-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
check govuln
logs on CI
#14
Comments
For me, the serif report is always empty
what I get in the
Maybe I am doing something wrong here, but do you have an example of GH workflow producing meaningful reports? |
Here my setup
|
The issue here might be that the vulnerability only shows up on Windows, at least that's what I suggest on your first message. But if not other specified default runners of GitHub actions are Linux devices. And as stated in the Readme as limitation, govulncheck only considers vulnerabilities for the current OS and not for all possible OS |
Is that the only thing returned by vulncheck for your repository? Or are there any other results being returned that are not linked to direct code usage but imports ?
|
I have Mac and
The problem is when using
Here not only I can't see the output of |
So basically the action wrapper around it makes it unusable for me, and that's a pity since the tool has potential |
You can set an ENV |
@marcello33 actually you don't need to do the above steps. I found out that they drastically changed the JSON Report format. Which breaks my action. I will be working on a fix for that, which considers the new report format |
Thanks @Templum, that'd be very much appreciated. If it works well, I'm planning to integrate it in all our organization's repos. It'd also makes sense to use a fixed govuln version instead of 'latest' then. |
I will ping you if there is a version available for testing, well after all the cli itself is still experimental hence it is kind of expected that some like that can happen. In the new version parsing will be adjusted to ensure error handling is telling people that maybe this version broke something. Ideally they won't flip around the report structure on that scale anymore and just resort to adding fields or removing them |
Also, is there a way to use the |
Could you give Initial tests on my playground look promising |
Sure, let me try |
@Templum, same results. Local
Action output only reports 2 vulnerabilities, does not display them, and no serif report is present
|
Actually I'm working on that behaviour, the important note for me here would be the :
As up to know this action only created results for active call sites. But if you never call, there is nothing. I'm working right now on a small addition that also honors those hits. |
That aside many thanks for testing it out and getting back to me so fast. Highly appreciated. |
Not quite sure if I got your point, sorry But - just to be clear - for me the action still does not work, as
|
Could you please give the version from above another shot, just finished pushing the changes. That should cover your use-case. What I was referring to previously was that the action would only create scanning actions for direct calling code. Meaning your code calls a vulnerability, it did not consider imports. Which it now does |
Thanks, running it again! |
Hey @Templum , same again
|
Ok, thanks
|
@marcello33 well sorry, seems like this was not clear to you. I thought my Readme makes it clear that data is reported to the security tab. The idea here is that govulncheck does not support the silencing of findings. Meaning it could block flows unjustified. Hence I went with this path, if you want to fail on the spot you can use Regarding your second point, this seems to be related to environment differences. Data is taken raw from govulncheck. Your action runs 1.18, locally you run 1.19. |
@marcello33 I adjusted the Readme to have a short section under Usage. That shows where to locate the results. If there is nothing from your side that speaks against closing this, I would probably go ahead and merge the changes and release a new version |
As I was referring to the main branch and you refer to a PR/Branch, they seem to be located in different locations. But overall the data looks correct. Regarding your side notes:
- name: Scan for Vulnerabilities in Code
uses: Templum/govulncheck-action@fix/investigate
env:
DEBUG: "true"
- name: Upload Report
uses: actions/upload-artifact@v3
with:
name: raw-report
path: raw-report.json |
Hey @Templum I'm closing it as with the full report I have all the means for double checking |
Many thanks for your feedback and efforts in working on this, we can take the other things individually in case you notice issues. |
@Templum thank you for your support and effort Btw, I'd only really check carefully the The If you want, I can open a separate issue for that and help you debug/test it ;) |
@marcello33 feel free to open an Issue. We can then work on it. |
When running this on the my pipeline, I get the total number of vulnerabilities but not detailed logs, which makes impossible for me to understand which vulnerability I should fix
Is there a way to get the
govuln
output at pipeline runtime, such as (for example)The text was updated successfully, but these errors were encountered: