-
Notifications
You must be signed in to change notification settings - Fork 18.3k
Description
Once a new Go bugfix is released govulncheck
will start to report issues from the standard library if security flaws were fixed in the latest bugfix. This causes a lot of failed builds across a fleet of CI jobs because the underlying machine may not have been upgraded yet. Failing builds for an issue that teams will address but haven't had time to solve yet causes frustration and pushes teams to silence warnings or rush through upgrades.
One option would be to delay reports for a time.Duration
value. This would let teams upgrade dependencies and Go versions before seeing failures.
I'm proposing that the govulncheck
command accepts a -stability-days N
flag where N
is a value parsable by time.ParseDuration
. The check could read a vulnerabilities published
field in the OSV format and use the machines local time for comparison.
Prior art: https://docs.renovatebot.com/configuration-options/#stabilitydays