

:warning: We detected 9 security issues in this pull request:

Mode: paranoid | Total findings: 9 | Considered vulnerability: 9

Vulnerable Libraries (9)
Severity | Details ----- | -------- N/A | [pkg:golang/golang.org/x/crypto@v0.0.0-20210921155107-089bfa567519 @v0.0.0-20210921155107-089bfa567519 ](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.sum#L290) upgrade to: *0.0.0-20220314234659-1baeb1ce4c0b* N/A | [pkg:golang/golang.org/x/net@v0.0.0-20220722155237-a158d28d115b@v0.0.0-20220722155237-a158d28d115b](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.sum#L349) upgrade to: *1.19.6,1.20.1,0.7.0* N/A | [pkg:golang/golang.org/x/net@v0.0.0-20220722155237-a158d28d115b@v0.0.0-20220722155237-a158d28d115b](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.mod#L55) upgrade to: *1.19.6,1.20.1,0.7.0* N/A | [pkg:golang/golang.org/x/net@v0.0.0-20220722155237-a158d28d115b @v0.0.0-20220722155237-a158d28d115b ](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.sum#L349) upgrade to: *1.19.6,1.20.1,0.7.0* N/A | [pkg:golang/golang.org/x/crypto@0.0.0-20210921155107-089bfa567519@0.0.0-20210921155107-089bfa567519](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.mod#L54) upgrade to: *0.0.0-20220314234659-1baeb1ce4c0b* N/A | [pkg:golang/golang.org/x/net@0.0.0-20220722155237-a158d28d115b@0.0.0-20220722155237-a158d28d115b](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.mod#L55) upgrade to: *1.19.6,1.20.1,0.7.0* High | [pkg:golang/golang.org/x/text@v0.3.7@v0.3.7](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.sum#L413) - **no patch available** Medium | [pkg:golang/golang.org/x/crypto@v0.0.0-20210921155107-089bfa567519@v0.0.0-20210921155107-089bfa567519](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.sum#L290) - **no patch available** Medium | [pkg:golang/golang.org/x/crypto@v0.0.0-20210921155107-089bfa567519@v0.0.0-20210921155107-089bfa567519](https://github.com/turkdevops/play-with-docker/blob/81c780e67e6888ff748ff267790e61167f7124f7/go.mod#L54) - **no patch available** More info on how to fix Vulnerable Libraries in [Go](https://docs.guardrails.io/docs/en/vulnerabilities/go/using_vulnerable_libraries.html?utm_source=ghpr).

👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.