Skip to content

test new format #nosec [RuleList] [-- Justification]#601

Merged
morri-son merged 1 commit intomainfrom
gosec
Feb 20, 2025
Merged

test new format #nosec [RuleList] [-- Justification]#601
morri-son merged 1 commit intomainfrom
gosec

Conversation

@morri-son
Copy link
Contributor

Description

test new format #nosec [RuleList] [-- Justification]

@morri-son morri-son requested a review from a team as a code owner February 20, 2025 15:40
@morri-son morri-son enabled auto-merge (squash) February 20, 2025 15:40
@github-actions
Copy link

Mend Scan Summary: ❌

Repository: open-component-model/ocm-controller

VIOLATION DESCRIPTION NUMBER OF VIOLATIONS
HIGH/CRITICAL SECURITY VULNERABILITIES 2
MAJOR UPDATES AVAILABLE 0
LICENSE REQUIRES REVIEW 1
LICENSE RISK HIGH 9
RESTRICTED LICENSE FOR ON-PREMISE DELIVERY 0

Detailed Logs: mend-scan-> Generate Report
Mend UI

const (
// DefaultRegistryCertificateSecretName is the name of the of certificate secret for client and registry.
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 // not a credential
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 -- not a credential

Check failure

Code scanning / gosec

Potential hardcoded credentials Error

Potential hardcoded credentials
const (
// OCMCredentialConfigKey defines the secret key to look for in case a user provides an ocm credential config.
OCMCredentialConfigKey = ".ocmcredentialconfig" // #nosec G101 // not a credential
OCMCredentialConfigKey = ".ocmcredentialconfig" // #nosec G101 -- not a credential

Check failure

Code scanning / gosec

Potential hardcoded credentials Error

Potential hardcoded credentials

func (c *Client) constructTLSRoundTripper() http.RoundTripper {
tlsConfig := &tls.Config{} // #nosec G402 // must provide lower version for quay.io
tlsConfig := &tls.Config{} // #nosec G402 -- must provide lower version for quay.io

Check failure

Code scanning / gosec

TLS MinVersion too low. Error

TLS MinVersion too low.
const (
// DefaultRegistryCertificateSecretName is the name of the of certificate secret for client and registry.
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 // not a credential
DefaultRegistryCertificateSecretName = "ocm-registry-tls-certs" // #nosec G101 -- not a credential

Check failure

Code scanning / CodeQL

Hard-coded credentials Critical

Hard-coded
secret
.
@morri-son morri-son merged commit 261d931 into main Feb 20, 2025
9 of 12 checks passed
@morri-son morri-son deleted the gosec branch February 20, 2025 15:47
@ocmbot ocmbot bot added this to the 2025-Q1 milestone Feb 20, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants