Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade: Bump golang.org/x/net from 0.30.0 to 0.34.0 #265

Open
wants to merge 1 commit into
base: pre-main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 3, 2025

Bumps golang.org/x/net from 0.30.0 to 0.34.0.

Commits
  • 8da7ed1 go.mod: update golang.org/x dependencies
  • 2124140 all: make function and struct comments match the names
  • e9d95ba http2: do not surface errors from a conn's idle timer expiring
  • c2be992 quic: remember which remote connection IDs have been retired
  • dfc720d go.mod: update golang.org/x dependencies
  • 8e66b04 html: use strings.EqualFold instead of lowering ourselves
  • b935f7b html: avoid endless loop on error token
  • 9af49ef route: remove unused sizeof* consts
  • 6705db9 quic: clean up crypto streams when dropping packet protection keys
  • 4ef7588 quic: handle ACK frame in packet which drops number space
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [golang.org/x/net](https://github.com/golang/net) from 0.30.0 to 0.34.0.
- [Commits](golang/net@v0.30.0...v0.34.0)

---
updated-dependencies:
- dependency-name: golang.org/x/net
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 3, 2025
Copy link

dryrunsecurity bot commented Feb 3, 2025

DryRun Security Summary

The code changes involve updating Go module dependencies for golang.org/x/crypto and golang.org/x/net to newer versions, which is beneficial for security but requires careful review and testing before implementation.

Expand for full summary

Summary:

The provided code changes are updates to the project's Go module dependencies, specifically upgrading the versions of the golang.org/x/crypto and golang.org/x/net modules. These updates are generally positive from an application security perspective, as keeping dependencies up-to-date can help address known security vulnerabilities and improve the overall security posture of the application.

However, it's important to review the release notes and changelogs of the updated dependencies to ensure that there are no breaking changes or new security issues introduced. Additionally, the project should have a comprehensive test suite to ensure that the updates do not introduce any regressions or unexpected behavior. As an application security engineer, I would recommend thoroughly reviewing the changes and testing them in a non-production environment before approving the pull request.

Files Changed:

  • go.mod: This file has been updated to use newer versions of the golang.org/x/net (from v0.30.0 to v0.34.0) and golang.org/x/crypto (from v0.28.0 to v0.32.0) modules. These updates indicate the project is keeping its dependencies current, which is a good security practice.
  • go.sum: This file has been updated to reflect the new dependency versions for golang.org/x/crypto and golang.org/x/net. The go.sum file is used by the Go toolchain to verify the integrity of the project's dependencies.

Code Analysis

We ran 9 analyzers against 2 files and 1 analyzer had findings. 8 analyzers had no findings.

Analyzer Findings
Sensitive Files Analyzer 2 findings

View PR in the DryRun Dashboard.

Copy link

guardrails bot commented Feb 3, 2025

⚠️ We detected 1 security issue in this pull request:

Vulnerable Libraries (1)
Severity Details
Medium pkg:golang/golang.org/x/net@v0.34.0 upgrade to: > v0.34.0

More info on how to fix Vulnerable Libraries in Go.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants