Conversation
🎉 Snyk checks have passed. No issues have been found so far.✅ security/snyk check is complete. No issues have been found. (View Details) ✅ license/snyk check is complete. No issues have been found. (View Details) |
3a1277b to
b0617b2
Compare
eed367f to
a70dfae
Compare
|
Lint failures are addressed here |
|
What exactly is the benefit of updating the patch version in go.mod files? Is it so it's impossible to build fleet-server with an earlier version? |
|
@swiatekm what's the counter argument here? 🙂 Could you share a little bit more why you feel that having patch versions in go.mod is causing more harm than good? To begin with, IMO, "recent" Go versions (starting with 1.21 IIRC) started imposing in a way the patch part of the version inside go.mod ref.
If we go without any patch version it means that we could compile fleet-server with any go >= 1.24.x. And here is the tricky part of expectation I would say; when we say that we addressed a CVE which is resolved in go 1.24.2, I feel it is safer to make fleet-server compile only with 1.24.2 (and new versions), thus guarantee that the CVE is resolved. Do you feel otherwise? 🙂 |
I don't feel that way. I asked the question because I didn't know. I don't think there's any counter-argument when it comes to bumping the version due to a high-severity CVE. But you're also making updatecli bump this for every patch version, which might be annoying for local work. Even if Go 1.24.3 is out and we start building release fleet-server binaries with that version, I don't see any harm in contributors continuing to use Go 1.24.2 locally. |
I hear you 🙂 two proposals then:
|
Can we leave the update targets in, but only trigger them manually? Then 2 would be very low-maintenance, and I'd be fine taking it up. |
|
I did not see the linting failures, and the comments the came in as I was going through the code before approving. I'm going over them now, but the changes look good to me. |
|
Went through the comments, there isn't much I can add to the discussion. My approval stands. |
|
@swiatekm I believe it's not as simple as leaving just the targets and I am eyeballing mostly this part we always check based on the .go-version and there we always have the patch version. If I leave the existing replacement targets and because of a CVE we have added the patch version in go.mod the existing targets will result in replacing it yet again with a non-patch version. In other words this requires some thinking, wanna create a follow-up issue for what you propose? |
25ee76c
25ee76c to
e9e89ae
Compare
|
ebeahan
left a comment
There was a problem hiding this comment.
Changes LGTM.
If we need to continue the ongoing discuss (#4891 (comment)), I propose creating a separate issue to determine how to approach.
|
Let's move 7.17 up to Go 1.24. No release planned but if there were, that simplifies future Go update backports and we do want the CVE fixes from the latest 1.24.x or 1.23.x there. |
blakerouse
left a comment
There was a problem hiding this comment.
This looks good to me. I actually like the patch version in there, ensures that on my host I will be matching what is being used by the built binary. Not a strong opinion on it, but I do like that.
swiatekm
left a comment
There was a problem hiding this comment.
Since this is apparently what we do in other projects, I'm happy doing it here as well.
* chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # .ci/bump-golang.yml # dev-tools/go.mod # go.mod # testing/go.mod
* chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # dev-tools/go.mod # go.mod # testing/go.mod
* chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # dev-tools/go.mod # go.mod # testing/go.mod
* chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # dev-tools/go.mod # go.mod # testing/go.mod
* chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # dev-tools/go.mod # go.mod # testing/go.mod
* Update to go 1.24.3 (#4891) * chore: bump to go 1.24.3 (cherry picked from commit 9dd0054) # Conflicts: # .ci/bump-golang.yml # dev-tools/go.mod # go.mod # testing/go.mod * fix: resolve conflicts * fix: bump golangci * fix: update golangci to latest * fix: update golangci to latest --------- Co-authored-by: Panos Koutsovasilis <panos.koutsovasilis@elastic.co>





What is the problem this PR solves?
This PR updates the Go language version used in the project from 1.24.1 to 1.24.2 across all relevant modules (
go.mod,dev-tools/go.mod,testing/go.mod).Keeping the Go version up to date ensures we benefit from the latest bug fixes, performance improvements, and security patches.
Depends on:
How does this PR solve the problem?
The CI configuration (
.ci/bump-golang.yml) was adjusted to correctly detect and update Go versions in all relevantgo.modfiles.The
go.modfiles for the main project, dev tools, and testing were updated to reference Go 1.24.2.A changelog fragment was added to document this upgrade.
How to test this PR locally
N/A
Design Checklist
Checklist
./changelog/fragmentsusing the changelog toolRelated issues
N/A