Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Oct 6, 2025

Bumps google.golang.org/api from 0.235.0 to 0.251.0.

Release notes

Sourced from google.golang.org/api's releases.

v0.251.0

0.251.0 (2025-09-30)

Features

v0.250.0

0.250.0 (2025-09-25)

Features

v0.249.0

0.249.0 (2025-09-08)

Features

... (truncated)

Changelog

Sourced from google.golang.org/api's changelog.

0.251.0 (2025-09-30)

Features

0.250.0 (2025-09-25)

Features

0.249.0 (2025-09-08)

Features

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.235.0 to 0.251.0.
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](googleapis/google-api-go-client@v0.235.0...v0.251.0)

---
updated-dependencies:
- dependency-name: google.golang.org/api
  dependency-version: 0.251.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 6, 2025
@dependabot dependabot bot requested a review from a team as a code owner October 6, 2025 21:10
@dependabot dependabot bot added go Pull requests that update go code dependencies Pull requests that update a dependency file labels Oct 6, 2025
Copy link

github-actions bot commented Oct 6, 2025

Lacework Code Security

When a Pull Request in a repository is submitted, the Lacework FortiCNAPP runs scans on both the source and target branches and compares the results to identify any issues / vulnerabilities which will be introduced by the source branch.
See summary in Lacework FortiCNAPP

Internal Code - Found 1 new potential issue(s) - Severity: 🟡 Low

Expand Details

The Lacework FortiCNAPP Static application security testing (SAST) scanner detected the following issues in internal code changes for the source branch.

Issue Description Location Severity
Incorrect Error Checking
CWE-253
Detected incorrect error-checking logic resumable.go#L300-L314
vendor/google.golang.org/api/internal/gensupport/
🟡 Low

Copy link

Infrastructure as Code - Found 2 new potential violation(s) - Severity 🟡 Low

Expand Details

The Lacework FortiCNAPP Infrastructure as Code (IaC) static analyzer evaluated infrastructure as code (IaC) files and identified the following security and compliance violations in the source branch. See summary in Lacework FortiCNAPP.

Violation Description Location Severity
Ensure that HEALTHCHECK instructions have been added to container images Add HEALTHCHECK instruction in your docker container images to perform the health check on running containers. dependencies.Dockerfile#L1-4
vendor/go.opentelemetry.io/otel/
🟡 Low
Ensure that a user for the container has been created Create a non-root user for the container in the Dockerfile for the container image. dependencies.Dockerfile#L1-4
vendor/go.opentelemetry.io/otel/
🟡 Low

Copy link

Lacework Code Security

When a Pull Request in a repository is submitted, the Lacework FortiCNAPP runs scans on both the source and target branches and compares the results to identify any issues / vulnerabilities which will be introduced by the source branch.

Internal Code - Found 1 new potential issue(s) - Severity: 🟡 Low

Expand Details

The Lacework FortiCNAPP Static application security testing (SAST) scanner detected the following issues in internal code changes for the source branch.

Issue Description Location Severity
Incorrect Error Checking
CWE-253
Detected incorrect error-checking logic resumable.go#L300-L314
vendor/google.golang.org/api/internal/gensupport/
🟡 Low

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants