Skip to content

Bump golang.org/x/net from 0.35.0 to 0.38.0 in the go_modules group across 1 directory#417

Closed
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/go_modules-bbb8b02913
Closed

Bump golang.org/x/net from 0.35.0 to 0.38.0 in the go_modules group across 1 directory#417
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/go_modules-bbb8b02913

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 18, 2025

Bumps the go_modules group with 1 update in the / directory: golang.org/x/net.

Updates golang.org/x/net from 0.35.0 to 0.38.0

Commits
  • e1fcd82 html: properly handle trailing solidus in unquoted attribute value in foreign...
  • ebed060 internal/http3: fix build of tests with GOEXPERIMENT=nosynctest
  • 1f1fa29 publicsuffix: regenerate table
  • 1215081 http2: improve error when server sends HTTP/1
  • 312450e html: ensure <search> tag closes <p> and update tests
  • 09731f9 http2: improve handling of lost PING in Server
  • 55989e2 http2/h2c: use ResponseController for hijacking connections
  • 2914f46 websocket: re-recommend gorilla/websocket
  • 99b3ae0 go.mod: update golang.org/x dependencies
  • 85d1d54 go.mod: update golang.org/x dependencies
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Summary by Bito

This PR updates the golang.org/x/net dependency in the go.mod file to enhance compatibility and security. The update is part of ongoing maintenance efforts to keep dependencies current and secure across the project, ensuring alignment with latest recommendations.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Jul 18, 2025
@bito-code-review
Copy link
Contributor

bito-code-review bot commented Jul 18, 2025

Code Review Agent Run #c36375

Actionable Suggestions - 0
Additional Suggestions - 1
  • go.mod - 1
    • Inconsistent dependency version update pattern · Line 25-26
      The dependency updates for `golang.org/x/crypto` and `golang.org/x/net` are inconsistent. While crypto is updated from v0.35.0 to v0.36.0, net is updated from v0.35.0 to v0.38.0, skipping v0.36.0 and v0.37.0. This could lead to compatibility issues.
      Code suggestion
       @@ -25,2 +25,2 @@
      -	golang.org/x/crypto v0.36.0
      -	golang.org/x/net v0.38.0
      +	golang.org/x/crypto v0.38.0
      +	golang.org/x/net v0.38.0
Security Concerns - 2
  • Vulnerability 1
    • Dependency Name: github.com/aws/aws-sdk-go
    • Dependency Version: None
    • Vulnerability Name: GO-2022-0635
    • Vulnerability Description: Vulnerability in AWS S3 Crypto SDK for GoLang versions prior to V2 allows attackers with write access to change encryption algorithms, potentially revealing authentication keys.
    • Fixed in Version: V2
    • Code Suggestion:
      
      @@ -1,1 +1,1 @@
      - github.com/aws/aws-sdk-go vX.X.X
      + github.com/aws/aws-sdk-go/v2 vX.X.X
      
  • Vulnerability 2
    • Dependency Name: github.com/aws/aws-sdk-go
    • Dependency Version: None
    • Vulnerability Name: GO-2022-0646
    • Vulnerability Description: Padding oracle vulnerability in AWS S3 Crypto SDK for GoLang versions prior to V2 allows attackers to reconstruct plaintext when they have write access to S3 bucket.
    • Fixed in Version: V2
    • Code Suggestion:
      
      @@ -1,1 +1,1 @@
      - github.com/aws/aws-sdk-go vX.X.X
      + github.com/aws/aws-sdk-go/v2 vX.X.X
      
Review Details
  • Files reviewed - 1 · Commit Range: 3c9e549..3c9e549
    • go.mod
  • Files skipped - 1
    • go.sum - Reason: Filter setting
  • Tools
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful
    • OWASP (Security Vulnerability) - ✔︎ Successful
    • GOVULNCHECK (Security Vulnerability) - ✔︎ Successful
    • SNYK (Security Vulnerability) - ✔︎ Successful

Bito Usage Guide

Commands

Type the following command in the pull request comment and save the comment.

  • /review - Manually triggers a full AI review.

  • /pause - Pauses automatic reviews on this pull request.

  • /resume - Resumes automatic reviews.

  • /resolve - Marks all Bito-posted review comments as resolved.

  • /abort - Cancels all in-progress reviews.

Refer to the documentation for additional commands.

Configuration

This repository uses Default Agent You can customize the agent settings here or contact your Bito workspace admin at mithil@platform9.com.

Documentation & Help

AI Code Review powered by Bito Logo

@bito-code-review
Copy link
Contributor

bito-code-review bot commented Jul 18, 2025

Changelist by Bito

This pull request implements the following key changes.

Key Change Files Impacted
Other Improvements - Dependency Version Bump

go.mod - Upgraded golang.org/x/net from v0.41.0 to v0.42.0, enhancing dependency stability and compatibility.

Bumps the go_modules group with 1 update in the / directory: [golang.org/x/net](https://github.com/golang/net).


Updates `golang.org/x/net` from 0.35.0 to 0.38.0
- [Commits](golang/net@v0.35.0...v0.38.0)

---
updated-dependencies:
- dependency-name: golang.org/x/net
  dependency-version: 0.38.0
  dependency-type: direct:production
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/go_modules-bbb8b02913 branch from 3c9e549 to 7208541 Compare July 29, 2025 18:02
@bito-code-review
Copy link
Contributor

bito-code-review bot commented Jul 29, 2025

Code Review Agent Run #60bd19

Actionable Suggestions - 0
Security Concerns - 2
  • Vulnerability 1
    • Dependency Name: github.com/aws/aws-sdk-go
    • Dependency Version: None
    • Vulnerability Name: GO-2022-0635
    • Vulnerability Description: Vulnerability in AWS S3 Crypto SDK for GoLang versions prior to V2 allows attackers with write access to change encryption algorithms, potentially revealing authentication keys.
    • Fixed in Version: V2
    • Code Suggestion:
      
      @@ -1,1 +1,1 @@
      - github.com/aws/aws-sdk-go v1.x.x
      + github.com/aws/aws-sdk-go/v2 v2.x.x
      
  • Vulnerability 2
    • Dependency Name: github.com/aws/aws-sdk-go
    • Dependency Version: None
    • Vulnerability Name: GO-2022-0646
    • Vulnerability Description: Padding oracle vulnerability in AWS S3 Crypto SDK for GoLang versions prior to V2 allows attackers to reconstruct plaintext when they have write access to S3 buckets.
    • Fixed in Version: V2
    • Code Suggestion:
      
      @@ -1,1 +1,1 @@
      - github.com/aws/aws-sdk-go v1.x.x
      + github.com/aws/aws-sdk-go/v2 v2.x.x
      
Review Details
  • Files reviewed - 1 · Commit Range: 7208541..7208541
    • go.mod
  • Files skipped - 1
    • go.sum - Reason: Filter setting
  • Tools
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful
    • SNYK (Security Vulnerability) - ✔︎ Successful
    • GOVULNCHECK (Security Vulnerability) - ✔︎ Successful
    • OWASP (Security Vulnerability) - ✔︎ Successful

Bito Usage Guide

Commands

Type the following command in the pull request comment and save the comment.

  • /review - Manually triggers a full AI review.

  • /pause - Pauses automatic reviews on this pull request.

  • /resume - Resumes automatic reviews.

  • /resolve - Marks all Bito-posted review comments as resolved.

  • /abort - Cancels all in-progress reviews.

Refer to the documentation for additional commands.

Configuration

This repository uses Default Agent You can customize the agent settings here or contact your Bito workspace admin at mithil@platform9.com.

Documentation & Help

AI Code Review powered by Bito Logo

@cruizen
Copy link
Contributor

cruizen commented Oct 14, 2025

@dependabot rebase

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Oct 14, 2025

Looks like golang.org/x/net is no longer updatable, so this is no longer needed.

@dependabot dependabot bot closed this Oct 14, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/go_modules-bbb8b02913 branch October 14, 2025 06:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant