go icon indicating copy to clipboard operation
go copied to clipboard

x/vuln/internal/vulncheck: TestCommand failures

Open gopherbot opened this issue 1 year ago • 20 comments

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`

Issue created automatically to collect these failures.

Example (log):

main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.13s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 21 '23 19:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-21 19:00 android-386-emu vuln@b9d1eb91 go@130a7f8e x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.13s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-21 19:00 android-amd64-emu vuln@b9d1eb91 go@130a7f8e x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (1.27s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 21 '23 19:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-21 19:00 android-amd64-emu vuln@b9d1eb91 go@ca9947db x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.12s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 24 '23 14:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-21 19:00 android-386-emu vuln@b9d1eb91 go@ca9947db x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.12s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-21 19:00 android-amd64-emu vuln@b9d1eb91 go@ca9947db x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 24 '23 14:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-21 19:00 android-386-emu vuln@b9d1eb91 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.10s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 24 '23 18:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-21 19:00 android-amd64-emu vuln@b9d1eb91 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.12s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:45 android-386-emu vuln@e340fa10 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:45 android-amd64-emu vuln@e340fa10 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-386-emu vuln@3db81ded go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-amd64-emu vuln@3db81ded go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-386-emu vuln@ba0df736 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.09s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-amd64-emu vuln@ba0df736 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.10s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-386-emu vuln@b43f5afc go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-amd64-emu vuln@b43f5afc go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.10s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 24 '23 19:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "golang.org/x/vuln/internal/vulncheck" && test == "TestCommand"
2023-04-24 18:45 android-386-emu vuln@56cdba20 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.10s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:45 android-amd64-emu vuln@56cdba20 go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.08s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
2023-04-24 18:46 android-amd64-emu vuln@b43f5afc go@c3c53a2c x/vuln/internal/vulncheck.TestCommand (log)
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan
--- FAIL: TestCommand (0.11s)
    buildtest.go:78: exit status 1
main.go:13:2: no required module provides package golang.org/x/vuln/internal/scan; to add it:
	go get golang.org/x/vuln/internal/scan

watchflakes

gopherbot avatar Apr 24 '23 19:04 gopherbot

This is due to some wonkiness in how the android build environment copies over the source tree, which I'm hoping to resolve in CL 488655 by making the test environment less wonky.

bcmills avatar Apr 25 '23 16:04 bcmills

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-03-07 01:03 freebsd-riscv64-unmatched vuln@c899e911 go@84609d87 x/vuln/cmd/govulncheck.TestCommand (log)
vuln.go:6:2: github.com/tidwall/[email protected]: Get "https://proxy.golang.org/github.com/tidwall/gjson/@v/v1.9.2.zip": Service Unavailable
vuln.go:7:2: golang.org/x/[email protected]: Get "https://proxy.golang.org/golang.org/x/text/@v/v0.3.0.zip": Service Unavailable
--- FAIL: TestCommand (42.88s)
    buildtest.go:78: exit status 1
2023-03-23 18:53 freebsd-riscv64-unmatched vuln@0b459e67 go@3d5391ed x/vuln/cmd/govulncheck.TestCommand (log)
vuln.go:6:2: github.com/tidwall/[email protected]: Get "https://proxy.golang.org/github.com/tidwall/gjson/@v/v1.9.2.zip": Service Unavailable
--- FAIL: TestCommand (39.37s)
    buildtest.go:76: exit status 1
2023-03-30 14:18 linux-riscv64-unmatched vuln@701fad30 go@dead7887 x/vuln/cmd/govulncheck.TestCommand (log)
vuln.go:6:2: github.com/tidwall/[email protected]: Get "https://goproxy.cn/github.com/tidwall/gjson/@v/v1.9.2.zip": dial tcp: lookup goproxy.cn on 127.0.0.53:53: read udp 127.0.0.1:51633->127.0.0.53:53: i/o timeout
--- FAIL: TestCommand (61.62s)
    buildtest.go:76: exit status 1
2023-04-21 19:00 freebsd-riscv64-unmatched vuln@b9d1eb91 go@5a10d8a2 x/vuln/cmd/govulncheck.TestCommand (log)
main.go:7:2: golang.org/x/[email protected]: Get "https://proxy.golang.org/golang.org/x/text/@v/v0.3.5.zip": Service Unavailable
--- FAIL: TestCommand (52.17s)
    buildtest.go:78: exit status 1
2023-04-27 04:10 android-386-emu vuln@e55aa3a7 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (1.61s)
    buildtest.go:78: exit status 2
2023-04-27 04:10 android-amd64-emu vuln@e55aa3a7 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (0.56s)
    buildtest.go:78: exit status 2

watchflakes

gopherbot avatar Apr 27 '23 12:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-04-27 19:46 android-386-emu vuln@84fbccd9 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (1.74s)
    buildtest.go:78: exit status 2
2023-04-27 19:46 android-amd64-emu vuln@84fbccd9 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (0.49s)
    buildtest.go:78: exit status 2

watchflakes

gopherbot avatar Apr 27 '23 19:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-04-27 21:15 android-amd64-emu vuln@da6deb85 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (0.52s)
    buildtest.go:78: exit status 2

watchflakes

gopherbot avatar Apr 27 '23 21:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-04-27 21:15 android-386-emu vuln@da6deb85 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (1.96s)
    buildtest.go:78: exit status 2

watchflakes

gopherbot avatar Apr 27 '23 21:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-04-27 21:17 android-386-emu vuln@fece1907 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (1.49s)
    buildtest.go:78: exit status 2
2023-04-27 21:17 android-amd64-emu vuln@fece1907 go@c3c53a2c TestCommand (log)
--- FAIL: TestCommand (0.50s)
    buildtest.go:78: exit status 2

watchflakes

gopherbot avatar Apr 27 '23 22:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2023-04-14 20:56 freebsd-riscv64-unmatched vuln@d3666e3e go@0853f8ca x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (81.46s)
    cmdtest.go:467: $ govulncheck -h
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-freebsd-riscv64-unmatched/tmp/buildtest2882558175/strip
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-freebsd-riscv64-unmatched/tmp/buildtest3683194429/vuln
    cmdtest.go:467: $ govulncheck -C /tmp/workdir-host-freebsd-riscv64-unmatched/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/vuln -v .
    cmdtest.go:480: Govulncheck is a tool for finding known vulnerabilities.

        Usage:

        	govulncheck [flags] [patterns]
...
    --- FAIL: TestCommand/testdata/strip (0.10s)
        cmdtest.go:336: testdata/strip.ct:3: want=-, got=+
            $ govulncheck -mode=binary ${strip_binary} --> FAIL 3
              []string{
              	"govulncheck is an experimental tool. Share feedback at https://g"...,
              	"",
              	"Using [email protected] with",
              	strings.Join({
              		"vulnerability data from testdata/vulndb",
            + 		"-v1",
...

          Standard library
            Found in: net/[email protected]
            Fixed in: net/[email protected]

            Call stacks in your code:
              #1: for function ListenAndServe
                golang.org/stdlib.main
                    .../stdlib.go:17:31
                net/http.ListenAndServe
2023-04-14 20:56 linux-riscv64-unmatched vuln@d3666e3e go@f8162a0e x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (51.86s)
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-linux-riscv64-unmatched/tmp/buildtest225959449/vuln
    cmdtest.go:467: $ govulncheck -C /tmp/workdir-host-linux-riscv64-unmatched/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/stdlib -v .
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-linux-riscv64-unmatched/tmp/buildtest1259537293/strip
    cmdtest.go:467: $ govulncheck -C /tmp/workdir-host-linux-riscv64-unmatched/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/nogomod .
    cmdtest.go:480: govulncheck is an experimental tool. Share feedback at https://go.dev/s/govulncheck-feedback.

        Using [email protected] with
        vulnerability data from testdata/vulndb-v1 (last modified 01 Jan 21 00:00 UTC).

...
    --- FAIL: TestCommand/testdata/strip (0.03s)
        cmdtest.go:336: testdata/strip.ct:3: want=-, got=+
            $ govulncheck -mode=binary ${strip_binary} --> FAIL 3
              []string{
              	"govulncheck is an experimental tool. Share feedback at https://g"...,
              	"",
              	"Using [email protected] with",
              	strings.Join({
              		"vulnerability data from testdata/vulndb",
            + 		"-v1",
...

          Standard library
            Found in: net/[email protected]
            Fixed in: net/[email protected]

            Call stacks in your code:
              #1: for function ListenAndServe
                golang.org/stdlib.main
                    .../stdlib.go:17:31
                net/http.ListenAndServe
2023-04-14 20:56 linux-riscv64-unmatched vuln@d3666e3e go@0853f8ca x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (81.39s)
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-linux-riscv64-unmatched/tmp/buildtest1891071436/vuln
    cmdtest.go:467: $ govulncheck -C /tmp/workdir-host-linux-riscv64-unmatched/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/vuln -v .
    cmdtest.go:467: $ govulncheck -h
    cmdtest.go:467: $ govulncheck -mode=binary /tmp/workdir-host-linux-riscv64-unmatched/tmp/buildtest3672020014/strip
    cmdtest.go:480: Govulncheck is a tool for finding known vulnerabilities.

        Usage:

        	govulncheck [flags] [patterns]
...
    --- FAIL: TestCommand/testdata/strip (0.11s)
        cmdtest.go:336: testdata/strip.ct:3: want=-, got=+
            $ govulncheck -mode=binary ${strip_binary} --> FAIL 3
              []string{
              	"govulncheck is an experimental tool. Share feedback at https://g"...,
              	"",
              	"Using [email protected] with",
              	strings.Join({
              		"vulnerability data from testdata/vulndb",
            + 		"-v1",
...

          Standard library
            Found in: net/[email protected]
            Fixed in: net/[email protected]

            Call stacks in your code:
              #1: for function ListenAndServe
                golang.org/stdlib.main
                    .../stdlib.go:17:31
                net/http.ListenAndServe
2023-04-14 20:56 netbsd-arm-bsiegert vuln@d3666e3e go@0853f8ca x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (52.02s)
    cmdtest.go:467: $ govulncheck -mode=binary /var/gobuilder/buildlet/tmp/buildtest4096252026/vuln
    cmdtest.go:467: $ govulncheck -C /var/gobuilder/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/stdlib -v .
    cmdtest.go:467: $ govulncheck -C /var/gobuilder/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/nogomod .
    cmdtest.go:467: $ govulncheck -C /var/gobuilder/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/modules/vuln -v .
    cmdtest.go:480: govulncheck is an experimental tool. Share feedback at https://go.dev/s/govulncheck-feedback.

        Using [email protected] with
        vulnerability data from testdata/vulndb-v1 (last modified 01 Jan 21 00:00 UTC).

...
    --- FAIL: TestCommand/testdata/strip (0.06s)
        cmdtest.go:336: testdata/strip.ct:3: want=-, got=+
            $ govulncheck -mode=binary ${strip_binary} --> FAIL 3
              []string{
              	"govulncheck is an experimental tool. Share feedback at https://g"...,
              	"",
              	"Using [email protected] with",
              	strings.Join({
              		"vulnerability data from testdata/vulndb",
            + 		"-v1",
...

          Standard library
            Found in: net/[email protected]
            Fixed in: net/[email protected]

            Call stacks in your code:
              #1: for function ListenAndServe
                golang.org/stdlib.main
                    .../stdlib.go:17:31
                net/http.ListenAndServe
2023-05-15 16:23 freebsd-riscv64-unmatched vuln@c915f60f go@04e24728 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (84.47s)
    --- FAIL: TestCommand/testdata/sourcebadpattern (17.64s)
        cmdtest.go:336: testdata/sourcebadpattern.ct:1: want=-, got=+
            $ govulncheck -C ${moddir}/vuln blah --> FAIL 1
              []string{
              	... // 5 identical elements
              	"There are errors with the provided package patterns:",
              	"",
              	strings.Join({
              		"-: package ",
            - 		"foo is not in GOROOT (/tmp/foo",
            + 		"blah is not in std (/tmp/workdir-host-freebsd-riscv64-unmatched/",
            + 		"go/src/blah",
              		")",
              	}, ""),
              	"",
              	"For details on package patterns, see https://pkg.go.dev/cmd/go#h"...,
              }
2023-05-15 16:23 netbsd-arm-bsiegert vuln@c915f60f go@04e24728 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (60.19s)
    --- FAIL: TestCommand/testdata/sourcebadpattern (73.96s)
        cmdtest.go:336: testdata/sourcebadpattern.ct:1: want=-, got=+
            $ govulncheck -C ${moddir}/vuln blah --> FAIL 1
              []string{
              	... // 5 identical elements
              	"There are errors with the provided package patterns:",
              	"",
              	strings.Join({
              		"-: package ",
            - 		"foo is not in GOROOT (/tmp/foo",
            + 		"blah is not in std (/var/gobuilder/buildlet/go/src/blah",
              		")",
              	}, ""),
              	"",
              	"For details on package patterns, see https://pkg.go.dev/cmd/go#h"...,
              }
2023-05-15 16:23 netbsd-arm-bsiegert vuln@c915f60f go@7213f2e7 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (60.88s)
    --- FAIL: TestCommand/testdata/sourcebadpattern (42.18s)
        cmdtest.go:336: testdata/sourcebadpattern.ct:1: want=-, got=+
            $ govulncheck -C ${moddir}/vuln blah --> FAIL 1
              []string{
              	... // 5 identical elements
              	"There are errors with the provided package patterns:",
              	"",
              	strings.Join({
              		"-: package ",
            - 		"foo is not in GOROOT (/tmp/foo",
            + 		"blah is not in std (/var/gobuilder/buildlet/go/src/blah",
              		")",
              	}, ""),
              	"",
              	"For details on package patterns, see https://pkg.go.dev/cmd/go#h"...,
              }
2023-05-15 16:23 netbsd-arm-bsiegert vuln@c915f60f go@ff3aefba x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (58.62s)
    --- FAIL: TestCommand/testdata/sourcebadpattern (30.96s)
        cmdtest.go:336: testdata/sourcebadpattern.ct:1: want=-, got=+
            $ govulncheck -C ${moddir}/vuln blah --> FAIL 1
              []string{
              	... // 5 identical elements
              	"There are errors with the provided package patterns:",
              	"",
              	strings.Join({
              		"-: package ",
            - 		"foo is not in GOROOT (/tmp/foo",
            + 		"blah is not in std (/var/gobuilder/buildlet/go/src/blah",
              		")",
              	}, ""),
              	"",
              	"For details on package patterns, see https://pkg.go.dev/cmd/go#h"...,
              }

watchflakes

gopherbot avatar May 17 '23 14:05 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-01-18 21:35 x_vuln-go1.22-windows-amd64-longtest vuln@4b54a8b0 release-branch.go1.22@66f8e1e8 x/vuln/cmd/govulncheck.TestCommand (log)
=== RUN   TestCommand
go: downloading github.com/tidwall/gjson v1.9.2
go: downloading github.com/tidwall/match v1.1.0
go: downloading github.com/tidwall/pretty v1.2.0
error obtaining VCS status: exit status 128
	Use -buildvcs=false to disable VCS stamping.
    buildtest.go:78: exit status 1
--- FAIL: TestCommand (0.92s)

watchflakes

gopherbot avatar Jan 26 '24 19:01 gopherbot

Change https://go.dev/cl/560376 mentions this issue: internal/test: add more info on GoBuild failures

gopherbot avatar Feb 01 '24 14:02 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-02-06 16:18 darwin-amd64-longtest vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (38.91s)
    --- FAIL: TestCommand//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (49.74s)
        cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:18 linux-386-longtest vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (7.52s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (15.53s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:18 linux-amd64-longtest vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (6.25s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (13.21s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:18 linux-amd64-longtest-race vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (12.94s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (28.87s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:18 linux-arm64-longtest vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (4.04s)
    --- FAIL: TestCommand//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (7.98s)
        cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:18 windows-amd64-longtest vuln@0b50c252 go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (10.33s)
    --- FAIL: TestCommand/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\testfiles\source-call\source_stdlib_text (14.95s)
        cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\testfiles\source-call\source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 darwin-amd64-longtest vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (31.61s)
    --- FAIL: TestCommand//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (41.21s)
        cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 linux-386-longtest vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (7.49s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (10.81s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 linux-amd64-longtest vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (4.17s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (9.95s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 linux-amd64-longtest-race vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (19.41s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (51.82s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 linux-arm64-longtest vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (4.05s)
    --- FAIL: TestCommand//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text (6.34s)
        cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }
2024-02-06 16:30 windows-amd64-longtest vuln@c154f6ab go@4b0e0863 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (8.03s)
    --- FAIL: TestCommand/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\testfiles\source-call\source_stdlib_text (11.72s)
        cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\testfiles\source-call\source_stdlib_text.ct:26: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -show=traces . --> FAIL 3
              []string{
              	... // 13 identical elements
              	"      #1: for function net/http.ListenAndServe",
              	"        .../stdlib.go:17:31: golang.org/stdlib.main",
              	strings.Join({
              		"        .../server.go:343",
            - 		"9",
            + 		"6",
              		":6: net/http.ListenAndServe",
              	}, ""),
              	"",
              	"Your code is affected by 1 vulnerability from the Go standard li"...,
              	... // 3 identical elements
              }

watchflakes

gopherbot avatar Feb 06 '24 19:02 gopherbot

Should be addressed by https://go-review.git.corp.google.com/c/vuln/+/562215

zpavlinovic avatar Feb 06 '24 19:02 zpavlinovic

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-02-13 17:00 linux-386-longtest vuln@26c8e26c go@e17e5308 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (5.35s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json (6.49s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/replace -json ./...
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
...
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json (8.62s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -json .
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
            - 	`        "package": "net/http"`,
              	"      }",
              	"    ]",
              	... // 46 identical elements
              }
2024-02-13 17:00 linux-amd64-longtest vuln@26c8e26c go@e17e5308 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (4.66s)
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json (4.39s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/replace -json ./...
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
...
    --- FAIL: TestCommand//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json (6.72s)
        cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -json .
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
            - 	`        "package": "net/http"`,
              	"      }",
              	"    ]",
              	... // 46 identical elements
              }
2024-02-13 17:00 linux-arm64-longtest vuln@26c8e26c go@e17e5308 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (3.97s)
    --- FAIL: TestCommand//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json (3.84s)
        cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/replace -json ./...
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
...
    --- FAIL: TestCommand//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json (5.26s)
        cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -json .
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
            - 	`        "package": "net/http"`,
              	"      }",
              	"    ]",
              	... // 46 identical elements
              }

watchflakes

gopherbot avatar Feb 13 '24 19:02 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-02-13 17:00 darwin-amd64-longtest vuln@26c8e26c go@e17e5308 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (40.56s)
    --- FAIL: TestCommand//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json (16.96s)
        cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_stdlib_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/stdlib -json .
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
...
    --- FAIL: TestCommand//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json (17.05s)
        cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/testfiles/source-call/source_replace_json.ct:3: want=-, got=+
            $ govulncheck -C ${moddir}/replace -json ./...
              []string{
              	... // 132 identical elements
              	"      {",
              	`        "module": "stdlib",`,
            - 	`        "version": "v1.18.0",`,
            + 	`        "version": "v1.18.0"`,
            - 	`        "package": "net/http"`,
              	"      }",
              	"    ]",
              	... // 212 identical elements
              }

watchflakes

gopherbot avatar Feb 13 '24 19:02 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-02-13 18:56 x_vuln-go1.21-linux-amd64-longtest-race vuln@06a69c43 release-branch.go1.21@b214108e x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/cmd/govulncheck/testdata/testfiles/stdlib/query_vstdlib_json (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/cmd/govulncheck/testdata/testfiles/stdlib/query_vstdlib_json
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/cmd/govulncheck/testdata/testfiles/stdlib/query_vstdlib_json
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/cmd/govulncheck/testdata/testfiles/stdlib/query_vstdlib_json
==================
WARNING: DATA RACE
Write at 0x00000125fcb0 by goroutine 47:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/internal/vulncheck/packages.go:37 +0x2b9
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/internal/scan/source.go:34 +0x1d9
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x54
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1595 +0x261
  testing.(*T).Run.func1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1648 +0x44
==================
    testing.go:1465: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1883840934/cmd/govulncheck/testdata/testfiles/stdlib/query_vstdlib_json (7.23s)
2024-02-13 18:56 x_vuln-go1.21-windows-amd64-longtest vuln@06a69c43 release-branch.go1.21@b214108e x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo360751123\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (10.81s)
2024-02-13 18:56 x_vuln-go1.22-linux-amd64-longtest-race vuln@06a69c43 release-branch.go1.22@20107e05 x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/cmd/govulncheck/testdata/testfiles/failures/binary_fail (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/cmd/govulncheck/testdata/testfiles/failures/binary_fail
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/cmd/govulncheck/testdata/testfiles/failures/binary_fail
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/cmd/govulncheck/testdata/testfiles/failures/binary_fail
==================
WARNING: DATA RACE
Write at 0x0000012c6b00 by goroutine 47:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/internal/vulncheck/packages.go:37 +0x2c7
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/internal/scan/source.go:34 +0x1f0
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x5a
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1689 +0x21e
  testing.(*T).Run.gowrap1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1742 +0x44
==================
    testing.go:1398: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1769350119/cmd/govulncheck/testdata/testfiles/failures/binary_fail (44.82s)
2024-02-13 18:56 x_vuln-go1.22-windows-amd64-longtest vuln@06a69c43 release-branch.go1.22@20107e05 x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo2194065080\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (10.51s)
2024-02-13 18:56 x_vuln-gotip-windows-amd64-longtest vuln@06a69c43 go@62cebb2e x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo2005988129\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (8.52s)
2024-02-13 19:29 x_vuln-go1.21-linux-amd64-longtest-race vuln@08ad966e release-branch.go1.21@b214108e x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/cmd/govulncheck/testdata/testfiles/source-call/source_replace_text (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/cmd/govulncheck/testdata/testfiles/source-call/source_replace_text
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/cmd/govulncheck/testdata/testfiles/source-call/source_replace_text
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/cmd/govulncheck/testdata/testfiles/source-call/source_replace_text
==================
WARNING: DATA RACE
Write at 0x00000125fcb0 by goroutine 51:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/internal/vulncheck/packages.go:37 +0x2b9
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/internal/scan/source.go:34 +0x1d9
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x54
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1595 +0x261
  testing.(*T).Run.func1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1648 +0x44
==================
    testing.go:1465: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3625638365/cmd/govulncheck/testdata/testfiles/source-call/source_replace_text (22.48s)
2024-02-13 19:29 x_vuln-go1.21-windows-amd64-longtest vuln@08ad966e release-branch.go1.21@b214108e x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo3636949741\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (11.22s)
2024-02-13 19:29 x_vuln-go1.22-linux-amd64-longtest-race vuln@08ad966e release-branch.go1.22@20107e05 x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/cmd/govulncheck/testdata/testfiles/failures/source_fail (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/cmd/govulncheck/testdata/testfiles/failures/source_fail
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/cmd/govulncheck/testdata/testfiles/failures/source_fail
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/cmd/govulncheck/testdata/testfiles/failures/source_fail
==================
WARNING: DATA RACE
Write at 0x0000012c6b00 by goroutine 66:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/internal/vulncheck/packages.go:37 +0x2c7
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/internal/scan/source.go:34 +0x1f0
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x5a
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1689 +0x21e
  testing.(*T).Run.gowrap1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1742 +0x44
==================
    testing.go:1398: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo2432006890/cmd/govulncheck/testdata/testfiles/failures/source_fail (45.52s)
2024-02-13 19:29 x_vuln-go1.22-windows-amd64-longtest vuln@08ad966e release-branch.go1.22@20107e05 x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo2950037084\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (10.77s)
2024-02-13 19:29 x_vuln-gotip-linux-amd64-longtest-race vuln@08ad966e go@48d899dc x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/cmd/govulncheck/testdata/testfiles/source-call/source_call_json (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/cmd/govulncheck/testdata/testfiles/source-call/source_call_json
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/cmd/govulncheck/testdata/testfiles/source-call/source_call_json
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/cmd/govulncheck/testdata/testfiles/source-call/source_call_json
==================
WARNING: DATA RACE
Write at 0x0000012c8b40 by goroutine 48:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/internal/vulncheck/packages.go:37 +0x2c7
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/internal/scan/source.go:34 +0x1f0
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x5a
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1689 +0x21e
  testing.(*T).Run.gowrap1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1742 +0x44
==================
    testing.go:1398: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1093573570/cmd/govulncheck/testdata/testfiles/source-call/source_call_json (32.25s)
2024-02-13 19:29 x_vuln-gotip-windows-amd64-longtest vuln@08ad966e go@48d899dc x/vuln/cmd/govulncheck.TestCommand/C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (log)
=== RUN   TestCommand/C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== PAUSE TestCommand/C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
=== CONT  TestCommand/C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text.ct:3: want=-, got=+
        $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
          []string{
          	... // 12 identical elements
          	"    Fixed in: golang.org/x/[email protected]",
          	"    Example traces found:",
          	strings.Join({
...
        + 		`\`,
          		"parse.go:<l>:<c>: golang.org/x/text/language.Parse",
          	}, ""),
          	"",
          	"Your code is affected by 1 vulnerability from 1 module.",
          	... // 4 identical elements
          }
        
        
--- FAIL: TestCommand/C:\b\s\w\ir\x\w\targetrepo2139445425\cmd\govulncheck\testdata\testfiles\source-call\source_subdir_text (15.31s)
2024-02-15 14:28 x_vuln-go1.21-linux-amd64-longtest-race vuln@2dec2336 release-branch.go1.21@b214108e x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/cmd/govulncheck/testdata/testfiles/stdlib/query_stdlib_json (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/cmd/govulncheck/testdata/testfiles/stdlib/query_stdlib_json
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/cmd/govulncheck/testdata/testfiles/stdlib/query_stdlib_json
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/cmd/govulncheck/testdata/testfiles/stdlib/query_stdlib_json
==================
WARNING: DATA RACE
Write at 0x00000125fcb0 by goroutine 47:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/internal/vulncheck/packages.go:37 +0x2b9
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/internal/scan/source.go:34 +0x1d9
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x54
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1595 +0x261
  testing.(*T).Run.func1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1648 +0x44
==================
    testing.go:1465: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo1212492230/cmd/govulncheck/testdata/testfiles/stdlib/query_stdlib_json (14.31s)
2024-02-15 14:28 x_vuln-gotip-linux-amd64-longtest-race vuln@2dec2336 go@b6ca5861 x/vuln/cmd/govulncheck.TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/cmd/govulncheck/testdata/testfiles/usage/usage (log)
=== RUN   TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/cmd/govulncheck/testdata/testfiles/usage/usage
=== PAUSE TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/cmd/govulncheck/testdata/testfiles/usage/usage
=== CONT  TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/cmd/govulncheck/testdata/testfiles/usage/usage
==================
WARNING: DATA RACE
Write at 0x0000012c8b40 by goroutine 48:
  golang.org/x/vuln/internal/vulncheck.NewPackageGraph()
      /home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/internal/vulncheck/packages.go:37 +0x2c7
  golang.org/x/vuln/internal/scan.runSource()
      /home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/internal/scan/source.go:34 +0x1f0
...
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:345 +0x5a
  github.com/google/go-cmdtest.(*TestSuite).compare.func1()
      /home/swarming/.swarming/w/ir/x/w/gopath/pkg/mod/github.com/google/[email protected]/cmdtest.go:335 +0x6e
  testing.tRunner()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1689 +0x21e
  testing.(*T).Run.gowrap1()
      /home/swarming/.swarming/w/ir/x/w/goroot/src/testing/testing.go:1742 +0x44
==================
    testing.go:1398: race detected during execution of test
--- FAIL: TestCommand//home/swarming/.swarming/w/ir/x/w/targetrepo3564838747/cmd/govulncheck/testdata/testfiles/usage/usage (44.36s)

watchflakes

gopherbot avatar Feb 15 '24 19:02 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-03-25 18:40 darwin-amd64-longtest vuln@6f169c6e go@1f354a60 x/vuln/cmd/govulncheck.TestCommand (log)
vuln.go:7:2: github.com/tidwall/[email protected]: Get "https://proxy.golang.org/github.com/tidwall/gjson/@v/v1.6.5.zip": dial tcp 142.250.191.177:443: connect: operation timed out
--- FAIL: TestCommand (29.95s)
    buildtest.go:82: /tmp/buildlet/go/bin/go build -o /tmp/buildlet/tmp/buildtest5622601/vuln: exit status 1

watchflakes

gopherbot avatar Mar 26 '24 07:03 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-03-28 19:32 linux-386-longtest vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (37.97s)
    --- FAIL: TestCommand/common (7.02s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (2.36s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (5.55s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                - 	"          }",
                  	"        }",
                  	"      ]",
                  	... // 3 identical elements
                  }
2024-03-28 19:32 linux-amd64-longtest vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (27.88s)
    --- FAIL: TestCommand/common (5.75s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (3.96s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                  	"          }",
                - 	"        },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif (4.18s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"              },",
                - 	`              "helpUri": "https://pkg.go.dev/vuln/GO-2022-0969",`,
                - 	`              "properties": {`,
                - 	`                "tags": [`,
                - 	`                  "CVE-2022-27664",`,
                - 	`                  "GHSA-69cg-p879-7622"`,
                - 	"                ]",
                - 	"              }",
                  	... // 164 identical and 7 removed elements
                  }
2024-03-28 19:32 linux-amd64-longtest-race vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (96.25s)
    --- FAIL: TestCommand/common (11.12s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif (16.38s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                  	"          }",
                - 	"        },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (15.94s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
                - 	"            {",
                - 	`              "id": "GO-2022-0969",`,
...
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "warning",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib), but doesn't appear to import any of the vulnerable symbols."`,
                - 	"          }",
                  	"        }",
                  	"      ]",
                  	... // 3 identical elements
                  }
2024-03-28 19:32 linux-arm64-longtest vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (19.58s)
    --- FAIL: TestCommand/common (3.62s)
        --- FAIL: TestCommand/common//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif (0.83s)
            cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                - 	"          }",
...
        --- FAIL: TestCommand/common//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (2.99s)
            cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                - 	"          }",
                - 	"        },",
                - 	"        {",
...
                - 	"              },",
                - 	`              "helpUri": "https://pkg.go.dev/vuln/GO-2022-0969",`,
                - 	`              "properties": {`,
                - 	`                "tags": [`,
                - 	`                  "CVE-2022-27664",`,
                - 	`                  "GHSA-69cg-p879-7622"`,
                - 	"                ]",
                - 	"              }",
                  	... // 164 identical and 7 removed elements
                  }
2024-03-28 19:32 windows-amd64-longtest vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (24.29s)
    --- FAIL: TestCommand/common (5.83s)
        --- FAIL: TestCommand/common/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-call\source_call_sarif (4.47s)
            cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-call\source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-package\source_package_sarif (2.85s)
            cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-package\source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                - 	"          }",
                  	"        }",
                  	"      ]",
                  	... // 3 identical elements
                  }
2024-03-28 19:32 linux-386-longtest vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (36.65s)
    --- FAIL: TestCommand/common (6.63s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (2.25s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (7.13s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                - 	"          }",
                - 	"        },",
                - 	"        {",
...
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                  	"          }",
                  	"        }",
                  	... // 4 identical elements
                  }
2024-03-28 19:32 linux-amd64-longtest vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (31.18s)
    --- FAIL: TestCommand/common (6.67s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (4.61s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (2.95s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                - 	"          }",
                - 	"        },",
                - 	"        {",
...
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                  	"          }",
                  	"        }",
                  	... // 4 identical elements
                  }
2024-03-28 19:32 linux-amd64-longtest-race vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (102.07s)
    --- FAIL: TestCommand/common (12.01s)
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (14.67s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (19.07s)
            cmdtest.go:336: /workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                - 	"          }",
                  	"        }",
                  	"      ]",
                  	... // 3 identical elements
                  }
2024-03-28 19:32 linux-arm64-longtest vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (18.86s)
    --- FAIL: TestCommand/common (3.55s)
        --- FAIL: TestCommand/common//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (4.62s)
            cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif (1.01s)
            cmdtest.go:336: /tmp/workdir/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "warning",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib), but doesn't appear to import any of the vulnerable symbols."`,
                - 	"          }",
                  	"        }",
                  	"      ]",
                  	... // 3 identical elements
                  }
2024-03-28 19:32 windows-amd64-longtest vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (36.23s)
    --- FAIL: TestCommand/common (8.20s)
        --- FAIL: TestCommand/common/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-package\source_package_sarif (6.09s)
            cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-package\source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                  	"          }",
                - 	"        },",
...
        --- FAIL: TestCommand/common/C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-module\source_module_sarif (7.37s)
            cmdtest.go:336: C:\workdir\gopath\src\golang.org\x\vuln\cmd\govulncheck\testdata\common\testfiles\source-module\source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 128 identical elements
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                  	"          }",
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
...
                - 	"              },",
                - 	`              "helpUri": "https://pkg.go.dev/vuln/GO-2022-0969",`,
                - 	`              "properties": {`,
                - 	`                "tags": [`,
                - 	`                  "CVE-2022-27664",`,
                - 	`                  "GHSA-69cg-p879-7622"`,
                - 	"                ]",
                - 	"              }",
                  	... // 164 identical and 7 removed elements
                  }

watchflakes

gopherbot avatar Mar 28 '24 19:03 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-03-28 19:32 darwin-amd64-longtest vuln@84e19065 go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (113.77s)
    --- FAIL: TestCommand/common (22.82s)
        --- FAIL: TestCommand/common//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (8.28s)
            cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                - 	"          }",
...
        --- FAIL: TestCommand/common//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif (8.52s)
            cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan module -C ${moddir}/vuln
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code depends on 1 vulnerable module (g`...,
                - 	"          }",
                - 	"        },",
                - 	"        {",
...
                - 	"              },",
                - 	`              "helpUri": "https://pkg.go.dev/vuln/GO-2022-0969",`,
                - 	`              "properties": {`,
                - 	`                "tags": [`,
                - 	`                  "CVE-2022-27664",`,
                - 	`                  "GHSA-69cg-p879-7622"`,
                - 	"                ]",
                - 	"              }",
                  	... // 164 identical and 7 removed elements
                  }
2024-03-28 19:32 darwin-amd64-longtest vuln@df69562c go@33fd95b8 x/vuln/cmd/govulncheck.TestCommand (log)
--- FAIL: TestCommand (119.73s)
    --- FAIL: TestCommand/common (23.33s)
        --- FAIL: TestCommand/common//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif (5.49s)
            cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct:3: want=-, got=+
                $ govulncheck -C ${moddir}/vuln -format sarif ./...
                  []string{
                  	... // 96 identical elements
                  	"                ]",
                  	"              }",
                - 	"            },",
...
        --- FAIL: TestCommand/common//tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif (7.22s)
            cmdtest.go:336: /tmp/buildlet/gopath/src/golang.org/x/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct:3: want=-, got=+
                $ govulncheck -format sarif -scan package -C ${moddir}/vuln .
                  []string{
                  	... // 127 identical elements
                  	`          "message": {`,
                  	`            "text": "Your code imports 1 vulnerable package (git`...,
                - 	"          }",
                - 	"        },",
                - 	"        {",
...
                - 	"        },",
                - 	"        {",
                - 	`          "ruleId": "GO-2022-0969",`,
                - 	`          "level": "error",`,
                - 	`          "message": {`,
                - 	`            "text": "Your code depends on 1 vulnerable module (stdlib). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."`,
                  	"          }",
                  	"        }",
                  	... // 4 identical elements
                  }

watchflakes

gopherbot avatar Mar 28 '24 20:03 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-03-25 18:40 x_vuln-go1.21-windows-amd64-longtest vuln@6f169c6e release-branch.go1.21@efb7cc42 x/vuln/cmd/govulncheck.TestCommand (log)
=== RUN   TestCommand
go: downloading github.com/tidwall/gjson v1.9.2
go: downloading github.com/tidwall/match v1.1.0
go: downloading github.com/tidwall/pretty v1.2.0
error obtaining VCS status: exit status 128
	Use -buildvcs=false to disable VCS stamping.
    buildtest.go:82: C:\b\s\w\ir\x\w\goroot\bin\go.exe build -o C:\b\s\w\ir\x\t\buildtest292136118\informational.exe: exit status 1
--- FAIL: TestCommand (1.05s)

watchflakes

gopherbot avatar Apr 18 '24 21:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-04-18 21:51 x_vuln-go1.21-windows-amd64-longtest vuln@f3bc44a7 release-branch.go1.21@891ac91e x/vuln/cmd/govulncheck.TestCommand/common (log)
=== RUN   TestCommand/common
go: downloading github.com/tidwall/gjson v1.9.2
go: downloading github.com/tidwall/match v1.1.0
go: downloading github.com/tidwall/pretty v1.2.0
error obtaining VCS status: exit status 128
	Use -buildvcs=false to disable VCS stamping.
    buildtest.go:82: C:\b\s\w\ir\x\w\goroot\bin\go.exe build -o C:\b\s\w\ir\x\t\buildtest2125034466\informational.exe: exit status 1
--- FAIL: TestCommand/common (1.01s)

watchflakes

gopherbot avatar Apr 19 '24 15:04 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-05-15 18:27 x_vuln-gotip-windows-amd64-longtest vuln@d837ff86 go@bf0b605d x/vuln/cmd/govulncheck.TestCommand [ABORT] (log)
=== RUN   TestCommand

watchflakes

gopherbot avatar May 15 '24 22:05 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-06-24 19:52 x_vuln-go1.23-windows-amd64-longtest vuln@d44b651a release-branch.go1.23@7dff7439 x/vuln/cmd/govulncheck.TestCommand/common (log)
=== RUN   TestCommand/common
go: downloading github.com/tidwall/gjson v1.9.2
go: downloading github.com/tidwall/match v1.1.0
go: downloading github.com/tidwall/pretty v1.2.0
error obtaining VCS status: exit status 128
	Use -buildvcs=false to disable VCS stamping.
    buildtest.go:82: C:\b\s\w\ir\x\w\goroot\bin\go.exe build -o C:\b\s\w\ir\x\t\buildtest2978661136\informational.exe: exit status 1
--- FAIL: TestCommand/common (1.00s)

watchflakes

gopherbot avatar Jun 26 '24 10:06 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-07-10 17:48 x_vuln-go1.21-windows-amd64-longtest vuln@44e45eae release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common (log)
=== RUN   TestCommand/common
go: downloading github.com/tidwall/gjson v1.9.2
go: downloading github.com/tidwall/pretty v1.2.0
go: downloading github.com/tidwall/match v1.1.0
error obtaining VCS status: exit status 128
	Use -buildvcs=false to disable VCS stamping.
    buildtest.go:82: C:\b\s\w\ir\x\w\goroot\bin\go.exe build -o C:\b\s\w\ir\x\t\buildtest4001290386\informational.exe: exit status 1
--- FAIL: TestCommand/common (1.02s)

watchflakes

gopherbot avatar Jul 10 '24 20:07 gopherbot

Found new dashboard test flakes for:

#!watchflakes
post <- repo == "vuln" && test ~ `^TestCommand`
2024-07-15 19:36 x_vuln-go1.21-linux-amd64-longtest vuln@1884dfae release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2904329747/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.91s)
2024-07-15 19:36 x_vuln-go1.21-linux-amd64-longtest-race vuln@1884dfae release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo733786101/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (8.97s)
2024-07-15 19:36 x_vuln-go1.21-windows-amd64-longtest vuln@1884dfae release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1207303544\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (1.31s)
2024-07-15 19:36 x_vuln-go1.22-darwin-amd64-longtest vuln@1884dfae release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//Volumes/Work/s/w/ir/x/w/targetrepo1318135558/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (2.87s)
2024-07-15 19:36 x_vuln-go1.22-linux-amd64-longtest vuln@1884dfae release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1893361450/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.15s)
2024-07-15 19:36 x_vuln-go1.22-linux-amd64-longtest-race vuln@1884dfae release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4107772458/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (8.16s)
2024-07-15 19:36 x_vuln-go1.22-windows-amd64-longtest vuln@1884dfae release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1934548622\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (3.31s)
2024-07-16 16:15 x_vuln-go1.21-darwin-amd64-longtest vuln@de0a0adb release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo2953938146/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.42s)
2024-07-16 16:15 x_vuln-go1.21-linux-amd64-longtest vuln@de0a0adb release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1878666842/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.68s)
2024-07-16 16:15 x_vuln-go1.21-linux-amd64-longtest-race vuln@de0a0adb release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo943865735/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.73s)
2024-07-16 16:15 x_vuln-go1.21-windows-amd64-longtest vuln@de0a0adb release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo482910499\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (4.73s)
2024-07-16 16:15 x_vuln-go1.22-darwin-amd64-longtest vuln@de0a0adb release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3712218544/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.30s)
2024-07-16 16:15 x_vuln-go1.22-linux-amd64-longtest vuln@de0a0adb release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo4213344266/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.11s)
2024-07-16 16:15 x_vuln-go1.22-linux-amd64-longtest-race vuln@de0a0adb release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo346383191/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.50s)
2024-07-16 16:15 x_vuln-go1.22-windows-amd64-longtest vuln@de0a0adb release-branch.go1.22@4e548f2c x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4e548f2c8e489a408033c8aab336077b16bc8cf7, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo3344782741\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (3.34s)
2024-07-16 17:36 x_vuln-go1.21-darwin-amd64-longtest vuln@4ea44181 release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo3026842283/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.53s)
2024-07-16 17:36 x_vuln-go1.21-linux-amd64-longtest vuln@4ea44181 release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1461492680/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.56s)
2024-07-16 17:36 x_vuln-go1.21-linux-amd64-longtest-race vuln@4ea44181 release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1469480992/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (1.60s)
2024-07-16 17:36 x_vuln-go1.21-windows-amd64-longtest vuln@4ea44181 release-branch.go1.21@e073febe x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.21.12-devel_e073febe901cecb3737c712b6d53a8c48684ffb5, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo4233661812\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (0.40s)
2024-07-16 17:36 x_vuln-go1.22-darwin-amd64-longtest vuln@4ea44181 release-branch.go1.22@4b27560d x/vuln/cmd/govulncheck.TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4b27560db937aa104753a96bf011d7f13c4aedc3, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//Users/swarming/.swarming/w/ir/x/w/targetrepo1855010934/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.19s)
2024-07-16 17:36 x_vuln-go1.22-linux-amd64-longtest vuln@4ea44181 release-branch.go1.22@4b27560d x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 25 identical elements
          	"}",
          	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4b27560db937aa104753a96bf011d7f13c4aedc3, only standard library vulnerabilities will be checked"`,
        + 	"  }",
        + 	"}",
        + 	"{",
          	`  "osv": {`,
          	`    "schema_version": "1.3.1",`,
          	... // 433 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo1018101498/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (2.47s)
2024-07-16 17:36 x_vuln-go1.22-linux-amd64-longtest-race vuln@4ea44181 release-branch.go1.22@4b27560d x/vuln/cmd/govulncheck.TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (log)
=== RUN   TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== PAUSE TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
=== CONT  TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json
    cmdtest.go:336: /home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4b27560db937aa104753a96bf011d7f13c4aedc3, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common//home/swarming/.swarming/w/ir/x/w/targetrepo2941125285/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json (0.68s)
2024-07-16 17:36 x_vuln-go1.22-windows-amd64-longtest vuln@4ea44181 release-branch.go1.22@4b27560d x/vuln/cmd/govulncheck.TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (log)
=== RUN   TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== PAUSE TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
=== CONT  TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json
    cmdtest.go:336: C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json.ct:3: want=-, got=+
        $ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
          []string{
          	... // 22 identical elements
          	`  "progress": {`,
          	`    "message": "Checking the binary against the vulnerabilities..."`,
        + 	"  }",
        + 	"}",
        + 	"{",
        + 	`  "progress": {`,
        + 	`    "message": "warning: binary built with Go version go1.22.5-devel_4b27560db937aa104753a96bf011d7f13c4aedc3, only standard library vulnerabilities will be checked"`,
          	"  }",
          	"}",
          	... // 436 identical elements
          }
        
        
--- FAIL: TestCommand/common/C:\b\s\w\ir\x\w\targetrepo1089730190\cmd\govulncheck\testdata\common\testfiles\binary-package\binary_package_json (3.20s)

watchflakes

gopherbot avatar Jul 26 '24 15:07 gopherbot