Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Nov 3, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/prometheus/common v0.67.1 -> v0.67.4 age confidence

Release Notes

prometheus/common (github.com/prometheus/common)

v0.67.4: / 2025-11-18

Compare Source

What's Changed

Full Changelog: prometheus/common@v0.67.3...v0.67.4

v0.67.3: / 2025-11-18

Compare Source

What's Changed

New Contributors

Full Changelog: prometheus/common@v0.67.2...v0.67.3

v0.67.2

Compare Source


Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) in timezone America/Los_Angeles, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Nov 3, 2025
@renovate renovate bot requested a review from a team as a code owner November 3, 2025 10:51
@renovate renovate bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Nov 3, 2025
@renovate renovate bot enabled auto-merge (squash) November 3, 2025 10:51
@renovate
Copy link
Contributor Author

renovate bot commented Nov 3, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.42.0 -> v0.43.0
golang.org/x/net v0.44.0 -> v0.46.0
golang.org/x/oauth2 v0.31.0 -> v0.32.0
golang.org/x/sys v0.36.0 -> v0.37.0
golang.org/x/text v0.29.0 -> v0.30.0

@renovate renovate bot force-pushed the renovate/github.com-prometheus-common-0.x branch from 8b3e172 to c0e4795 Compare November 10, 2025 10:44
@renovate renovate bot changed the title Update module github.com/prometheus/common to v0.67.2 Update module github.com/prometheus/common to v0.67.3 Nov 18, 2025
@renovate renovate bot force-pushed the renovate/github.com-prometheus-common-0.x branch from c0e4795 to 113a91b Compare November 18, 2025 18:36
| datasource | package                      | from    | to      |
| ---------- | ---------------------------- | ------- | ------- |
| go         | github.com/prometheus/common | v0.67.1 | v0.67.4 |


Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot changed the title Update module github.com/prometheus/common to v0.67.3 Update module github.com/prometheus/common to v0.67.4 Nov 21, 2025
@renovate renovate bot force-pushed the renovate/github.com-prometheus-common-0.x branch from 113a91b to affe518 Compare November 21, 2025 14:46
@github-actions
Copy link

Dependency Review

The following issues were found:
  • ❌ 1 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 5 package(s) with unknown licenses.
See the Details below.

Vulnerabilities

go.mod

NameVersionVulnerabilitySeverity
golang.org/x/crypto0.43.0golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumptionmoderate
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds readmoderate

License Issues

go.mod

PackageVersionLicenseIssue Type
golang.org/x/crypto0.43.0NullUnknown License
golang.org/x/net0.46.0NullUnknown License
golang.org/x/oauth20.32.0NullUnknown License
golang.org/x/sys0.37.0NullUnknown License
golang.org/x/text0.30.0NullUnknown License
Allowed Licenses: Apache-1.1, Apache-2.0, BSD-2-Clause, BSD-3-Clause, BSL-1.0, ISC, MIT, NCSA, OpenSSL, Python-2.0, X11, CC0-1.0, CC-BY-4.0
Excluded from license check: pkg:githubactions/fossas/fossa-action, pkg:githubactions/opentofu/setup-opentofu, pkg:golang/github.com/shoenig/go-m1cpu, pkg:pypi/pytest-metadata

OpenSSF Scorecard

PackageVersionScoreDetails
gomod/golang.org/x/crypto 0.43.0 UnknownUnknown
gomod/github.com/golang-jwt/jwt/v5 5.3.0 🟢 6.9
Details
CheckScoreReason
Maintained🟢 97 commit(s) and 4 issue activity found in the last 90 days -- score normalized to 9
Code-Review🟢 8Found 18/21 approved changesets -- score normalized to 8
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Security-Policy🟢 10security policy file detected
Binary-Artifacts🟢 10no binaries found in the repo
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 1dependency not pinned by hash detected -- score normalized to 1
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 9SAST tool detected but not run on all commits
gomod/github.com/google/uuid 1.6.0 🟢 7.2
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained⚠️ 00 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Packaging⚠️ -1packaging workflow not detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Binary-Artifacts🟢 10no binaries found in the repo
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Security-Policy🟢 10security policy file detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/prometheus/common 0.67.4 🟢 8.9
Details
CheckScoreReason
Security-Policy🟢 9security policy file detected
Code-Review🟢 10all changesets reviewed
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Maintained🟢 1030 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Pinned-Dependencies🟢 10all dependencies are pinned
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 10SAST tool is run on all commits
gomod/golang.org/x/net 0.46.0 UnknownUnknown
gomod/golang.org/x/oauth2 0.32.0 UnknownUnknown
gomod/golang.org/x/sys 0.37.0 UnknownUnknown
gomod/golang.org/x/text 0.30.0 UnknownUnknown

Scanned Files

  • go.mod

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants