Skip to content

test: removetestcontainers dependency#305

Merged
mgoetzegb merged 1 commit intomainfrom
remove-testcontainers
Apr 20, 2026
Merged

test: removetestcontainers dependency#305
mgoetzegb merged 1 commit intomainfrom
remove-testcontainers

Conversation

@mgoetzegb
Copy link
Copy Markdown
Member

What

test: removetestcontainers dependency

Why

It slows down tests and has a lot of dependencies which create a lot of noise during dependabot updates.

@mgoetzegb mgoetzegb requested review from a team as code owners April 16, 2026 18:21
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 16, 2026

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ❌ 6 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 3 package(s) with unknown licenses.
See the Details below.

Snapshot Warnings

⚠️: No snapshots were found for the head SHA 637c76b.
Ensure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice.

License Issues

go.mod

PackageVersionLicenseIssue Type
golang.org/x/crypto0.50.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
golang.org/x/mod0.35.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
golang.org/x/net0.53.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
golang.org/x/sys0.43.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
golang.org/x/text0.36.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
golang.org/x/tools0.44.0BSD-3-Clause AND LicenseRef-scancode-google-patent-license-golangIncompatible License
github.com/mattn/go-isatty0.0.21NullUnknown License
github.com/mattn/go-sqlite31.14.42NullUnknown License
golang.org/x/arch0.26.0NullUnknown License
Allowed Licenses: 0BSD, AGPL-3.0-or-later, Apache-2.0, BlueOak-1.0.0, BSD-2-Clause, BSD-3-Clause-Clear, BSD-3-Clause, BSL-1.0, bzip2-1.0.6, CAL-1.0, CC-BY-3.0, CC-BY-4.0, CC-BY-SA-4.0, CC0-1.0, EPL-2.0, GPL-1.0-or-later, GPL-2.0-only, GPL-2.0-or-later, GPL-2.0, GPL-3.0-only, GPL-3.0-or-later, GPL-3.0, ISC, LGPL-2.0-only, LGPL-2.0-or-later, LGPL-2.1-only, LGPL-2.1-or-later, LGPL-2.1, LGPL-3.0-only, LGPL-3.0, LGPL-3.0-or-later, MIT, MIT-CMU, MPL-1.1, MPL-2.0, OFL-1.1, PSF-2.0, Python-2.0, Python-2.0.1, Unicode-3.0, Unicode-DFS-2016, Unlicense, Zlib, ZPL-2.1

OpenSSF Scorecard

Scorecard details
PackageVersionScoreDetails
gomod/github.com/go-openapi/jsonpointer 0.23.0 🟢 8.2
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review⚠️ 0Found 1/12 approved changesets -- score normalized to 0
Security-Policy🟢 10security policy file detected
Maintained🟢 1021 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/conv 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/jsonname 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/jsonutils 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/loading 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/stringutils 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/typeutils 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/go-openapi/swag/yamlutils 0.26.0 🟢 8.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 0/13 approved changesets -- score normalized to 0
Maintained🟢 1023 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Security-Policy🟢 10security policy file detected
Packaging⚠️ -1packaging workflow not detected
Binary-Artifacts🟢 10no binaries found in the repo
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Pinned-Dependencies🟢 10all dependencies are pinned
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Fuzzing🟢 10project is fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 7SAST tool is not run on all commits -- score normalized to 7
gomod/github.com/mattn/go-isatty 0.0.21 UnknownUnknown
gomod/github.com/mattn/go-sqlite3 1.14.42 UnknownUnknown
gomod/go.mongodb.org/mongo-driver/v2 2.5.1 🟢 7.8
Details
CheckScoreReason
Code-Review🟢 8Found 8/10 approved changesets -- score normalized to 8
Maintained🟢 1030 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Dependency-Update-Tool🟢 10update tool detected
Security-Policy🟢 10security policy file detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies🟢 8dependency not pinned by hash detected -- score normalized to 8
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
License🟢 10license file detected
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
Vulnerabilities🟢 37 existing vulnerabilities detected
SAST🟢 10SAST tool is run on all commits
Fuzzing🟢 10project is fuzzed
Branch-Protection🟢 4branch protection is not maximal on development and all release branches
CI-Tests🟢 1022 out of 22 merged PRs checked by a CI test -- score normalized to 10
Contributors🟢 10project has 25 contributing companies or organizations
gomod/golang.org/x/arch 0.26.0 UnknownUnknown
gomod/golang.org/x/crypto 0.50.0 UnknownUnknown
gomod/golang.org/x/mod 0.35.0 UnknownUnknown
gomod/golang.org/x/net 0.53.0 UnknownUnknown
gomod/golang.org/x/sys 0.43.0 UnknownUnknown
gomod/golang.org/x/text 0.36.0 UnknownUnknown
gomod/golang.org/x/tools 0.44.0 UnknownUnknown

Scanned Files

  • go.mod

@github-actions
Copy link
Copy Markdown

Conventional Commits Report

😢 No conventional commits found.

👉 Learn more about the conventional commits usage at Greenbone.

@codecov
Copy link
Copy Markdown

codecov bot commented Apr 16, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 57.85%. Comparing base (efc872f) to head (637c76b).
⚠️ Report is 2 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #305      +/-   ##
==========================================
+ Coverage   56.59%   57.85%   +1.26%     
==========================================
  Files          71       58      -13     
  Lines        4006     3028     -978     
==========================================
- Hits         2267     1752     -515     
+ Misses       1543     1147     -396     
+ Partials      196      129      -67     
Flag Coverage Δ
opensearch-tests 95.68% <ø> (ø)
postgres-tests 92.03% <ø> (ø)
unit-tests 50.63% <ø> (-0.57%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

I slows down tests and has a lot of dependencies which create a lot of noise during dependabot updates.
@mgoetzegb mgoetzegb force-pushed the remove-testcontainers branch from d13da8c to 637c76b Compare April 17, 2026 14:03
@mgoetzegb
Copy link
Copy Markdown
Member Author

mgoetzegb commented Apr 17, 2026

As some deps were pinned at newer version, they still showed up in go.mod. To clean it up I removed all indirect obsolete dependency entries and ran afterwards

go mod tidy
go get -u -t ./... # update again to newest deps versions

@mgoetzegb
Copy link
Copy Markdown
Member Author

Note: Projects which still need to use testContainers can just define the content in the package where they are using openSearch with testcontainers: https://github.com/greenbone/opensight-golang-libraries/blob/e1516506d4c9afdf8de03c3a1d1c056a4d0defd4/pkg/openSearch/openSearchClient/opensearchTestContainer.go

@mgoetzegb mgoetzegb merged commit 4c09c8a into main Apr 20, 2026
12 of 14 checks passed
@mgoetzegb mgoetzegb deleted the remove-testcontainers branch April 20, 2026 17:07
@mgoetzegb mgoetzegb added the minor release Set label to create a minor release label Apr 20, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

minor release Set label to create a minor release

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants