Skip to content

deps(deps): bump github.com/gdamore/tcell/v2 from 2.13.6 to 2.13.7 in the security-patches group#112

Merged
tis24dev merged 1 commit intodevfrom
dependabot/go_modules/dev/security-patches-bd3a58b7ed
Jan 21, 2026
Merged

deps(deps): bump github.com/gdamore/tcell/v2 from 2.13.6 to 2.13.7 in the security-patches group#112
tis24dev merged 1 commit intodevfrom
dependabot/go_modules/dev/security-patches-bd3a58b7ed

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 19, 2026

Bumps the security-patches group with 1 update: github.com/gdamore/tcell/v2.

Updates github.com/gdamore/tcell/v2 from 2.13.6 to 2.13.7

Release notes

Sourced from github.com/gdamore/tcell/v2's releases.

Version 2.13.7 Bug Fix Release

This fixes two bugs:

  • wide not overwriting adjacent character (#976)
  • paste on Windows did not handle certain runes (#984)

What's Changed

Full Changelog: gdamore/tcell@v2.13.6...v2.13.7

Commits
  • 4df69b6 fix: fix for wide not overwriting adjacent character (fixes #976)
  • 4739cfe fix(windows): Windows input (paste input) may arrive as UTF-16 still (fixes#984)
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the security-patches group with 1 update: [github.com/gdamore/tcell/v2](https://github.com/gdamore/tcell).


Updates `github.com/gdamore/tcell/v2` from 2.13.6 to 2.13.7
- [Release notes](https://github.com/gdamore/tcell/releases)
- [Changelog](https://github.com/gdamore/tcell/blob/main/CHANGESv3.md)
- [Commits](gdamore/tcell@v2.13.6...v2.13.7)

---
updated-dependencies:
- dependency-name: github.com/gdamore/tcell/v2
  dependency-version: 2.13.7
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: security-patches
...

Signed-off-by: dependabot[bot] <support@github.com>
@github-actions
Copy link

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
gomod/github.com/gdamore/tcell/v2 2.13.7 🟢 6.2
Details
CheckScoreReason
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Code-Review⚠️ 0Found 0/22 approved changesets -- score normalized to 0
Maintained🟢 1030 commit(s) and 26 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies🟢 4dependency not pinned by hash detected -- score normalized to 4
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Vulnerabilities🟢 100 existing vulnerabilities detected
Branch-Protection🟢 4branch protection is not maximal on development and all release branches
SAST🟢 10SAST tool is run on all commits

Scanned Files

  • go.mod

@codecov
Copy link

codecov bot commented Jan 19, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.

📢 Thoughts on this report? Let us know!

@tis24dev tis24dev merged commit 7c48734 into dev Jan 21, 2026
6 of 7 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/dev/security-patches-bd3a58b7ed branch January 21, 2026 13:41
tis24dev added a commit that referenced this pull request Jan 21, 2026
* Add tests for orchestrator, support, and tui modules

Introduces new test files for encryption, prompts, restore workflow, selective menu, support, and abort context functionalities. Refactors orchestrator/encryption.go to allow mocking terminal checks, and support.go to allow mocking email notifier creation for improved testability. Adds a stopHook to tui.App for controlled stopping in tests.

* Enforce root check only for real root filesystem restores

Updated restore privilege checks to require root only when restoring to the real system root (osFS), not for virtual or test filesystems. Added isRealRestoreFS helper to distinguish filesystem types.

* Expand storage tests and improve FilesystemDetector hooks

Added extensive test coverage for local and secondary storage, including error handling, edge cases, and permission scenarios. Refactored FilesystemDetector to support injectable test hooks for mount point and filesystem type lookups, and improved octal unescaping logic. These changes enhance testability and reliability of storage operations.

* Improve email and webhook notifier test coverage

Adds extensive unit tests for email and webhook notifiers, covering error branches, authentication methods, payload formats, and edge cases. Refactors email notifier to allow overriding Postfix config path for hermetic tests and fixes logger level checks for debug output.

* Add comprehensive tests for MAC, directory, and security logic

Added extensive unit tests to identity_test.go for MAC address handling, interface ranking, system data generation, and edge cases. Expanded directory_recreation_test.go with tests for storage/datastore config parsing, directory creation, error propagation, and ZFS detection. Added security_test.go tests for ownership/permission checks, config-driven logic, and error handling. These tests improve coverage and robustness for identity, orchestrator, and security modules.

* Add comprehensive coverage tests for decryption workflow

This commit adds extensive unit tests to internal/orchestrator/decrypt_test.go, covering error handling and edge cases for decryption workflows, rclone integration, bundle extraction, manifest inspection, and user prompt logic. The tests improve code reliability by simulating various failure scenarios, file system errors, and user interactions.

* Add network safe apply with rollback and diagnostics

Implements network configuration safe apply with a transactional rollback timer, health checks, NIC name repair, and diagnostics capture. Adds network inventory collection, network health/preflight validation, and CLI workflow for applying/restoring network config with rollback. Updates backup safety logic to support network-only rollback archives and integrates new reporting in system collector and restore guide documentation.

* Add cluster shadowing guard and NIC naming override detection

Introduces cluster shadowing guard to prevent direct restoration of /etc/pve paths during cluster recovery, with sanitization logic and tests. Adds detection and reporting of persistent NIC naming override rules (udev/systemd) to network_apply and TUI workflows, including user prompts and detailed logging. Enhances safe cluster apply to handle node mismatches, prompt for source node selection, and improves logging and test coverage for restore scenarios.

* feat: improve network staging, datastore handling, and restore workflows

- Add staged network file installation with automatic rollback on preflight validation failures in network_apply.go
- Implement node hostname mismatch detection when applying VM/CT configs in SAFE cluster restore mode (RESTORE_GUIDE)
- Add deferred datastore definition handling to prevent broken entries on unmounted disk locations (RESTORE_GUIDE)
- Implement NIC repair staged install workflow and persistent naming rule detection (network_apply.go and docs)
- Enhance directory_recreation.go with ZFS mount detection and datastore permission validation logic
- Add automatic /etc/resolv.conf repair documentation and failing PBS job config removal on live restores (RESTORE_GUIDE)
- Introduce promptYesNo CLI utility function for interactive confirmation prompts (prompts_cli.go)
- Add file deduplication optimization pass and additional test coverage in optimizations.go
- Expand restore workflow state management with additional safety checks and node handling (restore.go)
- Add staged installation documentation covering /tmp/proxsave/restore-stage-* workflow and rollback timer mechanics

* refactor: add filesystem category and smart fstab merge

- Add filesystem category (ID: "filesystem", path: "./etc/fstab") to restore workflow covering mount points and configurations
- Integrate filesystem category into storage, base, and full restore modes in GetStorageModeCategories and GetBaseModeCategories
- Implement skipFn parameter in extractArchiveNative and extractPlainArchive to skip /etc/fstab during initial extraction
- Add Smart Merge workflow for /etc/fstab via SmartMergeFstab function with user prompts on live restores to root (/)
- Intercept filesystem category during normal extraction pipeline in RunRestoreWorkflow to prevent blind overwrite
- Update extractArchiveNative to accept optional skipFn callback that filters entries before extraction with SKIPPED logging
- Add safeFstabMerge flag in runFullRestore when destRoot == "/" to defer /etc/fstab processing until after extraction
- Extend extractSelectiveArchive signature to pass skipFn parameter through the extraction chain
- Update TestGetStorageModeCategories and TestGetBaseModeCategories assertions to verify filesystem inclusion (+1 count)
- Refactor indentation in maybeInstallNetworkConfigFromStage and maybeApplyNetworkConfigCLI call chains for readability

* feat: enhance network apply diagnostics and error handling

• Increase network rollback timer from 90s to 180s (defaultNetworkRollbackTimeout constant)
• Add NetworkApplyNotCommittedError type to report rollback path and restored IP on timeout
• Refactor network validator order: prioritize ifup -n -a over ifquery --check -a for preflight validation
• Introduce runNetworkIfqueryDiagnostic function for non-blocking diagnostic checks of network state
• Capture baseline health report before apply with writeNetworkHealthReportFileNamed helper
• Generate network plan report and capture pre/post-apply ifquery diagnostics automatically
• Execute rollback immediately on timer expiration and capture after-rollback snapshots and ifquery output
• Enhance error messages with validation command names (preflight.CommandLine()) and rollback paths
- Add runCommandWithTimeoutCountdown function with visual progress feedback during service stop operations
• Update restore summary to report "warnings" when network apply incomplete, with restored IP information

* Add default wait delay to command runner

Introduces a default 3-second wait delay for commands executed via osCommandRunner. Handles exec.ErrWaitDelay by returning output without error, improving robustness of command execution.

* deps(deps): bump github.com/gdamore/tcell/v2 from 2.13.6 to 2.13.7 in the security-patches group (#112)

deps(deps): bump github.com/gdamore/tcell/v2

Bumps the security-patches group with 1 update: [github.com/gdamore/tcell/v2](https://github.com/gdamore/tcell).


Updates `github.com/gdamore/tcell/v2` from 2.13.6 to 2.13.7
- [Release notes](https://github.com/gdamore/tcell/releases)
- [Changelog](https://github.com/gdamore/tcell/blob/main/CHANGESv3.md)
- [Commits](gdamore/tcell@v2.13.6...v2.13.7)

---
updated-dependencies:
- dependency-name: github.com/gdamore/tcell/v2
  dependency-version: 2.13.7
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: security-patches
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* deps(deps): bump golang.org/x/crypto from 0.46.0 to 0.47.0 (#113)

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.46.0 to 0.47.0.
- [Commits](golang/crypto@v0.46.0...v0.47.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.47.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Fix octal unescaping to use ParseUint instead of ParseInt

Replaces strconv.ParseInt with strconv.ParseUint in unescapeOctal to correctly handle unsigned octal values. This prevents potential issues when parsing octal escape sequences as bytes.

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This was referenced Jan 21, 2026
tis24dev added a commit that referenced this pull request Jan 21, 2026
* Add tests for orchestrator, support, and tui modules

Introduces new test files for encryption, prompts, restore workflow, selective menu, support, and abort context functionalities. Refactors orchestrator/encryption.go to allow mocking terminal checks, and support.go to allow mocking email notifier creation for improved testability. Adds a stopHook to tui.App for controlled stopping in tests.

* Enforce root check only for real root filesystem restores

Updated restore privilege checks to require root only when restoring to the real system root (osFS), not for virtual or test filesystems. Added isRealRestoreFS helper to distinguish filesystem types.

* Expand storage tests and improve FilesystemDetector hooks

Added extensive test coverage for local and secondary storage, including error handling, edge cases, and permission scenarios. Refactored FilesystemDetector to support injectable test hooks for mount point and filesystem type lookups, and improved octal unescaping logic. These changes enhance testability and reliability of storage operations.

* Improve email and webhook notifier test coverage

Adds extensive unit tests for email and webhook notifiers, covering error branches, authentication methods, payload formats, and edge cases. Refactors email notifier to allow overriding Postfix config path for hermetic tests and fixes logger level checks for debug output.

* Add comprehensive tests for MAC, directory, and security logic

Added extensive unit tests to identity_test.go for MAC address handling, interface ranking, system data generation, and edge cases. Expanded directory_recreation_test.go with tests for storage/datastore config parsing, directory creation, error propagation, and ZFS detection. Added security_test.go tests for ownership/permission checks, config-driven logic, and error handling. These tests improve coverage and robustness for identity, orchestrator, and security modules.

* Add comprehensive coverage tests for decryption workflow

This commit adds extensive unit tests to internal/orchestrator/decrypt_test.go, covering error handling and edge cases for decryption workflows, rclone integration, bundle extraction, manifest inspection, and user prompt logic. The tests improve code reliability by simulating various failure scenarios, file system errors, and user interactions.

* Add network safe apply with rollback and diagnostics

Implements network configuration safe apply with a transactional rollback timer, health checks, NIC name repair, and diagnostics capture. Adds network inventory collection, network health/preflight validation, and CLI workflow for applying/restoring network config with rollback. Updates backup safety logic to support network-only rollback archives and integrates new reporting in system collector and restore guide documentation.

* Add cluster shadowing guard and NIC naming override detection

Introduces cluster shadowing guard to prevent direct restoration of /etc/pve paths during cluster recovery, with sanitization logic and tests. Adds detection and reporting of persistent NIC naming override rules (udev/systemd) to network_apply and TUI workflows, including user prompts and detailed logging. Enhances safe cluster apply to handle node mismatches, prompt for source node selection, and improves logging and test coverage for restore scenarios.

* feat: improve network staging, datastore handling, and restore workflows

- Add staged network file installation with automatic rollback on preflight validation failures in network_apply.go
- Implement node hostname mismatch detection when applying VM/CT configs in SAFE cluster restore mode (RESTORE_GUIDE)
- Add deferred datastore definition handling to prevent broken entries on unmounted disk locations (RESTORE_GUIDE)
- Implement NIC repair staged install workflow and persistent naming rule detection (network_apply.go and docs)
- Enhance directory_recreation.go with ZFS mount detection and datastore permission validation logic
- Add automatic /etc/resolv.conf repair documentation and failing PBS job config removal on live restores (RESTORE_GUIDE)
- Introduce promptYesNo CLI utility function for interactive confirmation prompts (prompts_cli.go)
- Add file deduplication optimization pass and additional test coverage in optimizations.go
- Expand restore workflow state management with additional safety checks and node handling (restore.go)
- Add staged installation documentation covering /tmp/proxsave/restore-stage-* workflow and rollback timer mechanics

* refactor: add filesystem category and smart fstab merge

- Add filesystem category (ID: "filesystem", path: "./etc/fstab") to restore workflow covering mount points and configurations
- Integrate filesystem category into storage, base, and full restore modes in GetStorageModeCategories and GetBaseModeCategories
- Implement skipFn parameter in extractArchiveNative and extractPlainArchive to skip /etc/fstab during initial extraction
- Add Smart Merge workflow for /etc/fstab via SmartMergeFstab function with user prompts on live restores to root (/)
- Intercept filesystem category during normal extraction pipeline in RunRestoreWorkflow to prevent blind overwrite
- Update extractArchiveNative to accept optional skipFn callback that filters entries before extraction with SKIPPED logging
- Add safeFstabMerge flag in runFullRestore when destRoot == "/" to defer /etc/fstab processing until after extraction
- Extend extractSelectiveArchive signature to pass skipFn parameter through the extraction chain
- Update TestGetStorageModeCategories and TestGetBaseModeCategories assertions to verify filesystem inclusion (+1 count)
- Refactor indentation in maybeInstallNetworkConfigFromStage and maybeApplyNetworkConfigCLI call chains for readability

* feat: enhance network apply diagnostics and error handling

• Increase network rollback timer from 90s to 180s (defaultNetworkRollbackTimeout constant)
• Add NetworkApplyNotCommittedError type to report rollback path and restored IP on timeout
• Refactor network validator order: prioritize ifup -n -a over ifquery --check -a for preflight validation
• Introduce runNetworkIfqueryDiagnostic function for non-blocking diagnostic checks of network state
• Capture baseline health report before apply with writeNetworkHealthReportFileNamed helper
• Generate network plan report and capture pre/post-apply ifquery diagnostics automatically
• Execute rollback immediately on timer expiration and capture after-rollback snapshots and ifquery output
• Enhance error messages with validation command names (preflight.CommandLine()) and rollback paths
- Add runCommandWithTimeoutCountdown function with visual progress feedback during service stop operations
• Update restore summary to report "warnings" when network apply incomplete, with restored IP information

* Add default wait delay to command runner

Introduces a default 3-second wait delay for commands executed via osCommandRunner. Handles exec.ErrWaitDelay by returning output without error, improving robustness of command execution.

* deps(deps): bump github.com/gdamore/tcell/v2 from 2.13.6 to 2.13.7 in the security-patches group (#112)

deps(deps): bump github.com/gdamore/tcell/v2

Bumps the security-patches group with 1 update: [github.com/gdamore/tcell/v2](https://github.com/gdamore/tcell).


Updates `github.com/gdamore/tcell/v2` from 2.13.6 to 2.13.7
- [Release notes](https://github.com/gdamore/tcell/releases)
- [Changelog](https://github.com/gdamore/tcell/blob/main/CHANGESv3.md)
- [Commits](gdamore/tcell@v2.13.6...v2.13.7)

---
updated-dependencies:
- dependency-name: github.com/gdamore/tcell/v2
  dependency-version: 2.13.7
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: security-patches
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* deps(deps): bump golang.org/x/crypto from 0.46.0 to 0.47.0 (#113)

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.46.0 to 0.47.0.
- [Commits](golang/crypto@v0.46.0...v0.47.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.47.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Fix octal unescaping to use ParseUint instead of ParseInt

Replaces strconv.ParseInt with strconv.ParseUint in unescapeOctal to correctly handle unsigned octal values. This prevents potential issues when parsing octal escape sequences as bytes.

* Revert "Sync dev to main (#114)"

This reverts commit c1092cd.

* Reapply "Sync dev to main (#114)"

This reverts commit ef2221b.

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant