-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: add unit tests, integration tests, coverage and documentation #32
Conversation
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
Signed-off-by: Ilona Shishov <[email protected]>
docs: Reviewed README, made edits, and added a CHANGELOG
Signed-off-by: Ilona Shishov <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Red Hat Dependency Analytics found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.
go 1.22 | ||
|
||
require ( | ||
golang.org/x/net v0.10.0 // indirect |
Check failure
Code scanning / Red Hat Dependency Analytics
HIGH severity - HTTP/2 rapid reset can cause excessive work in net/http vulnerability Error
Vulnerability data provider is osv.
Vulnerability data source is osv.
Vulnerable dependency is golang.org/x/net version v0.10.0.
go 1.22 | ||
|
||
require ( | ||
golang.org/x/net v0.10.0 // indirect |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - Improper rendering of text nodes in golang.org/x/net/html vulnerability Warning
Vulnerability data provider is osv.
Vulnerability data source is osv.
Vulnerable dependency is golang.org/x/net version v0.10.0.
go 1.22 | ||
|
||
require ( | ||
golang.org/x/net v0.10.0 // indirect |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - net/http, x/net/http2: close connections when receiving too many headers vulnerability Warning
Vulnerability data provider is osv.
Vulnerability data source is osv.
Vulnerable dependency is golang.org/x/net version v0.10.0.
go 1.22 | ||
|
||
require ( | ||
golang.org/x/net v0.10.0 // indirect |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - HTTP/2 Stream Cancellation Attack vulnerability Warning
Vulnerability data provider is osv.
Vulnerability data source is osv.
Vulnerable dependency is golang.org/x/net version v0.10.0.
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check failure
Code scanning / Red Hat Dependency Analytics
CRITICAL severity - NPM IP package incorrectly identifies some private IP addresses as public vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check failure
Code scanning / Red Hat Dependency Analytics
HIGH severity - Inefficient Regular Expression Complexity in chalk/ansi-regex vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check failure
Code scanning / Red Hat Dependency Analytics
HIGH severity - Inefficient Regular Expression Complexity in chalk/ansi-regex vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check failure
Code scanning / Red Hat Dependency Analytics
HIGH severity - http-cache-semantics vulnerable to Regular Expression Denial of Service vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - Denial of service while parsing a tar file due to lack of folders count validation vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - Server-Side Request Forgery in Request vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - Mercurial Path Traversal/Link Following vulnerability vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - Got allows a redirect to a UNIX socket vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest | |||
FROM node:14 |
Check warning
Code scanning / Red Hat Dependency Analytics
MEDIUM severity - semver vulnerable to Regular Expression Denial of Service vulnerability
@@ -0,0 +1,2 @@ | |||
FROM --platform=linux/amd64 ubuntu:latest |
Check notice
Code scanning / Red Hat Dependency Analytics
Red Hat recommendation
4e9ad1e
to
14d95ff
Compare
14d95ff
to
45d7616
Compare
Signed-off-by: Ilona Shishov <[email protected]>
45d7616
to
48bb794
Compare
1e8421c
to
b073a37
Compare
Signed-off-by: Ilona Shishov <[email protected]>
b073a37
to
4e9bb13
Compare
Signed-off-by: Ilona Shishov <[email protected]>
No description provided.