-
Notifications
You must be signed in to change notification settings - Fork 33
Bump k8s.io/apimachinery from 0.32.3 to 0.35.2 #702
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,33 +1,31 @@ | ||||||
| module github.com/openshift/ingress-node-firewall | ||||||
|
|
||||||
| go 1.24.0 | ||||||
|
|
||||||
| toolchain go1.24.1 | ||||||
| go 1.25.0 | ||||||
|
|
||||||
| require ( | ||||||
| github.com/Masterminds/sprig v2.22.0+incompatible | ||||||
| github.com/bpfman/bpfman-operator v0.5.7-0.20250318195503-7377aa509673 | ||||||
| github.com/cilium/ebpf v0.18.0 | ||||||
| github.com/go-logr/logr v1.4.2 | ||||||
| github.com/go-logr/logr v1.4.3 | ||||||
| github.com/golang/glog v1.2.5 | ||||||
| github.com/google/gopacket v1.1.19 | ||||||
| github.com/kennygrant/sanitize v1.2.4 | ||||||
| github.com/onsi/ginkgo v1.16.5 | ||||||
| github.com/onsi/gomega v1.37.0 | ||||||
| github.com/onsi/gomega v1.38.2 | ||||||
| github.com/pkg/errors v0.9.1 | ||||||
| github.com/prometheus/client_golang v1.22.0 | ||||||
| github.com/prometheus/common v0.63.0 | ||||||
| github.com/vishvananda/netlink v1.3.1-0.20250206174618-62fb240731fa | ||||||
| golang.org/x/sys v0.32.0 | ||||||
| golang.org/x/sys v0.38.0 | ||||||
| gopkg.in/mcuadros/go-syslog.v2 v2.3.0 | ||||||
| k8s.io/api v0.32.3 | ||||||
| k8s.io/apiextensions-apiserver v0.32.3 | ||||||
| k8s.io/apimachinery v0.32.3 | ||||||
| k8s.io/apimachinery v0.35.2 | ||||||
| k8s.io/client-go v0.32.3 | ||||||
| k8s.io/component-base v0.32.3 | ||||||
| k8s.io/klog v1.0.0 | ||||||
| k8s.io/kubernetes v1.32.3 | ||||||
| k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 | ||||||
| k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 | ||||||
| sigs.k8s.io/controller-runtime v0.20.4 | ||||||
| ) | ||||||
|
|
||||||
|
|
@@ -42,17 +40,16 @@ require ( | |||||
| github.com/evanphx/json-patch v4.12.0+incompatible // indirect | ||||||
| github.com/evanphx/json-patch/v5 v5.9.11 // indirect | ||||||
| github.com/fsnotify/fsnotify v1.7.0 // indirect | ||||||
| github.com/fxamacker/cbor/v2 v2.7.0 // indirect | ||||||
| github.com/fxamacker/cbor/v2 v2.9.0 // indirect | ||||||
| github.com/go-logr/zapr v1.3.0 // indirect | ||||||
| github.com/go-openapi/jsonpointer v0.21.0 // indirect | ||||||
| github.com/go-openapi/jsonreference v0.21.0 // indirect | ||||||
| github.com/go-openapi/swag v0.23.0 // indirect | ||||||
| github.com/gogo/protobuf v1.3.2 // indirect | ||||||
| github.com/golang/protobuf v1.5.4 // indirect | ||||||
| github.com/google/btree v1.1.3 // indirect | ||||||
| github.com/google/gnostic-models v0.6.8 // indirect | ||||||
| github.com/google/gnostic-models v0.7.0 // indirect | ||||||
| github.com/google/go-cmp v0.7.0 // indirect | ||||||
| github.com/google/gofuzz v1.2.0 // indirect | ||||||
| github.com/google/uuid v1.6.0 // indirect | ||||||
| github.com/gorilla/websocket v1.5.0 // indirect | ||||||
| github.com/huandu/xstrings v1.3.2 // indirect | ||||||
|
|
@@ -65,35 +62,40 @@ require ( | |||||
| github.com/mitchellh/reflectwalk v1.0.2 // indirect | ||||||
| github.com/moby/spdystream v0.5.0 // indirect | ||||||
| github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect | ||||||
| github.com/modern-go/reflect2 v1.0.2 // indirect | ||||||
| github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee // indirect | ||||||
| github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect | ||||||
| github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect | ||||||
| github.com/nxadm/tail v1.4.8 // indirect | ||||||
| github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect | ||||||
| github.com/prometheus/client_model v0.6.1 // indirect | ||||||
| github.com/prometheus/procfs v0.15.1 // indirect | ||||||
| github.com/spf13/pflag v1.0.5 // indirect | ||||||
| github.com/spf13/pflag v1.0.9 // indirect | ||||||
| github.com/vishvananda/netns v0.0.4 // indirect | ||||||
| github.com/x448/float16 v0.8.4 // indirect | ||||||
| go.opentelemetry.io/otel v1.32.0 // indirect | ||||||
| go.opentelemetry.io/otel/trace v1.32.0 // indirect | ||||||
| go.uber.org/multierr v1.11.0 // indirect | ||||||
| go.uber.org/zap v1.27.0 // indirect | ||||||
| golang.org/x/crypto v0.36.0 // indirect | ||||||
| golang.org/x/net v0.37.0 // indirect | ||||||
| go.yaml.in/yaml/v2 v2.4.3 // indirect | ||||||
| go.yaml.in/yaml/v3 v3.0.4 // indirect | ||||||
| golang.org/x/crypto v0.44.0 // indirect | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: # First, check the current state of go.mod file
cd / && find . -name "go.mod" -type f 2>/dev/null | head -5Repository: openshift/ingress-node-firewall Length of output: 391 🏁 Script executed: # Search for vulnerability information
# Let's check the Go vulnerability database reference
rg "golang.org/x/crypto" --type go -A 2 -B 2Repository: openshift/ingress-node-firewall Length of output: 634 🌐 Web query:
💡 Result: GO-2025-4135 (CVE-2025-47914, GHSA-f6x5-jh6r-wrfv) is a DoS issue in Sources: Citations:
🌐 Web query:
💡 Result:
Security fixes included in / addressed by v0.45.0:
Patch guidance: upgrade your dependency to Sources 🏁 Script executed: cat -n ./home/jailuser/git/go.mod | sed -n '75,85p'Repository: openshift/ingress-node-firewall Length of output: 133 🌐 Web query:
💡 Result:
To install: go get golang.org/x/crypto@v0.48.0
# or
go get golang.org/x/crypto@latestSources Citations: 🏁 Script executed: fd go.mod --type f | grep -v vendor | grep -v ".go/pkg/mod"Repository: openshift/ingress-node-firewall Length of output: 81 🏁 Script executed: # Also try checking git ls-files for go.mod
git ls-files | grep "go.mod$"Repository: openshift/ingress-node-firewall Length of output: 81 🏁 Script executed: cat -n go.mod | sed -n '75,90p'Repository: openshift/ingress-node-firewall Length of output: 863 🏁 Script executed: # Also search for golang.org/x/crypto line in go.mod
rg "golang.org/x/crypto" go.mod -nRepository: openshift/ingress-node-firewall Length of output: 118 Bump The current version (v0.44.0) is vulnerable to GO-2025-4135 / CVE-2025-47914, a DoS issue in Proposed fix- golang.org/x/crypto v0.44.0 // indirect
+ golang.org/x/crypto v0.45.0 // indirect📝 Committable suggestion
Suggested change
🤖 Prompt for AI Agents |
||||||
| golang.org/x/net v0.47.0 // indirect | ||||||
| golang.org/x/oauth2 v0.25.0 // indirect | ||||||
| golang.org/x/sync v0.12.0 // indirect | ||||||
| golang.org/x/term v0.30.0 // indirect | ||||||
| golang.org/x/text v0.23.0 // indirect | ||||||
| golang.org/x/time v0.7.0 // indirect | ||||||
| golang.org/x/sync v0.18.0 // indirect | ||||||
| golang.org/x/term v0.37.0 // indirect | ||||||
| golang.org/x/text v0.31.0 // indirect | ||||||
| golang.org/x/time v0.9.0 // indirect | ||||||
| gomodules.xyz/jsonpatch/v2 v2.4.0 // indirect | ||||||
| google.golang.org/protobuf v1.36.5 // indirect | ||||||
| gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect | ||||||
| google.golang.org/protobuf v1.36.8 // indirect | ||||||
| gopkg.in/evanphx/json-patch.v4 v4.13.0 // indirect | ||||||
| gopkg.in/inf.v0 v0.9.1 // indirect | ||||||
| gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect | ||||||
| gopkg.in/yaml.v3 v3.0.1 // indirect | ||||||
| k8s.io/klog/v2 v2.130.1 // indirect | ||||||
| k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f // indirect | ||||||
| sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 // indirect | ||||||
| k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912 // indirect | ||||||
| sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 // indirect | ||||||
| sigs.k8s.io/randfill v1.0.0 // indirect | ||||||
| sigs.k8s.io/structured-merge-diff/v4 v4.4.2 // indirect | ||||||
| sigs.k8s.io/yaml v1.4.0 // indirect | ||||||
| sigs.k8s.io/structured-merge-diff/v6 v6.3.0 // indirect | ||||||
| sigs.k8s.io/yaml v1.6.0 // indirect | ||||||
| ) | ||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🌐 Web query:
Kubernetes client-go apimachinery version compatibility v0.32 v0.35💡 Result:
v0.xline (e.g.,k8s.io/client-go,k8s.io/apimachinery,k8s.io/api, etc.).apimachineryexplicitly provides no compatibility guarantees and its branches “track Kubernetes” (so mixing minors is not supported) [2].client-gopublishesv0.x.ytags that match Kubernetesv1.x.yminors (e.g.,v0.32.x↔ Kubernetesv1.32.x) [1].k8s.io/client-go v0.32.*, usek8s.io/apimachinery v0.32.*(and otherk8s.io/*modules onv0.32.*) [1][2].k8s.io/apimachinery v0.35.*, movek8s.io/client-gotov0.35.*as well (and align the rest ofk8s.io/*) [2].client-gopublishes a compatibility matrix; as of the current pkg.go.dev page it’s shown through Kubernetes 1.34 (with “exact match” on same-minor, and partial compatibility across nearby minors) [1].client-go v0.35.2exists, but the matrix section on that page hasn’t been updated to include Kubernetes 1.35 yet [1].Sources: [1]
k8s.io/client-godocs (pkg.go.dev) [2]k8s.io/apimachinerydocs (pkg.go.dev)🌐 Web query:
Go Minimal Version Selection MVS highest version module resolution💡 Result:
Go modules use Minimal Version Selection (MVS) to decide one version per module path for a build:
requirein everygo.modstates a minimum version of that dependency (there are no “maximum” constraints in MVS). (research.swtch.com)example.com/lib v1.4.0and another requiresv1.7.2, the resolved version isv1.7.2(for that module path). (dev.to)So “highest version module resolution” in Go is: highest version demanded by any dependency, not “always latest on the internet.” The selected version only increases when some
require(direct or transitive) increases. (research.swtch.com)Citations:
🏁 Script executed:
Repository: openshift/ingress-node-firewall
Length of output: 89
🏁 Script executed:
Repository: openshift/ingress-node-firewall
Length of output: 50388
Align all Kubernetes staging modules to the same minor version.
k8s.io/apimachinery v0.35.2is incompatible with thev0.32.3line used byk8s.io/api,k8s.io/apiextensions-apiserver,k8s.io/client-go, andk8s.io/component-base. Per Kubernetes documentation,apimachinerydoes not guarantee cross-release compatibility, and Go's module selection will pick the highest version (v0.35.2) for each module path. Either upgrade all Kubernetes staging modules tov0.35.xtogether or keepapimachineryonv0.32.x.🤖 Prompt for AI Agents