Skip to content
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,31 @@
# v2.3.2

This release includes performance improvements for local scanning, reducing memory usage and avoiding unnecessary advisory loading. It also fixes issues with MCP type enforcement, git queries in `osv-scanner.json`, and ignore entry tracking, along with documentation updates.

### Features:

- [Feature #2415](https://github.com/google/osv-scanner/pull/2415) Add more PURL-to-ecosystem mappings

### Fixes:

- [Bug #2422](https://github.com/google/osv-scanner/pull/2422) MCP error because types are not enforced.
- [Bug #2460](https://github.com/google/osv-scanner/pull/2460) Update osv-scanner.json git queries
- [Bug #2456](https://github.com/google/osv-scanner/pull/2456) Properly track if an ignore entry has been used
- [Bug #2459](https://github.com/google/osv-scanner/pull/2459) Update dependencies
- [Bug #2450](https://github.com/google/osv-scanner/pull/2450) **Performance:** Avoid loading the entire advisory unless it will actually be used
- [Bug #2445](https://github.com/google/osv-scanner/pull/2445) **Performance:** Don't read the entire zip into memory
- [Bug #2433](https://github.com/google/osv-scanner/pull/2433) Allow specifying user agent in v2 osvscanner package

### Misc:

- [Misc #2457](https://github.com/google/osv-scanner/pull/2457) Document data sources and external services
- [Misc #2451](https://github.com/google/osv-scanner/pull/2451) Always use a unique directory for local advisory cases
- [Misc #2453](https://github.com/google/osv-scanner/pull/2453) Switch from gopkg.in/yaml.v3 to go.yaml.in/yaml/v3
- [Misc #2447](https://github.com/google/osv-scanner/pull/2447) Include `bun.lock` as a supported lockfile
- [Misc #2444](https://github.com/google/osv-scanner/pull/2444) Document GoVersionOverride in configuration.md
- [Misc #2437](https://github.com/google/osv-scanner/pull/2437) Update OSV scanner reusable workflow references to v2.3.1
- [Misc #2408](https://github.com/google/osv-scanner/pull/2408) Have vulnerable Drupal contrib module

# v2.3.1

### Features:
Expand Down
2 changes: 1 addition & 1 deletion cmd/osv-scanner/__snapshots__/main_test.snap
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ OPTIONS:
---

[Test_run/version - 1]
osv-scanner version: 2.3.1
osv-scanner version: 2.3.2
osv-scalibr version: 0.4.1
commit: n/a
built at: n/a
Expand Down
6 changes: 3 additions & 3 deletions cmd/osv-scanner/scan/source/__snapshots__/command_test.snap
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ Loaded filter from: <rootdir>/testdata/locks-many/osv-scanner-test.toml
"rules": [],
"supportedTaxonomies": [],
"taxa": [],
"version": "2.3.1"
"version": "2.3.2"
},
"extensions": []
},
Expand Down Expand Up @@ -365,7 +365,7 @@ Total 2 packages affected by 7 known vulnerabilities (3 Critical, 4 High, 0 Medi
],
"supportedTaxonomies": [],
"taxa": [],
"version": "2.3.1"
"version": "2.3.2"
},
"extensions": []
},
Expand Down Expand Up @@ -3004,7 +3004,7 @@ Total 1 package affected by 2 known vulnerabilities (0 Critical, 2 High, 0 Mediu
],
"supportedTaxonomies": [],
"taxa": [],
"version": "2.3.1"
"version": "2.3.2"
},
"extensions": []
},
Expand Down
14 changes: 7 additions & 7 deletions docs/github-action.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ permissions:

jobs:
scan-pr:
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@v2.3.2"
```

### View results
Expand Down Expand Up @@ -97,7 +97,7 @@ permissions:

jobs:
scan-scheduled:
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.2"
```

As written, the scanner will run on 12:30 pm UTC every Monday, and also on every push to the main branch. You can change the schedule by following the instructions [here](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#schedule).
Expand Down Expand Up @@ -132,7 +132,7 @@ permissions:

jobs:
osv-scan:
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@v2.3.2"
with:
# Only scan the top level go.mod file without recursively scanning directories since
# this is pipeline is about releasing the go module and binary
Expand Down Expand Up @@ -184,7 +184,7 @@ Examples
```yml
jobs:
scan-pr:
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.2"
with:
scan-args: |-
--lockfile=./path/to/lockfile1
Expand All @@ -196,7 +196,7 @@ jobs:
```yml
jobs:
scan-pr:
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.2"
with:
scan-args: |-
--recursive
Expand All @@ -222,7 +222,7 @@ jobs:
name: Vulnerability scanning
# makes sure the extraction step is completed before running the scanner
needs: extract-deps
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.1"
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@v2.3.2"
with:
# Download the artifact uploaded in extract-deps step
download-artifact: converted-OSV-Scanner-deps
Expand Down Expand Up @@ -272,7 +272,7 @@ jobs:
{target_arch: armhf},
{target_arch: aarch64}
]
uses: "extract/osv-scanner/.github/workflows/osv-scanner-reusable.yml@v2.3.1"
uses: "extract/osv-scanner/.github/workflows/osv-scanner-reusable.yml@v2.3.2"
with:
download-artifact: "${{ matrix.platform.target_arch }}-OSV-Scanner-deps"
matrix-property: "${{ matrix.platform.target_arch }}-"
Expand Down
Loading
Loading