OADP-7565: Go 1.25.8 + x/* dep bumps for CVE fixes#39
OADP-7565: Go 1.25.8 + x/* dep bumps for CVE fixes#39kaovilai wants to merge 2 commits intomigtools:oadp-1.6from
Conversation
…VE fixes Addresses multiple CVEs: - GO-2026-4337, GO-2026-4340 (crypto/tls) - GO-2026-4341 (net/url), GO-2026-4342 (archive/zip) - CVE-2026-25679 (net/url IPv6 host parsing) - CVE-2026-27137 (crypto/x509 email constraints) - GHSA-vvgc-356p-c3xw (golang.org/x/net XSS in HTML tokenizer) - GHSA-j5w8-q4qc-rx2x, GHSA-f6x5-jh6r-wrfv (golang.org/x/crypto ssh) Generated with [Claude Code](https://claude.ai/code) via [Happy](https://happy.engineering) Co-Authored-By: Claude <noreply@anthropic.com> Co-Authored-By: Happy <yesreply@happy.engineering>
|
@kaovilai: This pull request references OADP-7565 which is a valid jira issue. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: kaovilai The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Pull request overview
This PR updates the project’s Go toolchain and selected golang.org/x/* dependencies to pick up security fixes, and aligns the build container image with the patched Go version.
Changes:
- Add
toolchain go1.25.8togo.modand bumpgolang.org/x/*module versions. - Refresh
go.sumto match the updated module graph. - Update the builder image in
Dockerfiletogolang:1.25.8.
Reviewed changes
Copilot reviewed 2 out of 3 changed files in this pull request and generated 2 comments.
| File | Description |
|---|---|
| go.mod | Adds Go toolchain directive and bumps golang.org/x/* versions. |
| go.sum | Updates dependency checksums for the bumped x/* modules. |
| Dockerfile | Uses golang:1.25.8 for the build stage. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| golang.org/x/mod v0.33.0 // indirect | ||
| golang.org/x/net v0.52.0 // indirect | ||
| golang.org/x/oauth2 v0.33.0 // indirect | ||
| golang.org/x/sys v0.40.0 // indirect | ||
| golang.org/x/term v0.37.0 // indirect | ||
| golang.org/x/text v0.31.0 // indirect | ||
| golang.org/x/sys v0.42.0 // indirect | ||
| golang.org/x/term v0.41.0 // indirect | ||
| golang.org/x/text v0.35.0 // indirect |
| @@ -2,6 +2,8 @@ module github.com/migtools/kubevirt-datamover-controller | |||
|
|
|||
| go 1.25.7 | |||
setup-go v6 reads the toolchain directive from go.mod when present, falling back to the go directive otherwise. This replaces the hardcoded go-version and correctly picks up go1.25.8 from the toolchain directive. Generated with [Claude Code](https://claude.ai/code) via [Happy](https://happy.engineering) Co-Authored-By: Claude <noreply@anthropic.com> Co-Authored-By: Happy <yesreply@happy.engineering>
|
@kaovilai: This pull request references OADP-7565 which is a valid jira issue. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Summary
toolchain go1.25.8directive (fixes GO-2026-4337, GO-2026-4340, GO-2026-4341, GO-2026-4342, CVE-2026-25679, CVE-2026-27137)golang.org/x/netto v0.52.0 (fixes GHSA-vvgc-356p-c3xw)golang.org/x/cryptoto v0.49.0 transitively (fixes GHSA-j5w8-q4qc-rx2x, GHSA-f6x5-jh6r-wrfv)golang:1.25.8actions/setup-gofrom v5 to v6 (v6 reads thetoolchaindirective from go.mod)Test plan
go build ./...passesNote
Responses generated with Claude
🤖 Generated with Claude Code