Skip to content

Bump github.com/Open-CMSIS-Pack/cbuild/v2 from 2.12.0 to 2.13.0#424

Merged
brondani merged 3 commits intomainfrom
dependabot/go_modules/github.com/Open-CMSIS-Pack/cbuild/v2-2.13.0
Feb 25, 2026
Merged

Bump github.com/Open-CMSIS-Pack/cbuild/v2 from 2.12.0 to 2.13.0#424
brondani merged 3 commits intomainfrom
dependabot/go_modules/github.com/Open-CMSIS-Pack/cbuild/v2-2.13.0

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 19, 2026

Bumps github.com/Open-CMSIS-Pack/cbuild/v2 from 2.12.0 to 2.13.0.

Release notes

Sourced from github.com/Open-CMSIS-Pack/cbuild/v2's releases.

v2.13.0

What's Changed

Full Changelog: Open-CMSIS-Pack/cbuild@v2.12.0...v2.13.0

Commits
  • e01a793 Fixed linter warning (#549)
  • eaca090 chore(deps): bump github/codeql-action from 4.32.2 to 4.32.3
  • f6fa5b0 Improve --skip-convert handling
  • f6c9dbe Update TPIP report
  • e339848 chore(deps): bump golang.org/x/term from 0.39.0 to 0.40.0
  • 6d8327d chore(deps): bump step-security/harden-runner from 2.14.1 to 2.14.2
  • 15c70e6 chore(deps): bump github/codeql-action from 4.32.0 to 4.32.2
  • d22118b Fix: Failure when selecting --rebuild and the target set specifies and image ...
  • 9a50566 Trigger rebuild on CMSIS_COMPILER_ROOT changed from last build
  • a2e4e15 chore(deps): bump github/codeql-action from 4.31.11 to 4.32.0
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/Open-CMSIS-Pack/cbuild/v2](https://github.com/Open-CMSIS-Pack/cbuild) from 2.12.0 to 2.13.0.
- [Release notes](https://github.com/Open-CMSIS-Pack/cbuild/releases)
- [Commits](Open-CMSIS-Pack/cbuild@v2.12.0...v2.13.0)

---
updated-dependencies:
- dependency-name: github.com/Open-CMSIS-Pack/cbuild/v2
  dependency-version: 2.13.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 19, 2026
@github-actions
Copy link
Contributor

github-actions bot commented Feb 19, 2026

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 1 package(s) with unknown licenses.
  • ⚠️ 1 packages with OpenSSF Scorecard issues.
See the Details below.

License Issues

go.mod

PackageVersionLicenseIssue Type
github.com/creack/pty1.1.21NullUnknown License

OpenSSF Scorecard

PackageVersionScoreDetails
gomod/github.com/Open-CMSIS-Pack/cbuild/v2 2.13.0 🟢 8.1
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 10all changesets reviewed
Binary-Artifacts🟢 10no binaries found in the repo
Dependency-Update-Tool🟢 10update tool detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 9security policy file detected
Pinned-Dependencies🟢 7dependency not pinned by hash detected -- score normalized to 7
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
License🟢 10license file detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Vulnerabilities🟢 100 existing vulnerabilities detected
SAST🟢 8SAST tool detected but not run on all commits
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
Packaging🟢 10packaging workflow detected
Contributors🟢 6project has 2 contributing companies or organizations -- score normalized to 6
CI-Tests🟢 1030 out of 30 merged PRs checked by a CI test -- score normalized to 10
gomod/github.com/aymanbagabas/go-pty 0.2.2 ⚠️ 2.9
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/5 approved changesets -- score normalized to 0
Maintained⚠️ 12 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 1
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Packaging⚠️ -1packaging workflow not detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
Security-Policy⚠️ 0security policy file not detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
gomod/github.com/creack/pty 1.1.21 UnknownUnknown
gomod/github.com/u-root/u-root 0.11.0 🟢 7.4
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10
Code-Review🟢 10all changesets reviewed
Security-Policy🟢 4security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 2badge detected: InProgress
License🟢 10license file detected
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Signed-Releases⚠️ -1no releases found
Fuzzing🟢 10project is fuzzed
Binary-Artifacts🟢 9binaries present in source code
Packaging🟢 10packaging workflow detected
SAST🟢 10SAST tool is run on all commits
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
gomod/golang.org/x/crypto 0.45.0 UnknownUnknown
gomod/golang.org/x/sys 0.41.0 UnknownUnknown
gomod/golang.org/x/term 0.40.0 UnknownUnknown

Scanned Files

  • go.mod

@qltysh
Copy link

qltysh bot commented Feb 20, 2026

Qlty

Coverage Impact

⬇️ Merging this pull request will decrease total coverage on main by 4.81%.

🚦 See full report on Qlty Cloud »

🛟 Help
  • Diff Coverage: Coverage for added or modified lines of code (excludes deleted files). Learn more.

  • Total Coverage: Coverage for the whole repository, calculated as the sum of all File Coverage. Learn more.

  • File Coverage: Covered Lines divided by Covered Lines plus Missed Lines. (Excludes non-executable lines including blank lines and comments.)

    • Indirect Changes: Changes to File Coverage for files that were not modified in this PR. Learn more.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the Go module dependencies for cbuild2cmake by bumping github.com/Open-CMSIS-Pack/cbuild/v2 to v2.13.0, which pulls in additional indirect dependencies and updates related golang.org/x/* entries.

Changes:

  • Bump github.com/Open-CMSIS-Pack/cbuild/v2 from v2.12.0 to v2.13.0.
  • Update go.mod Go version directive and refresh indirect requirements.
  • Update go.sum with new/updated checksums for the dependency graph.

Reviewed changes

Copilot reviewed 1 out of 2 changed files in this pull request and generated 2 comments.

File Description
go.mod Bumps cbuild/v2 and updates the Go version + indirect module requirements.
go.sum Updates checksums to match the new dependency graph after the bump.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

soumeh01 and others added 2 commits February 23, 2026 09:05
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@brondani brondani merged commit 9f72a97 into main Feb 25, 2026
24 of 25 checks passed
@brondani brondani deleted the dependabot/go_modules/github.com/Open-CMSIS-Pack/cbuild/v2-2.13.0 branch February 25, 2026 15:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants