Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix go.mod to fix CodeQL workflows #5364

Closed
wants to merge 1 commit into from
Closed

fix go.mod to fix CodeQL workflows #5364

wants to merge 1 commit into from

Conversation

jkowall
Copy link
Contributor

@jkowall jkowall commented Apr 16, 2024

Correct the issue in codeQL

image

Checklist

Signed-off-by: Jonah Kowall <jkowall@kowall.net>
@jkowall jkowall requested a review from a team as a code owner April 16, 2024 20:58
Copy link

codecov bot commented Apr 16, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 95.20%. Comparing base (9073fe3) to head (6825ffd).

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #5364      +/-   ##
==========================================
- Coverage   95.21%   95.20%   -0.02%     
==========================================
  Files         343      343              
  Lines       16777    16777              
==========================================
- Hits        15974    15972       -2     
- Misses        605      606       +1     
- Partials      198      199       +1     
Flag Coverage Δ
badger 10.50% <ø> (ø)
cassandra-3.x 18.43% <ø> (ø)
cassandra-4.x 18.43% <ø> (ø)
elasticsearch-5.x 20.88% <ø> (-0.02%) ⬇️
elasticsearch-6.x 20.89% <ø> (+0.01%) ⬆️
elasticsearch-7.x 20.93% <ø> (-0.02%) ⬇️
elasticsearch-8.x 21.13% <ø> (+0.01%) ⬆️
grpc 14.60% <ø> (ø)
kafka 10.17% <ø> (ø)
opensearch-1.x 20.99% <ø> (+0.01%) ⬆️
opensearch-2.x 20.98% <ø> (-0.02%) ⬇️
unittests 91.74% <ø> (-0.02%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@@ -1,6 +1,6 @@
module github.com/jaegertracing/jaeger

go 1.21
go 1.21.0
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

according to LLM specifying patch version in this directive is not recommended. The directive controls source code compatibility, which is not affected by the patch version.

On that topic, most of our CI workflows are using go-version: 1.22.x. It's fine for test-only workflows, but others are used to build final artifacts, and you could argue not fixing a precise patch version means the builds are not repeatable. That sounds like the issue the security scanner should be flagging, not the go.mod directive

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For reference, all official examples of go directive use major.minor version -- https://go.dev/ref/mod#go-mod-file-go

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems to be conflicting, as you can see from CodeQL we are getting a warning for not using the 1.N**.P** part of the toolchain in the file. I guess we can ignore the warning.

@jkowall jkowall closed this Apr 17, 2024
@jkowall jkowall deleted the fix-go-ver branch April 17, 2024 14:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants