Build(deps): Bump github.com/googleapis/gax-go/v2 from 2.16.0 to 2.19.0#1053
Build(deps): Bump github.com/googleapis/gax-go/v2 from 2.16.0 to 2.19.0#1053dependabot[bot] wants to merge 1 commit intomainfrom
Conversation
Bumps [github.com/googleapis/gax-go/v2](https://github.com/googleapis/gax-go) from 2.16.0 to 2.19.0. - [Release notes](https://github.com/googleapis/gax-go/releases) - [Commits](googleapis/gax-go@v2.16.0...v2.19.0) --- updated-dependencies: - dependency-name: github.com/googleapis/gax-go/v2 dependency-version: 2.19.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: dependabot[bot] The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Hi @dependabot[bot]. Thanks for your PR. I'm waiting for a openshift-online member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
WalkthroughUpdated Go toolchain from version 1.24.13 to 1.25.0 and upgraded multiple direct dependencies including Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~5 minutes 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@go.mod`:
- Line 31: The go.mod currently pins google.golang.org/grpc to v1.79.2 which is
vulnerable; update the dependency to v1.79.3 or newer by changing the
google.golang.org/grpc entry to at least v1.79.3, then run the module update
commands (e.g., go get google.golang.org/grpc@v1.79.3 and go mod tidy) to
vendor/refresh transitive deps and ensure the lockfile/module graph reflects the
upgrade.
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: b5df3079-d6f7-4ab4-9951-c58c8d239814
⛔ Files ignored due to path filters (1)
go.sumis excluded by!**/*.sum
📒 Files selected for processing (1)
go.mod
| golang.org/x/term v0.41.0 | ||
| golang.org/x/text v0.35.0 | ||
| google.golang.org/api v0.272.0 | ||
| google.golang.org/grpc v1.79.2 |
There was a problem hiding this comment.
🧩 Analysis chain
🌐 Web query:
What is the status of GHSA-p77j-4mvh-x3m3 vulnerability in google.golang.org/grpc version 1.79.2 and which version fixes it?
💡 Result:
google.golang.org/grpc v1.79.2 is affected (vulnerable) by GHSA-p77j-4mvh-x3m3 / CVE-2026-33186; the advisory lists affected versions as < 1.79.3. Upgrade to v1.79.3 (or newer) to get the fix. [1]
Upgrade google.golang.org/grpc to v1.79.3 or newer.
google.golang.org/grpc v1.79.2 is affected by GHSA-p77j-4mvh-x3m3 (CVE-2026-33186), a critical authorization bypass vulnerability. Upgrade to v1.79.3 or newer to resolve this issue.
🧰 Tools
🪛 OSV Scanner (2.3.3)
[CRITICAL] 31-31: google.golang.org/grpc 1.79.2: gRPC-Go has an authorization bypass via missing leading slash in :path
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@go.mod` at line 31, The go.mod currently pins google.golang.org/grpc to
v1.79.2 which is vulnerable; update the dependency to v1.79.3 or newer by
changing the google.golang.org/grpc entry to at least v1.79.3, then run the
module update commands (e.g., go get google.golang.org/grpc@v1.79.3 and go mod
tidy) to vendor/refresh transitive deps and ensure the lockfile/module graph
reflects the upgrade.
|
Superseded by #1064. |
Bumps github.com/googleapis/gax-go/v2 from 2.16.0 to 2.19.0.
Release notes
Sourced from github.com/googleapis/gax-go/v2's releases.
Commits
06bdf7fchore: create a release (#486)bf56424chore(all): update all (#484)fb6c5f4fix(v2): lazy initialization and getters for ClientMetrics (#485)336f424build: run linters on all submodules and fix deprecations (#483)a46b2dechore(v2): Improve docs surrounding TransportTelemetryData (#482)8a7caf0feat(v2): add TransportTelemetryData for dynamic transport attributes (#481)76f0284feat(v2): add WithClientMetrics CallOption (#479)1cb70bafeat(v2): update WithLogger to WithLoggerContext. (#478)f53618cfeat(v2): add ClientMetrics initialization core (#473)ac7fa62chore(all): update all (#471)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)