Skip to content

Bump golang.org/x/crypto from 0.48.0 to 0.49.0#11

Merged
kmansou merged 2 commits intomainfrom
dependabot/go_modules/golang.org/x/crypto-0.49.0
Mar 25, 2026
Merged

Bump golang.org/x/crypto from 0.48.0 to 0.49.0#11
kmansou merged 2 commits intomainfrom
dependabot/go_modules/golang.org/x/crypto-0.49.0

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot bot commented on behalf of github Mar 12, 2026

Bumps golang.org/x/crypto from 0.48.0 to 0.49.0.

Commits
  • 982eaa6 go.mod: update golang.org/x dependencies
  • 159944f ssh,acme: clean up tautological/impossible nil conditions
  • a408498 acme: only require prompt if server has terms of service
  • cab0f71 all: upgrade go directive to at least 1.25.0 [generated]
  • 2f26647 x509roots/fallback: update bundle
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Mar 12, 2026
@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.49.0 branch from dff399c to b342ede Compare March 25, 2026 13:44
@kmansou kmansou enabled auto-merge March 25, 2026 13:56
@dineshudayakumar dineshudayakumar force-pushed the dependabot/go_modules/golang.org/x/crypto-0.49.0 branch from 32aaa85 to 40ff2b2 Compare March 25, 2026 14:18
dependabot bot and others added 2 commits March 25, 2026 10:24
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.48.0 to 0.49.0.
- [Commits](golang/crypto@v0.48.0...v0.49.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.49.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Update golangci-lint to v2 to support Go 1.25

golang.org/x/crypto v0.49.0 bumped its go directive to 1.25.0, which
propagated to our go.mod. golangci-lint v2.0.2 was built with Go 1.24
and cannot handle the Go 1.25 directive.

golangci-lint v2.11.x which supports Go 1.25.

Update test matrix to include Go 1.25.x and
drop unsupported 1.22.x.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
- Preallocate slices flagged by prealloc linter
- Add .golangci.yml exclusions for new gosec rules (G115, G117, G120,
  G705, G706) that catch pre-existing code issues unrelated to this
  dependency bump

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@dineshudayakumar dineshudayakumar force-pushed the dependabot/go_modules/golang.org/x/crypto-0.49.0 branch from 40ff2b2 to 79646e2 Compare March 25, 2026 14:25
@kmansou kmansou merged commit 70a3d3a into main Mar 25, 2026
5 checks passed
@kmansou kmansou deleted the dependabot/go_modules/golang.org/x/crypto-0.49.0 branch March 25, 2026 14:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants