Skip to content

Commit

Permalink
Upgrade vulnerable dependencies using constraints
Browse files Browse the repository at this point in the history
There are four security related dependabot alerts reported against this
project, two coming from a transative Guava dependency that is pulled in
via Checkstyle and two coming from commons-io which is pulled in by
exemplar. None of these alerts could affect consumer builds that apply
this plugin, because the vulnerable dependencies are only used at build
time. This pull request defined version constraints to upgrade both
vulnerable dependencies to their latest versions, that way fixing the
dependabot alerts.
  • Loading branch information
britter committed Nov 29, 2024
1 parent a32637b commit c8ff3ad
Showing 1 changed file with 13 additions and 0 deletions.
13 changes: 13 additions & 0 deletions build.gradle.kts
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,19 @@ java {
toolchain.languageVersion = JavaLanguageVersion.of(8)
}

dependencies.constraints {
checkstyle("com.google.guava:guava") {
version {
require("33.3.1-jre")
}
}
testSamplesImplementation("commons-io:commons-io") {
version {
require("2.18.0")
}
}
}

pluginPublishConventions {
id("${project.group}.${project.name}")
implementationClass("org.gradlex.buildparameters.BuildParametersPlugin")
Expand Down

0 comments on commit c8ff3ad

Please sign in to comment.