Robert, I believe what is being suggested is a tool that integrates into
CVE reports automatically and tells us if we have a dependency with a
security issue (not just whether there is a newer version). Also, there is
a sweet draft PR to add Go modules[1].

1: https://github.com/apache/beam/pull/8354

On Fri, Apr 19, 2019 at 10:12 AM Robert Burke <rob...@frantil.com> wrote:

> If we move to Go Modules, the go.mod file specifies direct dependencies
> and versions, and the go.sum file includes checksums of the full transitive
> set of dependencies. There's likely going to be a tool for detecting if an
> update is possible, if one doesn't exist in the go tooling already.
>
> On Fri, 19 Apr 2019 at 09:44, Lukasz Cwik <lc...@google.com> wrote:
>
>> This seems worthwhile IMO.
>>
>> Ahmet, Pyup[1] is free for open source projects and has an API that
>> allows for dependency checking. They can scan Github repos automatically it
>> seems but it may not be compatible with how Apache permissions with Github
>> work. I'm not sure if there is such a thing for Go.
>>
>> 1: https://pyup.io/
>>
>> On Fri, Apr 19, 2019 at 2:31 AM Ismaël Mejía <ieme...@gmail.com> wrote:
>>
>>> I want to bring this subject back, any chance we can get this running
>>> in or main repo maybe in a weekly basis like we do for the dependency
>>> reports. It looks totallly worth.
>>>
>>> On Fri, Mar 1, 2019 at 2:05 AM Ahmet Altay <al...@google.com> wrote:
>>> >
>>> > Thank you, I agree this is very important. Does anyone know a similar
>>> tool for python and go?
>>> >
>>> > On Thu, Feb 28, 2019 at 8:26 AM Etienne Chauchot <echauc...@apache.org>
>>> wrote:
>>> >>
>>> >> Hi guys,
>>> >>
>>> >> I came by this [1] gradle plugin that is a client to the Sonatype OSS
>>> Index CVE database.
>>> >>
>>> >> I have set it up here in a branch [2], though the cache is not
>>> configured and the number of requests is limited. It can be run with
>>> "gradle --info audit"
>>> >>
>>> >> It could be nice to have something like this to track the CVEs in the
>>> libs we use. I know we have been spammed by libs upgrade automatic requests
>>> in the past but CVE are more important IMHO.
>>> >>
>>> >> This plugin is in BSD-3-Clause which is compatible with Apache V2
>>> licence [3]
>>> >>
>>> >> WDYT ?
>>> >>
>>> >> Etienne
>>> >>
>>> >> [1] https://github.com/OSSIndex/ossindex-gradle-plugin
>>> >> [2] https://github.com/echauchot/beam/tree/cve_audit_plugin
>>> >> [3] https://www.apache.org/legal/resolved.html
>>>
>>

Reply via email to