Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: change exception for gosec linter #600

Merged
merged 1 commit into from
Feb 20, 2025

Conversation

morri-son
Copy link
Contributor

Description

change exception for gosec linter

@morri-son morri-son requested a review from a team as a code owner February 20, 2025 15:08
@morri-son morri-son changed the title change exception for gosec linter chore: change exception for gosec linter Feb 20, 2025
@morri-son morri-son added area/ipcei Important Project of Common European Interest kind/chore chore, maintenance, etc. labels Feb 20, 2025
@morri-son morri-son added this to the 2025-Q1 milestone Feb 20, 2025
Copy link

Mend Scan Summary: ❌

Repository: open-component-model/ocm-controller

VIOLATION DESCRIPTION NUMBER OF VIOLATIONS
HIGH/CRITICAL SECURITY VULNERABILITIES 2
MAJOR UPDATES AVAILABLE 0
LICENSE REQUIRES REVIEW 1
LICENSE RISK HIGH 9
RESTRICTED LICENSE FOR ON-PREMISE DELIVERY 0

Detailed Logs: mend-scan-> Generate Report
Mend UI

@@ -2,7 +2,7 @@

const (
// DefaultRegistryCertificateSecretName is the name of the of certificate secret for client and registry.
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // nolint:gosec // not a credential
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 // not a credential

Check failure

Code scanning / gosec

Potential hardcoded credentials Error

Potential hardcoded credentials
@@ -35,5 +35,5 @@
// Ocm credential config key for secrets.
const (
// OCMCredentialConfigKey defines the secret key to look for in case a user provides an ocm credential config.
OCMCredentialConfigKey = ".ocmcredentialconfig" // nolint:gosec // it isn't a cred
OCMCredentialConfigKey = ".ocmcredentialconfig" // #nosec G101 // not a credential

Check failure

Code scanning / gosec

Potential hardcoded credentials Error

Potential hardcoded credentials
@@ -143,8 +143,7 @@
}

func (c *Client) constructTLSRoundTripper() http.RoundTripper {
// nolint:gosec // must provide lower version for quay.io
tlsConfig := &tls.Config{}
tlsConfig := &tls.Config{} // #nosec G402 // must provide lower version for quay.io

Check failure

Code scanning / gosec

TLS MinVersion too low. Error

TLS MinVersion too low.
@@ -2,7 +2,7 @@

const (
// DefaultRegistryCertificateSecretName is the name of the of certificate secret for client and registry.
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // nolint:gosec // not a credential
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 // not a credential

Check failure

Code scanning / CodeQL

Hard-coded credentials Critical

Hard-coded
secret
.
@morri-son morri-son merged commit 615eb2b into main Feb 20, 2025
9 of 12 checks passed
@morri-son morri-son deleted the change-exception-for-gosec-linter branch February 20, 2025 15:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/ipcei Important Project of Common European Interest kind/chore chore, maintenance, etc.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants