chore(deps): bump helm.sh/helm/v3 from 3.19.2 to 3.20.2#272
chore(deps): bump helm.sh/helm/v3 from 3.19.2 to 3.20.2#272codacybeta merged 1 commit intomasterfrom
Conversation
Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.19.2 to 3.20.2. - [Release notes](https://github.com/helm/helm/releases) - [Commits](helm/helm@v3.19.2...v3.20.2) --- updated-dependencies: - dependency-name: helm.sh/helm/v3 dependency-version: 3.20.2 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
Up to standards ✅🟢 Issues
|
| Metric | Results |
|---|---|
| Complexity | 0 |
| Duplication | 0 |
AI Reviewer: first review requested successfully. AI can make mistakes. Always validate suggestions.
TIP This summary will be updated as you push new changes. Give us feedback
There was a problem hiding this comment.
Pull Request Overview
This PR successfully addresses the Helm path traversal vulnerability (GHSA-hr2v-4r36-88hr) by upgrading the dependency to v3.20.2. Codacy analysis indicates the changes are up to standards. However, the build environment defined in go.mod uses a Go version (1.25.6) with known vulnerabilities (DoS and XSS). To maintain the security posture of the project, it is recommended to update the Go directive alongside these library changes.
1 comment outside of the diff
go.mod
line 3🟡 MEDIUM RISK
The current Go version (1.25.6) has known security vulnerabilities (CVE-2026-32288, CVE-2026-32281, CVE-2026-32289) affecting the standard library. Updating the directive to 1.25.9 ensures the build environment and compiled binaries are not exposed to these DoS and XSS risks.This might be a simple fix:
go 1.25.9
Test suggestions
- Verify successful compilation and linking with the new Helm and Kubernetes library versions.
- Validate Helm chart processing logic to ensure the security patch for path traversal does not introduce regressions in valid chart handling.
Prompt proposal for missing tests
Consider implementing these tests if applicable:
1. Verify successful compilation and linking with the new Helm and Kubernetes library versions.
2. Validate Helm chart processing logic to ensure the security patch for path traversal does not introduce regressions in valid chart handling.
🗒️ Improve review quality by adding custom instructions
Bumps helm.sh/helm/v3 from 3.19.2 to 3.20.2.
Release notes
Sourced from helm.sh/helm/v3's releases.
... (truncated)
Commits
8fb76d6fix: Chart dot-name path bug3a8927efix: pin codeql-action/upload-sarif to commit SHA in scorecards workflowa2369cachore(deps): bump the k8s-io group with 7 updates90e1056add image index test911f2e9fix pulling charts from OCI indices76dad33Remove refactorring changes from coalesce_test.go45c12f7Fix import26c6f19Update pkg/chart/common/util/coalesce_test.go09f5129Fix lint warning417deb2Preserve nil values in chart alreadyDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.