Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency pulumi/pulumi to v3.135.0 #7467

Merged
merged 1 commit into from
Oct 2, 2024

Conversation

uniget-bot
Copy link

This PR contains the following updates:

Package Update Change
pulumi/pulumi minor 3.134.1 -> 3.135.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

pulumi/pulumi (pulumi/pulumi)

v3.135.0

Compare Source

Features
  • [backend/{diy,service}] Send secrets managers as initial state when creating stacks
    #​17387

  • [sdk/python] Search upwards for pyproject.toml when using Poetry
    #​17388

Bug Fixes
  • [cli/config] Improve usage string for config env add/rm commands
    #​17407

  • [cli/new] Check zipped templates for Pulumi.yaml files
    #​17437

  • [engine] Disable the enviromental GITHUB_TOKEN on 401 responses
    #​17351

  • [engine] Fix a panic when multiple component provider construct calls fail
    #​17439

  • [sdkgen/go] Fix nested string map map map properties
    #​17417

  • [sdk/nodejs] Fix dependency installation for nodejs projects with a main property
    #​17391

  • [sdk/python] Add missing package_ref paramater to ProviderResource
    #​17432

Miscellaneous
  • [sdkgen] Validate schema version is provided when package supports packing
    #​17420

  • [sdk/python] Replace asyncio.ensure_future with create_task
    #​17406

  • [sdkgen/{nodejs,python}] Bump minimum valid SDK version to v3.134.1 so that output-invokes work and maintain secrets
    #​17390


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

Copy link

github-actions bot commented Oct 2, 2024

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/pulumi:3.135.0

📦 Image Reference ghcr.io/uniget-org/tools/pulumi:3.135.0
digestsha256:b091d4aec3940eab93fdcb1cf1443c1c0454b53ea849ce6c56936888e4967380
vulnerabilitiescritical: 1 high: 0 medium: 1 low: 1
platformlinux/amd64
size164 MB
packages261
critical: 1 high: 0 medium: 0 low: 0 github.com/moby/moby 25.0.4+incompatible (golang)

pkg:golang/github.com/moby/[email protected]+incompatible

critical : CVE--2024--41110

Affected range>=20.10.0+incompatible
<25.0.6+incompatible
Fixed version25.0.6+incompatible
Description

Moby authz zero length regression in github.com/moby/moby

critical: 0 high: 0 medium: 1 low: 1 github.com/aws/aws-sdk-go 1.50.36 (golang)

pkg:golang/github.com/aws/[email protected]

medium : CVE--2020--8911

Affected range>=0
Fixed versionNot Fixed
Description

The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker with write access to a bucket to decrypt files in that bucket.

Files encrypted by the V1 EncryptionClient using either the AES-CBC content cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the V1 EncryptionClientV2 API, which will not create vulnerable files. Old files will remain vulnerable until re-encrypted with the new client.

low : CVE--2020--8912

Affected range>=0
Fixed versionNot Fixed
Description

The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker with write access to a bucket to decrypt files in that bucket.

Files encrypted by the V1 EncryptionClient using either the AES-CBC content cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the V1 EncryptionClientV2 API, which will not create vulnerable files. Old files will remain vulnerable until re-encrypted with the new client.

Copy link

github-actions bot commented Oct 2, 2024

Copy link

github-actions bot commented Oct 2, 2024

PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/11139793073.

@github-actions github-actions bot merged commit a537de6 into main Oct 2, 2024
9 of 10 checks passed
@github-actions github-actions bot deleted the renovate/pulumi-pulumi-3.x branch October 2, 2024 07:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants