-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Go vulnerability check doesn't run on submodules #18173
Comments
/assign @henrybear327 |
Thanks to @ivanvc for the quick actions! |
Regarding the follow-up of #18168 (reply in thread), @ivanvc do we want to build a new CI check mandating that all existing dependencies across all Any ideas :) |
@henrybear327, I think the second part (ensuring that the dependencies across the Go submodules have consistent versions) is outside the scope of this issue. If you agree, I'd like to open a new issue for it, and I consider this issue done when we have integrated /assign @ivanvc ( |
@ahrtr, @jmhbnz, as I'm moving the
I lean towards 1. Do you have any thoughts or opinions? |
My vote would go for option one. Though can we make it at the end of the |
Either way works for me. But I prefer to get in included in a separate workflow check (option 2), because we need more / special attention to any security failures. |
@jmhbnz, I hope you don't mind, but I'm implementing it as a different target 🙏. This way we have a different prow job that runs exclusively this check. |
There's no need to backport this. It already works with GitHub actions for both branches. Also, as Benjamin pointed out, we don't need multi-module checking for 3.4 as there's a single module. I'm keeping this issue as I'm using it to track the migration of that job from GitHub actions to the prow infra, which will be only for the main branch. |
Reopening, as I found out that the release-3.5 branch is not running properly. I'm about to open a pull request to address the issue. |
Bug report criteria
What happened?
As pointed out by #18168, the current
govulncheck
GitHub action is only running for the top-level module, ignoring the submodules.What did you expect to happen?
To run across all the submodules so it can find vulnerable dependencies included by them.
How can we reproduce it (as minimally and precisely as possible)?
Review any of the action runs, i.e., https://github.com/etcd-io/etcd/actions/runs/9482641629/job/26127954499. It runs just against the top-level module.
Anything else we need to know?
This issue is also present in the release 3.4 and 3.5 branches.
Etcd version (please run commands below)
Etcd configuration (command line flags or environment variables)
paste your configuration here
Etcd debug information (please run commands below, feel free to obfuscate the IP address or FQDN in the output)
Relevant log output
No response
The text was updated successfully, but these errors were encountered: