Skip to content

Upgrade to Go 1.26.1 (new vulns)#81

Merged
shawnburke merged 7 commits intomainfrom
claude/investigate-go-vulnerabilities-hfQrz
Mar 7, 2026
Merged

Upgrade to Go 1.26.1 (new vulns)#81
shawnburke merged 7 commits intomainfrom
claude/investigate-go-vulnerabilities-hfQrz

Conversation

@shawnburke
Copy link
Copy Markdown
Collaborator

No description provided.

shawnburke and others added 2 commits March 7, 2026 13:00
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
On PRs, the Docker image is built with `load: true` (local only, not
pushed to registry). The separate trivy.yml workflow runs on a different
runner and can only pull from the registry, so it always scanned the
stale :main image — missing any vulnerability fixes in the PR.

Now on PRs, Trivy runs inline in the build job where the local image is
available. The separate trivy.yml workflow is only called when the image
is actually pushed (main, tags, workflow_dispatch).

https://claude.ai/code/session_01X1xM95mNAa7FoTDH8mLMg3
@shawnburke shawnburke changed the title Claude/investigate go vulnerabilities hf qrz Upgrade to Go 1.25.8 (new vulns) Mar 7, 2026
@shawnburke shawnburke changed the title Upgrade to Go 1.25.8 (new vulns) Upgrade to Go 1.26.1 (new vulns) Mar 7, 2026
claude added 4 commits March 7, 2026 03:24
…ries

The API proxy handler's retry loop used r.Clone() which does not deep-copy
the request body. After the first attempt consumed the body, subsequent
retries would send empty bodies, causing the upstream reverse proxy to
return 502 Bad Gateway.

Buffer the body before the retry loop and reconstruct it on each attempt.

https://claude.ai/code/session_01X1xM95mNAa7FoTDH8mLMg3
The goinstall.sh from canha/golang-tools-install-script was not
reliably installing the specified Go version, causing Trivy to detect
5 CRITICAL/HIGH stdlib CVEs (CVE-2026-25679, CVE-2026-27137,
CVE-2026-27138, CVE-2026-27139, CVE-2026-27142) despite go.mod
specifying 1.26.1 which fixes them.

Switch to downloading the official Go tarball directly from
dl.google.com and installing to /usr/local/go. This also fixes
the GOROOT/GOPATH confusion where both pointed to /root/.go.

https://claude.ai/code/session_01X1xM95mNAa7FoTDH8mLMg3
The separate trivy.yml workflow still referenced the old Go
installation path (root/.go). Update to usr/local/go to match
the Dockerfile change.

https://claude.ai/code/session_01X1xM95mNAa7FoTDH8mLMg3
Move the inline Trivy scan steps from the build job into a dedicated
trivy-pr job ("Run Trivy PR scan (local image)") so it shows up as
a distinct job in the GitHub Actions UI. The Docker image is passed
between jobs via artifacts. Rename the existing trivy job to
"Run Trivy Container scan" for clarity.

https://claude.ai/code/session_01X1xM95mNAa7FoTDH8mLMg3
@github-advanced-security
Copy link
Copy Markdown
Contributor

You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool.

What Enabling Code Scanning Means:

  • The 'Security' tab will display more code scanning analysis results (e.g., for the default branch).
  • Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results.
  • You will be able to see the analysis results for the pull request's branch on this overview once the scans have completed and the checks have passed.

For more information about GitHub Code Scanning, check out
the documentation.

@shawnburke shawnburke merged commit 9f7b7df into main Mar 7, 2026
16 checks passed
@shawnburke shawnburke deleted the claude/investigate-go-vulnerabilities-hfQrz branch March 7, 2026 06:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants