Skip to content

Commit d0f7dce

Browse files
committed
gopls: update x/vuln to 1.0.4
x/vuln/cmd/govulncheck -json output format has changed to include module level vulnerabilities. We knew this change would eventually come and had handling in gopls/internal/mod/diagnostics.go 'foundVuln'. But we didn't update TestRunVulncheckWarning & TestRunVulncheckInfo to get prepared. This is a test-only bug. Fixes golang/go#65942 Change-Id: Ib7545279d07caf708c4f5392b51df273256432e6 Reviewed-on: https://go-review.googlesource.com/c/tools/+/567155 Reviewed-by: Suzy Mueller <suzmue@golang.org> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
1 parent dd52646 commit d0f7dce

File tree

3 files changed

+6
-5
lines changed

3 files changed

+6
-5
lines changed

gopls/go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ require (
1111
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2
1212
golang.org/x/text v0.14.0
1313
golang.org/x/tools v0.18.0
14-
golang.org/x/vuln v1.0.1
14+
golang.org/x/vuln v1.0.4
1515
gopkg.in/yaml.v3 v3.0.1
1616
honnef.co/go/tools v0.4.7
1717
mvdan.cc/gofumpt v0.6.0

gopls/go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
4040
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
4141
golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
4242
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
43-
golang.org/x/vuln v1.0.1 h1:KUas02EjQK5LTuIx1OylBQdKKZ9jeugs+HiqO5HormU=
44-
golang.org/x/vuln v1.0.1/go.mod h1:bb2hMwln/tqxg32BNY4CcxHWtHXuYa3SbIBmtsyjxtM=
43+
golang.org/x/vuln v1.0.4 h1:SP0mPeg2PmGCu03V+61EcQiOjmpri2XijexKdzv8Z1I=
44+
golang.org/x/vuln v1.0.4/go.mod h1:NbJdUQhX8jY++FtuhrXs2Eyx0yePo9pF7nPlIjo9aaQ=
4545
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
4646
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 h1:YR8cESwS4TdDjEe65xsg0ogRM/Nc3DYOhEAlW+xobZo=
4747
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=

gopls/internal/test/integration/misc/vuln_test.go

+3-2
Original file line numberDiff line numberDiff line change
@@ -657,7 +657,8 @@ func TestRunVulncheckWarning(t *testing.T) {
657657
)
658658

659659
testFetchVulncheckResult(t, env, map[string]fetchVulncheckResult{
660-
"go.mod": {IDs: []string{"GO-2022-01", "GO-2022-02", "GO-2022-03"}, Mode: vulncheck.ModeGovulncheck},
660+
// All vulnerabilities (symbol-level, import-level, module-level) are reported.
661+
"go.mod": {IDs: []string{"GO-2022-01", "GO-2022-02", "GO-2022-03", "GO-2022-04"}, Mode: vulncheck.ModeGovulncheck},
661662
})
662663
env.OpenFile("x/x.go")
663664
env.OpenFile("y/y.go")
@@ -811,7 +812,7 @@ func TestGovulncheckInfo(t *testing.T) {
811812
ReadDiagnostics("go.mod", gotDiagnostics),
812813
)
813814

814-
testFetchVulncheckResult(t, env, map[string]fetchVulncheckResult{"go.mod": {IDs: []string{"GO-2022-02"}, Mode: vulncheck.ModeGovulncheck}})
815+
testFetchVulncheckResult(t, env, map[string]fetchVulncheckResult{"go.mod": {IDs: []string{"GO-2022-02", "GO-2022-04"}, Mode: vulncheck.ModeGovulncheck}})
815816
// wantDiagnostics maps a module path in the require
816817
// section of a go.mod to diagnostics that will be returned
817818
// when running vulncheck.

0 commit comments

Comments
 (0)