2018-11-16 16:32:19 +00:00
|
|
|
module github.com/prometheus/alertmanager
|
|
|
|
|
2023-11-06 13:16:57 +00:00
|
|
|
go 1.21
|
2022-07-23 14:56:26 +00:00
|
|
|
|
2018-11-16 16:32:19 +00:00
|
|
|
require (
|
2024-01-04 11:38:01 +00:00
|
|
|
github.com/alecthomas/kingpin/v2 v2.4.0
|
2021-12-17 15:24:43 +00:00
|
|
|
github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137
|
2024-05-07 12:45:44 +00:00
|
|
|
github.com/aws/aws-sdk-go v1.52.3
|
2023-08-08 10:14:17 +00:00
|
|
|
github.com/benbjohnson/clock v1.3.5
|
2024-05-01 15:38:21 +00:00
|
|
|
github.com/cenkalti/backoff/v4 v4.3.0
|
2022-12-09 13:58:40 +00:00
|
|
|
github.com/cespare/xxhash/v2 v2.2.0
|
2022-07-25 14:54:08 +00:00
|
|
|
github.com/go-kit/log v0.2.1
|
2024-05-01 15:38:37 +00:00
|
|
|
github.com/go-openapi/analysis v0.23.0
|
2024-04-29 12:29:11 +00:00
|
|
|
github.com/go-openapi/errors v0.22.0
|
2024-05-01 15:38:37 +00:00
|
|
|
github.com/go-openapi/loads v0.22.0
|
|
|
|
github.com/go-openapi/runtime v0.28.0
|
|
|
|
github.com/go-openapi/spec v0.21.0
|
2024-04-29 12:29:11 +00:00
|
|
|
github.com/go-openapi/strfmt v0.23.0
|
2024-05-01 15:38:37 +00:00
|
|
|
github.com/go-openapi/swag v0.23.0
|
|
|
|
github.com/go-openapi/validate v0.24.0
|
2023-02-01 15:04:26 +00:00
|
|
|
github.com/gofrs/uuid v4.4.0+incompatible
|
2021-02-09 15:49:07 +00:00
|
|
|
github.com/gogo/protobuf v1.3.2
|
2023-12-01 15:28:36 +00:00
|
|
|
github.com/hashicorp/go-sockaddr v1.0.6
|
2023-11-01 15:44:32 +00:00
|
|
|
github.com/hashicorp/golang-lru/v2 v2.0.7
|
2024-04-25 16:39:34 +00:00
|
|
|
github.com/hashicorp/memberlist v0.5.1
|
2021-04-22 08:20:26 +00:00
|
|
|
github.com/jessevdk/go-flags v1.5.0
|
2020-05-18 13:00:36 +00:00
|
|
|
github.com/kylelemons/godebug v1.1.0
|
2022-11-01 15:09:50 +00:00
|
|
|
github.com/matttproud/golang_protobuf_extensions v1.0.4
|
2020-05-18 13:00:36 +00:00
|
|
|
github.com/oklog/run v1.1.0
|
2019-08-22 10:04:38 +00:00
|
|
|
github.com/oklog/ulid v1.3.1
|
2024-03-14 12:45:22 +00:00
|
|
|
github.com/prometheus/client_golang v1.19.0
|
2024-05-02 10:32:30 +00:00
|
|
|
github.com/prometheus/common v0.52.3
|
2023-02-28 11:54:30 +00:00
|
|
|
github.com/prometheus/common/assets v0.2.0
|
2021-06-23 14:00:47 +00:00
|
|
|
github.com/prometheus/common/sigv4 v0.1.0
|
2024-01-05 13:52:14 +00:00
|
|
|
github.com/prometheus/exporter-toolkit v0.11.0
|
2024-05-01 15:38:42 +00:00
|
|
|
github.com/rs/cors v1.11.0
|
2019-08-22 10:04:38 +00:00
|
|
|
github.com/shurcooL/httpfs v0.0.0-20190707220628-8d4bc4ba7749
|
2021-03-10 18:00:22 +00:00
|
|
|
github.com/shurcooL/vfsgen v0.0.0-20200824052919-0d455de96546
|
2024-04-29 12:29:11 +00:00
|
|
|
github.com/stretchr/testify v1.9.0
|
2023-09-04 08:23:17 +00:00
|
|
|
github.com/xlab/treeprint v1.2.0
|
2023-06-01 15:58:26 +00:00
|
|
|
go.uber.org/atomic v1.11.0
|
2024-04-25 16:39:48 +00:00
|
|
|
golang.org/x/mod v0.17.0
|
dep: Manually upgrade golang.org/x/net (#3674) (#3811)
Addresses:
Scanning your code and 410 packages across 83 dependent modules for known vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2024-2687
HTTP/2 CONTINUATION flood in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2687
Module: golang.org/x/net
Found in: golang.org/x/net@v0.20.0
Fixed in: golang.org/x/net@v0.23.0
Example traces found:
#1: cli/root.go:122:52: cli.NewAlertmanagerClient calls config.NewClientFromConfig, which eventually calls http2.ConfigureTransports
#2: types/types.go:290:28: types.MultiError.Error calls http2.ConnectionError.Error
#3: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.ErrCode.String
#4: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameHeader.String
#5: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameType.String
#6: types/types.go:290:28: types.MultiError.Error calls http2.GoAwayError.Error
#7: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.Setting.String
#8: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.SettingID.String
#9: types/types.go:290:28: types.MultiError.Error calls http2.StreamError.Error
#10: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.NewClientConn
#11: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.RoundTrip
#12: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.chunkWriter.Write
#13: types/types.go:290:28: types.MultiError.Error calls http2.connError.Error
#14: types/types.go:290:28: types.MultiError.Error calls http2.duplicatePseudoHeaderError.Error
#15: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.gzipReader.Close
#16: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.gzipReader.Read
#17: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldNameError.Error
#18: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldValueError.Error
#19: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.noDialH2RoundTripper.RoundTrip
#20: types/types.go:290:28: types.MultiError.Error calls http2.pseudoHeaderError.Error
#21: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.stickyErrWriter.Write
#22: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.transportResponseBody.Close
#23: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.transportResponseBody.Read
#24: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.writeData.String
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
Signed-off-by: Holger Hans Peter Freyther <holger@freyther.de>
2024-04-25 16:38:44 +00:00
|
|
|
golang.org/x/net v0.24.0
|
2023-12-01 15:54:34 +00:00
|
|
|
golang.org/x/text v0.14.0
|
2024-04-25 16:39:48 +00:00
|
|
|
golang.org/x/tools v0.20.0
|
2023-12-04 10:36:04 +00:00
|
|
|
gopkg.in/telebot.v3 v3.2.1
|
2021-01-27 09:52:08 +00:00
|
|
|
gopkg.in/yaml.v2 v2.4.0
|
2018-11-16 16:32:19 +00:00
|
|
|
)
|
2019-09-16 10:22:25 +00:00
|
|
|
|
2022-07-23 14:56:26 +00:00
|
|
|
require (
|
2022-11-15 09:56:17 +00:00
|
|
|
github.com/armon/go-metrics v0.3.10 // indirect
|
2023-04-01 15:58:45 +00:00
|
|
|
github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/beorn7/perks v1.0.1 // indirect
|
2023-03-01 12:47:50 +00:00
|
|
|
github.com/coreos/go-systemd/v22 v22.5.0 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/davecgh/go-spew v1.1.1 // indirect
|
2023-06-01 15:58:32 +00:00
|
|
|
github.com/docker/go-units v0.5.0 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/go-logfmt/logfmt v0.5.1 // indirect
|
2024-05-01 15:38:37 +00:00
|
|
|
github.com/go-logr/logr v1.4.1 // indirect
|
2022-11-30 16:06:57 +00:00
|
|
|
github.com/go-logr/stdr v1.2.2 // indirect
|
2024-05-01 15:38:37 +00:00
|
|
|
github.com/go-openapi/jsonpointer v0.21.0 // indirect
|
|
|
|
github.com/go-openapi/jsonreference v0.21.0 // indirect
|
2023-05-01 15:58:17 +00:00
|
|
|
github.com/golang/protobuf v1.5.3 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/google/btree v1.0.0 // indirect
|
2024-04-29 12:29:11 +00:00
|
|
|
github.com/google/uuid v1.6.0 // indirect
|
2023-12-01 15:28:36 +00:00
|
|
|
github.com/hashicorp/errwrap v1.1.0 // indirect
|
2022-11-15 09:56:17 +00:00
|
|
|
github.com/hashicorp/go-immutable-radix v1.3.1 // indirect
|
2024-04-25 16:39:34 +00:00
|
|
|
github.com/hashicorp/go-msgpack/v2 v2.1.1 // indirect
|
2022-11-15 09:56:17 +00:00
|
|
|
github.com/hashicorp/go-multierror v1.1.0 // indirect
|
2022-12-20 16:21:12 +00:00
|
|
|
github.com/hashicorp/golang-lru v0.5.4 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/jmespath/go-jmespath v0.4.0 // indirect
|
|
|
|
github.com/josharian/intern v1.0.0 // indirect
|
|
|
|
github.com/jpillora/backoff v1.0.0 // indirect
|
|
|
|
github.com/julienschmidt/httprouter v1.3.0 // indirect
|
|
|
|
github.com/mailru/easyjson v0.7.7 // indirect
|
2022-11-15 09:56:17 +00:00
|
|
|
github.com/miekg/dns v1.1.41 // indirect
|
|
|
|
github.com/mitchellh/mapstructure v1.5.0 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f // indirect
|
|
|
|
github.com/opentracing/opentracing-go v1.2.0 // indirect
|
|
|
|
github.com/pmezard/go-difflib v1.0.0 // indirect
|
2024-05-02 10:32:30 +00:00
|
|
|
github.com/prometheus/client_model v0.6.0 // indirect
|
|
|
|
github.com/prometheus/procfs v0.14.0 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 // indirect
|
2023-03-01 12:47:50 +00:00
|
|
|
github.com/xhit/go-str2duration/v2 v2.1.0 // indirect
|
2024-04-29 12:29:11 +00:00
|
|
|
go.mongodb.org/mongo-driver v1.14.0 // indirect
|
2024-05-01 15:38:37 +00:00
|
|
|
go.opentelemetry.io/otel v1.24.0 // indirect
|
|
|
|
go.opentelemetry.io/otel/metric v1.24.0 // indirect
|
|
|
|
go.opentelemetry.io/otel/trace v1.24.0 // indirect
|
dep: Manually upgrade golang.org/x/net (#3674) (#3811)
Addresses:
Scanning your code and 410 packages across 83 dependent modules for known vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2024-2687
HTTP/2 CONTINUATION flood in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2687
Module: golang.org/x/net
Found in: golang.org/x/net@v0.20.0
Fixed in: golang.org/x/net@v0.23.0
Example traces found:
#1: cli/root.go:122:52: cli.NewAlertmanagerClient calls config.NewClientFromConfig, which eventually calls http2.ConfigureTransports
#2: types/types.go:290:28: types.MultiError.Error calls http2.ConnectionError.Error
#3: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.ErrCode.String
#4: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameHeader.String
#5: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameType.String
#6: types/types.go:290:28: types.MultiError.Error calls http2.GoAwayError.Error
#7: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.Setting.String
#8: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.SettingID.String
#9: types/types.go:290:28: types.MultiError.Error calls http2.StreamError.Error
#10: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.NewClientConn
#11: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.RoundTrip
#12: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.chunkWriter.Write
#13: types/types.go:290:28: types.MultiError.Error calls http2.connError.Error
#14: types/types.go:290:28: types.MultiError.Error calls http2.duplicatePseudoHeaderError.Error
#15: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.gzipReader.Close
#16: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.gzipReader.Read
#17: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldNameError.Error
#18: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldValueError.Error
#19: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.noDialH2RoundTripper.RoundTrip
#20: types/types.go:290:28: types.MultiError.Error calls http2.pseudoHeaderError.Error
#21: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.stickyErrWriter.Write
#22: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.transportResponseBody.Close
#23: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.transportResponseBody.Read
#24: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.writeData.String
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
Signed-off-by: Holger Hans Peter Freyther <holger@freyther.de>
2024-04-25 16:38:44 +00:00
|
|
|
golang.org/x/crypto v0.22.0 // indirect
|
2024-05-02 10:32:30 +00:00
|
|
|
golang.org/x/oauth2 v0.18.0 // indirect
|
2024-04-25 16:39:48 +00:00
|
|
|
golang.org/x/sync v0.7.0 // indirect
|
dep: Manually upgrade golang.org/x/net (#3674) (#3811)
Addresses:
Scanning your code and 410 packages across 83 dependent modules for known vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2024-2687
HTTP/2 CONTINUATION flood in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2687
Module: golang.org/x/net
Found in: golang.org/x/net@v0.20.0
Fixed in: golang.org/x/net@v0.23.0
Example traces found:
#1: cli/root.go:122:52: cli.NewAlertmanagerClient calls config.NewClientFromConfig, which eventually calls http2.ConfigureTransports
#2: types/types.go:290:28: types.MultiError.Error calls http2.ConnectionError.Error
#3: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.ErrCode.String
#4: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameHeader.String
#5: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.FrameType.String
#6: types/types.go:290:28: types.MultiError.Error calls http2.GoAwayError.Error
#7: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.Setting.String
#8: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.SettingID.String
#9: types/types.go:290:28: types.MultiError.Error calls http2.StreamError.Error
#10: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.NewClientConn
#11: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.Transport.RoundTrip
#12: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.chunkWriter.Write
#13: types/types.go:290:28: types.MultiError.Error calls http2.connError.Error
#14: types/types.go:290:28: types.MultiError.Error calls http2.duplicatePseudoHeaderError.Error
#15: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.gzipReader.Close
#16: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.gzipReader.Read
#17: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldNameError.Error
#18: types/types.go:290:28: types.MultiError.Error calls http2.headerFieldValueError.Error
#19: api/v2/client/silence/silence_client.go:196:35: silence.Client.PostSilences calls client.Runtime.Submit, which eventually calls http2.noDialH2RoundTripper.RoundTrip
#20: types/types.go:290:28: types.MultiError.Error calls http2.pseudoHeaderError.Error
#21: notify/email/email.go:253:14: email.Email.Notify calls fmt.Fprintf, which eventually calls http2.stickyErrWriter.Write
#22: test/cli/acceptance.go:362:3: cli.Alertmanager.Start calls http2.transportResponseBody.Close
#23: test/cli/acceptance.go:366:22: cli.Alertmanager.Start calls io.ReadAll, which calls http2.transportResponseBody.Read
#24: notify/notify.go:998:21: notify.TimeActiveStage.Exec calls log.jsonLogger.Log, which eventually calls http2.writeData.String
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
Signed-off-by: Holger Hans Peter Freyther <holger@freyther.de>
2024-04-25 16:38:44 +00:00
|
|
|
golang.org/x/sys v0.19.0 // indirect
|
2022-11-15 09:56:17 +00:00
|
|
|
google.golang.org/appengine v1.6.7 // indirect
|
2024-05-02 10:32:30 +00:00
|
|
|
google.golang.org/protobuf v1.34.0 // indirect
|
2022-07-25 16:42:55 +00:00
|
|
|
gopkg.in/yaml.v3 v3.0.1 // indirect
|
2022-07-23 14:56:26 +00:00
|
|
|
)
|