Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): Bump golang.org/x/tools from 0.10.0 to 0.11.0 in /packages/@jsii/go-runtime/jsii-runtime-go #4170

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 6, 2023

Bumps golang.org/x/tools from 0.10.0 to 0.11.0.

Release notes

Sourced from golang.org/x/tools's releases.

gopls/v0.11.0

This is a small release containing new integrations of vulnerability analysis.

Vulnerability analysis for go.mod files can be enabled by configuring the "vulncheck" setting to "Imports". For more information on vulnerability management, see the Vulnerability Management for Go blog post.

Support changes

This release removes support for the "experimentalUseInvalidMetadata" setting, as described in the v0.10.0 release. Other settings slated for deprecation in that release remain temporarily supported, but will be removed in v0.12.0.

New Features

Analyzing dependencies for vulnerabilities

This release offers two different options for detecting vulnerabilities in dependencies. Both are backed by the Go vulnerability database (https://vuln.go.dev) and complement each other.

  • Imports-based scanning, enabled by the "vulncheck": "Imports" setting, reports vulnerabilities by scanning the set of packages imported in the workspace. This is fast, but may report more false positives.
  • Integration of the golang.org/x/vuln/cmd/govulncheck command-line tool performs a more precise analysis based on-call graph reachability, with fewer false positives. Because it is slower to compute, it must be manually triggered by using "Run govulncheck to verify" code actions or the "codelenses.run_govulncheck" code lens on go.mod files.
vulncheck.mp4

Additional checks for the loopclosure analyzer

The loopclosure analyzer, which reports problematic references from a nested function to a variable of an enclosing loop, has been improved to catch more cases. In particular, it now reports when subtests run in parallel with the loop, a mistake that often results in all but the final test case being skipped.

image

Configuration changes

  • The "vulncheck" setting controls vulnerability analysis based on the Go vulnerability database. If set to "Imports", gopls will compute diagnostics related to vulnerabilities in dependencies, and will present them in go.mod files.
  • The "codelenses.run_govulncheck" setting controls the presence of code lenses that run the govulncheck command, which takes longer but produces more accurate vulnerability reporting based on call-graph reachability.

Bug fixes

This version of gopls includes fixes to several bugs, notably:

A full list of all issues fixed can be found in the gopls/v0.11.0 milestone. To report a new problem, please file a new issue at https://go.dev/issues/new.

Thank you to our contributors

@​Arsen6331, @​SN9NV, @​adonovan, @​bcmills, @​dle8, @​findleyr, @​hyangah, @​pjweinbgo, @​suzmue

gopls/v0.10.1

This release contains a fix for golang/go#56505: a new crash during method completion on variables of type *error.

... (truncated)

Commits
  • 675bf3c go.mod: update golang.org/x dependencies
  • ad52c1c go/ssa/interp: support conversions to slices of named bytes
  • 14ec3c0 gopls/doc/contributing.md: document error handling strategies
  • c495364 go/packages/gopackages: document -mode flag
  • 87ad891 gopls/internal/lsp/source/typerefs: move test into _test.go
  • 27fd94e internal/fastwalk: doc formatting fixes (including godoc links)
  • d362be0 gopls/internal/lsp/filecache: reduce GC frequency
  • 969078b Revert "go/analysis: add Sizes that matches gc size computations"
  • 5aa6acb go/analysis: add Sizes that matches gc size computations
  • 5a89a3b go/vcs: delete
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies This issue is a problem in a dependency or a pull request that updates a dependency file. language/go Regarding GoLang bindings labels Jul 6, 2023
@dependabot dependabot bot force-pushed the dependabot/go_modules/packages/jsii/go-runtime/jsii-runtime-go/golang.org/x/tools-0.11.0 branch from a0935a7 to 454fb37 Compare July 11, 2023 10:04
@mrgrain
Copy link
Contributor

mrgrain commented Jul 11, 2023

@dependabot recreate

Bumps [golang.org/x/tools](https://github.com/golang/tools) from 0.10.0 to 0.11.0.
- [Release notes](https://github.com/golang/tools/releases)
- [Commits](golang/tools@v0.10.0...v0.11.0)

---
updated-dependencies:
- dependency-name: golang.org/x/tools
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/packages/jsii/go-runtime/jsii-runtime-go/golang.org/x/tools-0.11.0 branch from 454fb37 to 85c7d1f Compare July 11, 2023 10:18
@mergify
Copy link
Contributor

mergify bot commented Jul 11, 2023

Thank you for contributing! ❤️ I will now look into making sure the PR is up-to-date, then proceed to try and merge it!

@mergify mergify bot added the pr/ready-to-merge This PR is ready to be merged. label Jul 11, 2023
@mergify
Copy link
Contributor

mergify bot commented Jul 11, 2023

Merging (with squash)...

…me/jsii-runtime-go/golang.org/x/tools-0.11.0
@mergify mergify bot merged commit c87b684 into main Jul 11, 2023
@mergify mergify bot deleted the dependabot/go_modules/packages/jsii/go-runtime/jsii-runtime-go/golang.org/x/tools-0.11.0 branch July 11, 2023 12:18
@mergify
Copy link
Contributor

mergify bot commented Jul 11, 2023

Merging (with squash)...

@mergify mergify bot removed the pr/ready-to-merge This PR is ready to be merged. label Jul 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-approve dependencies This issue is a problem in a dependency or a pull request that updates a dependency file. language/go Regarding GoLang bindings
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant