Skip to content

Commit 551a7ba

Browse files
committed
Merge remote-tracking branch 'origin' into poetry-dev-deps-2
2 parents dc14db8 + e6d0ba5 commit 551a7ba

File tree

38 files changed

+2035
-778
lines changed

38 files changed

+2035
-778
lines changed

.github/workflows/auto-update-labels.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ on:
66
branches:
77
- main
88
env:
9-
GO_VERSION: '1.22'
9+
GO_VERSION: '1.23'
1010
jobs:
1111
deploy:
1212
name: Auto-update labels

.github/workflows/reusable-release.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ on:
1414

1515
env:
1616
GH_USER: "aqua-bot"
17-
GO_VERSION: '1.22'
17+
GO_VERSION: '1.23'
1818

1919
jobs:
2020
release:

.github/workflows/test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ on:
1212
workflow_dispatch:
1313

1414
env:
15-
GO_VERSION: '1.22'
15+
GO_VERSION: '1.23'
1616
jobs:
1717
test:
1818
name: Test

.golangci.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ linters:
121121
- usestdlibvars
122122

123123
run:
124-
go: '1.22'
124+
go: '1.23'
125125
timeout: 30m
126126

127127
issues:

.vex/trivy.openvex.json

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -570,6 +570,35 @@
570570
"status": "not_affected",
571571
"justification": "vulnerable_code_not_in_execute_path",
572572
"impact_statement": "Govulncheck determined that the vulnerable code isn't called"
573+
},
574+
{
575+
"vulnerability": {
576+
"@id": "https://pkg.go.dev/vuln/GO-2024-3333",
577+
"name": "GO-2024-3333",
578+
"description": "Non-linear parsing of case-insensitive content in golang.org/x/net/html",
579+
"aliases": [
580+
"CVE-2024-45338"
581+
]
582+
},
583+
"products": [
584+
{
585+
"@id": "pkg:golang/github.com/aquasecurity/trivy",
586+
"identifiers": {
587+
"purl": "pkg:golang/github.com/aquasecurity/trivy"
588+
},
589+
"subcomponents": [
590+
{
591+
"@id": "pkg:golang/golang.org/x/net",
592+
"identifiers": {
593+
"purl": "pkg:golang/golang.org/x/net"
594+
}
595+
}
596+
]
597+
}
598+
],
599+
"status": "not_affected",
600+
"justification": "vulnerable_code_not_in_execute_path",
601+
"impact_statement": "Govulncheck determined that the vulnerable code isn't called"
573602
}
574603
]
575604
}

Dockerfile.protoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM --platform=linux/amd64 golang:1.22
1+
FROM --platform=linux/amd64 golang:1.23
22

33
# Set environment variable for protoc
44
ENV PROTOC_ZIP=protoc-3.19.4-linux-x86_64.zip

aqua.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@ registries:
55
- type: standard
66
ref: v3.157.0 # renovate: depName=aquaproj/aqua-registry
77
packages:
8-
- name: tinygo-org/tinygo@v0.31.1
8+
- name: tinygo-org/tinygo@v0.33.0
99
- name: WebAssembly/binaryen@version_112
1010
- name: magefile/[email protected]

docs/docs/configuration/reporting.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,7 @@ The following languages are currently supported:
5858
| | [yarn.lock][yarn-lock] |
5959
| .NET | [packages.lock.json][dotnet-packages-lock] |
6060
| Python | [poetry.lock][poetry-lock] |
61+
| | [uv.lock][uv-lock] |
6162
| Ruby | [Gemfile.lock][gemfile-lock] |
6263
| Rust | [cargo-auditable binaries][cargo-binaries] |
6364
| Go | [go.mod][go-mod] |
@@ -449,6 +450,7 @@ $ trivy convert --format table --severity CRITICAL result.json
449450
[yarn-lock]: ../coverage/language/nodejs.md#yarn
450451
[dotnet-packages-lock]: ../coverage/language/dotnet.md#packageslockjson
451452
[poetry-lock]: ../coverage/language/python.md#poetry
453+
[uv-lock]: ../coverage/language/python.md#uv
452454
[gemfile-lock]: ../coverage/language/ruby.md#bundler
453455
[go-mod]: ../coverage/language/golang.md#go-module
454456
[composer-lock]: ../coverage/language/php.md#composerlock

docs/docs/coverage/language/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ On the other hand, when the target is a post-build artifact, like a container im
2222
| | gemspec ||| - | - |
2323
| [Python](python.md) | Pipfile.lock | - | - |||
2424
| | poetry.lock | - | - |||
25+
| | uv.lock | - | - |||
2526
| | requirements.txt | - | - |||
2627
| | egg package[^1] ||| - | - |
2728
| | wheel package[^2] ||| - | - |

docs/docs/coverage/language/python.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ The following scanners are supported for package managers.
88
| pip ||||
99
| Pipenv ||| - |
1010
| Poetry ||| - |
11+
| uv ||| - |
1112

1213
In addition, Trivy supports three formats of Python packages: `egg`, `wheel` and `conda`.
1314
The following scanners are supported for Python packages.
@@ -26,6 +27,7 @@ The following table provides an outline of the features Trivy offers.
2627
| pip | requirements.txt | - | Include | - |||
2728
| Pipenv | Pipfile.lock || Include | - || Not needed |
2829
| Poetry | poetry.lock || Include || - | Not needed |
30+
| uv | uv.lock || Exclude || - | Not needed |
2931

3032

3133
| Packaging | Dependency graph |
@@ -126,6 +128,11 @@ To build the correct dependency graph, `pyproject.toml` also needs to be present
126128

127129
License detection is not supported for `Poetry`.
128130

131+
### uv
132+
Trivy uses `uv.lock` to identify dependencies and find vulnerabilities.
133+
134+
License detection is not supported for `uv`.
135+
129136
## Packaging
130137
Trivy parses the manifest files of installed packages in container image scanning and so on.
131138
See [here](https://packaging.python.org/en/latest/discussions/package-formats/) for the detail.

0 commit comments

Comments
 (0)