For completeness, here's the Coverity output that we generated while looking at this. The handful of FORWARD_NULL checks looks like Coverity not understanding golang, but the handful of cases of: "Passing null pointer "res" to "CheckResponse", which dereferences it." that I inspected all looked like legitimate findings that should be addressed.
The "Execution cannot reach this statement:" results probably need inspection. Probably all the old crypto stuff is known and expected. And probably the integer comparisons that will never be true are known and expected. Thanks ** Attachment added: "coverity.txt" https://bugs.launchpad.net/ubuntu/+source/google-osconfig-agent/+bug/1891934/+attachment/5467319/+files/coverity.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891934 Title: [MIR] google-osconfig-agent To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/google-osconfig-agent/+bug/1891934/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs