Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump golang.org/x/tools from 0.9.1 to 0.11.1 in /tools/mod #16336

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 31, 2023

Bumps golang.org/x/tools from 0.9.1 to 0.11.1.

Release notes

Sourced from golang.org/x/tools's releases.

gopls/v0.11.0

This is a small release containing new integrations of vulnerability analysis.

Vulnerability analysis for go.mod files can be enabled by configuring the "vulncheck" setting to "Imports". For more information on vulnerability management, see the Vulnerability Management for Go blog post.

Support changes

This release removes support for the "experimentalUseInvalidMetadata" setting, as described in the v0.10.0 release. Other settings slated for deprecation in that release remain temporarily supported, but will be removed in v0.12.0.

New Features

Analyzing dependencies for vulnerabilities

This release offers two different options for detecting vulnerabilities in dependencies. Both are backed by the Go vulnerability database (https://vuln.go.dev) and complement each other.

  • Imports-based scanning, enabled by the "vulncheck": "Imports" setting, reports vulnerabilities by scanning the set of packages imported in the workspace. This is fast, but may report more false positives.
  • Integration of the golang.org/x/vuln/cmd/govulncheck command-line tool performs a more precise analysis based on-call graph reachability, with fewer false positives. Because it is slower to compute, it must be manually triggered by using "Run govulncheck to verify" code actions or the "codelenses.run_govulncheck" code lens on go.mod files.
vulncheck.mp4

Additional checks for the loopclosure analyzer

The loopclosure analyzer, which reports problematic references from a nested function to a variable of an enclosing loop, has been improved to catch more cases. In particular, it now reports when subtests run in parallel with the loop, a mistake that often results in all but the final test case being skipped.

image

Configuration changes

  • The "vulncheck" setting controls vulnerability analysis based on the Go vulnerability database. If set to "Imports", gopls will compute diagnostics related to vulnerabilities in dependencies, and will present them in go.mod files.
  • The "codelenses.run_govulncheck" setting controls the presence of code lenses that run the govulncheck command, which takes longer but produces more accurate vulnerability reporting based on call-graph reachability.

Bug fixes

This version of gopls includes fixes to several bugs, notably:

A full list of all issues fixed can be found in the gopls/v0.11.0 milestone. To report a new problem, please file a new issue at https://go.dev/issues/new.

Thank you to our contributors

@​Arsen6331, @​SN9NV, @​adonovan, @​bcmills, @​dle8, @​findleyr, @​hyangah, @​pjweinbgo, @​suzmue

gopls/v0.10.1

This release contains a fix for golang/go#56505: a new crash during method completion on variables of type *error.

... (truncated)

Commits
  • c16d0be cmd/gonew: add new tool for starting a module by copying one
  • 304e203 internal/edit: copy cmd/internal/edit
  • 82861e0 gopls/internal/lsp/source: reinstate equalOrigin for references check
  • 1561060 gopls/internal/lsp/source: fix incorrect 'origin' logic for named types
  • fe58b07 gopls/internal/lsp/source: fix renaming of type parameters
  • 3a3c169 gopls/internal/lsp/source: refresh embeddirective analyzer docs
  • 03562de refactor/satisfy/find: composite lits may have type parameter type
  • bacac14 gopls/internal/lsp/source: Add SuggestedFix for embeddirective Analyzer
  • 38606b3 gopls/internal/lsp/cache: keep analysis progress reports on one line
  • e8cdaf4 gopls/internal/lsp/cache: fast-path for type-checking active packages
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [golang.org/x/tools](https://github.com/golang/tools) from 0.9.1 to 0.11.1.
- [Release notes](https://github.com/golang/tools/releases)
- [Commits](golang/tools@v0.9.1...v0.11.1)

---
updated-dependencies:
- dependency-name: golang.org/x/tools
  dependency-type: indirect
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jul 31, 2023
@codecov-commenter
Copy link

Codecov Report

Merging #16336 (4904f70) into main (9637b07) will decrease coverage by 0.15%.
The diff coverage is n/a.

❗ Your organization is not using the GitHub App Integration. As a result you may experience degraded service beginning May 15th. Please install the Github App Integration for your organization. Read more.

@@            Coverage Diff             @@
##             main   #16336      +/-   ##
==========================================
- Coverage   70.14%   69.99%   -0.15%     
==========================================
  Files         414      414              
  Lines       34973    34973              
==========================================
- Hits        24533    24481      -52     
- Misses       9057     9094      +37     
- Partials     1383     1398      +15     
Flag Coverage Δ
all 69.99% <ø> (-0.15%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 20 files with indirect coverage changes

📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more

@jmhbnz
Copy link
Member

jmhbnz commented Aug 3, 2023

@jmhbnz jmhbnz closed this Aug 3, 2023
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Aug 3, 2023

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot bot deleted the dependabot/go_modules/tools/mod/golang.org/x/tools-0.11.1 branch August 3, 2023 01:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Development

Successfully merging this pull request may close these issues.

2 participants