Code Monkey home page Code Monkey logo

certinel's Issues

Error installing certinal

Following the installation directions I'm confronted with:

bin % go get -u github.com/jteeuwen/go-bindata/...
bin % go get github.com/drtoful/certinel
# github.com/drtoful/certinel/app
../src/github.com/drtoful/certinel/app/http.go:153:15: undefined: Asset

pretty new to golang so I can't really troubleshoot this as much as I normally would before filing an issue.

any help would be appreciated.

trying to install on:
go version go1.11.1 linux/amd64
ubuntu 16.04

govulncheck vulnerabilities detected

I ran govulncheck on this app today because we use it in production, and have found that it's got a vulnerability in a dependency that should be fairly trivial to fix by upgrading dependencies.

$ govulncheck .
Scanning your code and 201 packages across 16 dependent modules for known vulnerabilities...

Vulnerability #1: GO-2022-0322
    Uncontrolled resource consumption in github.com/prometheus/client_golang
  More info: https://pkg.go.dev/vuln/GO-2022-0322
  Module: github.com/prometheus/client_golang
    Found in: github.com/prometheus/[email protected]
    Fixed in: github.com/prometheus/[email protected]
    Example traces found:
      #1: app/metrics.go:70:69: app.providerPrometheus.GetRouter calls promhttp.Handler
      #2: app/domain.go:368:73: app.CheckDomain calls bolt.panicked.Error, which eventually calls promhttp.responseWriterDelegator.Write
      #3: app/domain.go:368:73: app.CheckDomain calls bolt.panicked.Error, which eventually calls promhttp.responseWriterDelegator.WriteHeader
      #4: app/http.go:175:7: app.StartAPIServer calls negroni.Negroni.Run, which eventually calls promhttp.sanitizeMethod

=== Informational ===

Found 1 vulnerability in packages that you import, but there are no call
stacks leading to the use of this vulnerability. You may not need to
take any action. See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck
for details.

Vulnerability #1: GO-2022-0493
    Incorrect privilege reporting in syscall and golang.org/x/sys/unix
  More info: https://pkg.go.dev/vuln/GO-2022-0493
  Module: golang.org/x/sys
    Found in: golang.org/x/[email protected]
    Fixed in: golang.org/x/[email protected]

Your code is affected by 1 vulnerability from 1 module.

Share feedback at https://go.dev/s/govulncheck-feedback.```

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.