From 2a9f1194d13498e7dba5087707270ef238ad3443 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Einar=20Bjarni=20Halld=C3=B3rsson?= Date: Mon, 26 May 2025 15:19:48 +0100 Subject: security/govulncheck: New port: Database client and tools for the Go vulnerability database Govulncheck reports known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application. - Submitter becomes maintainer WWW: https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck PR: 285627 --- security/govulncheck/files/patch-internal_test_testenv.go | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 security/govulncheck/files/patch-internal_test_testenv.go (limited to 'security/govulncheck/files/patch-internal_test_testenv.go') diff --git a/security/govulncheck/files/patch-internal_test_testenv.go b/security/govulncheck/files/patch-internal_test_testenv.go new file mode 100644 index 000000000000..f28ee2f16524 --- /dev/null +++ b/security/govulncheck/files/patch-internal_test_testenv.go @@ -0,0 +1,11 @@ +--- internal/test/testenv.go.orig 2025-05-08 09:18:33 UTC ++++ internal/test/testenv.go +@@ -14,7 +14,7 @@ func NeedsGoEnv(t testing.TB) { + func NeedsGoEnv(t testing.TB) { + t.Helper() + +- if _, err := exec.LookPath("go"); err != nil { ++ if _, err := exec.LookPath("%%GO_CMD%%"); err != nil { + t.Skip("skipping test: can't run go env") + } + } -- cgit v1.2.3