Skip to content

chore(deps): bump github.com/hashicorp/go-getter from 1.8.3 to 1.8.6#271

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/hashicorp/go-getter-1.8.6
Open

chore(deps): bump github.com/hashicorp/go-getter from 1.8.3 to 1.8.6#271
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/hashicorp/go-getter-1.8.6

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Apr 10, 2026

Bumps github.com/hashicorp/go-getter from 1.8.3 to 1.8.6.

Release notes

Sourced from github.com/hashicorp/go-getter's releases.

v1.8.6

No release notes provided.

v1.8.5

What's Changed

NOTES:

Binary Distribution Update: To streamline our release process and align with other HashiCorp tools, all release binaries will now be published exclusively to the official HashiCorp release site. We will no longer attach release assets to GitHub Releases.

New Contributors

Full Changelog: hashicorp/go-getter@v1.8.4...v1.8.5

v1.8.4

What's Changed

... (truncated)

Commits
  • d23bff4 Merge pull request #608 from hashicorp/dependabot/go_modules/go-security-9c51...
  • 2c4aba8 Merge pull request #613 from hashicorp/pull/v1.8.6
  • fe61ed9 Merge pull request #611 from hashicorp/SECVULN-41053
  • d533656 Merge pull request #606 from hashicorp/pull/CRT
  • 388f23d Additional test for local branch and head
  • b7ceaa5 harden checkout ref handling and added regression tests
  • 769cc14 Release version bump up
  • 6086a6a Review Comments Addressed
  • e02063c Revert "SECVULN Fix for git checkout argument injection enables arbitrary fil...
  • c93084d [chore] : Bump google.golang.org/grpc
  • Additional commits viewable in compare view

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Apr 10, 2026
@dependabot dependabot bot requested a review from a team as a code owner April 10, 2026 14:51
codacybeta
codacybeta previously approved these changes Apr 10, 2026
@codacybeta codacybeta enabled auto-merge (squash) April 10, 2026 14:51
@afsmeira afsmeira disabled auto-merge April 10, 2026 14:52
@codacy-production
Copy link
Copy Markdown

codacy-production bot commented Apr 10, 2026

Up to standards ✅

🟢 Issues 0 issues

Results:
0 new issues

View in Codacy

🟢 Metrics 0 complexity · 0 duplication

Metric Results
Complexity 0
Duplication 0

View in Codacy

AI Reviewer: first review requested successfully. AI can make mistakes. Always validate suggestions.

Run reviewer

TIP This summary will be updated as you push new changes. Give us feedback

Copy link
Copy Markdown

@codacy-production codacy-production bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Although Codacy analysis indicates the PR is up to standards, it should not be merged in its current state due to security vulnerabilities identified in the requested Go toolchain (1.25.8). Specifically, this version is susceptible to XSS (CVE-2026-32289) and DoS (CVE-2026-32281, CVE-2026-32288) attacks. Furthermore, there is a significant gap between the PR title and the actual changes, which include substantial updates to the Go toolchain and various cloud SDKs.

About this PR

  • The update involves a high number of indirect dependencies across critical SDKs. This increases the risk surface beyond a standard maintenance bump; verify that no breaking changes are introduced by these secondary updates.
  • The scope of this PR is much broader than the title suggests. It includes a Go toolchain update and updates to several major library suites (AWS, Google Cloud SDK, and OpenTelemetry). Please update the PR metadata to reflect the full scope of these changes to ensure they are properly audited.

Test suggestions

  • Verify successful compilation and basic functionality of resource fetching using the upgraded go-getter library.
  • Verify that the project build environment supports the non-standard Go version 1.25.8 specified in go.mod.
Prompt proposal for missing tests
Consider implementing these tests if applicable:
1. Verify successful compilation and basic functionality of resource fetching using the upgraded `go-getter` library.
2. Verify that the project build environment supports the non-standard Go version 1.25.8 specified in `go.mod`.

🗒️ Improve review quality by adding custom instructions

module github.com/codacy/codacy-trivy

go 1.25.6
go 1.25.8
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 HIGH RISK

The requested Go toolchain version 1.25.8 has multiple known vulnerabilities: XSS via improper context tracking in JS template literals (CVE-2026-32289), and Denial of Service (DoS) risks via certificate chain validation (CVE-2026-32281) and crafted archives (CVE-2026-32288). Additionally, version 1.25.8 appears to be a non-standard release for the current Go ecosystem. Upgrading to 1.25.9 is required to mitigate these security risks.

Suggested change
go 1.25.8
go 1.25.9

See Issue in Codacy
See Issue in Codacy
See Issue in Codacy

Bumps [github.com/hashicorp/go-getter](https://github.com/hashicorp/go-getter) from 1.8.3 to 1.8.6.
- [Release notes](https://github.com/hashicorp/go-getter/releases)
- [Commits](hashicorp/go-getter@v1.8.3...v1.8.6)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/go-getter
  dependency-version: 1.8.6
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/hashicorp/go-getter-1.8.6 branch from 52735c0 to 4aacd19 Compare April 10, 2026 18:38
@codacybeta codacybeta enabled auto-merge (squash) April 10, 2026 18:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant