-
Notifications
You must be signed in to change notification settings - Fork 27
SANDBOX-1465: update kube & openshift dependencies to 4.20 #495
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
SANDBOX-1465: update kube & openshift dependencies to 4.20 #495
Conversation
WalkthroughGo toolchain updated from version 1.23 to 1.24 with corresponding dependency upgrades. Kubernetes/OpenShift modules bumped to release-4.20 track, multiple stdlib and protobuf packages updated, and previously ignored vulnerabilities cleared from configuration. Changes
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes
Possibly related PRs
Suggested reviewers
Poem
Pre-merge checks and finishing touches✅ Passed checks (3 passed)
✨ Finishing touches
🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
📜 Review details
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
⛔ Files ignored due to path filters (1)
go.sumis excluded by!**/*.sum
📒 Files selected for processing (3)
.govulncheck.yaml(1 hunks)README.adoc(1 hunks)go.mod(3 hunks)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Verify Dependencies
🔇 Additional comments (5)
go.mod (3)
3-5: LGTM!The Go toolchain upgrade to 1.24.0/1.24.11 is consistent with the README.adoc update and aligns with the PR objectives for dependency modernization.
42-48: Versions appear current and secure; verify against project's specific threat model if removing vulnerability checks.The protobuf package has no known vulnerabilities. CVE-2024-45338 in golang.org/x/net affects all versions before 0.33.0, and the specified version (v0.39.0) is after the fix. golang.org/x/sys v0.32.0 was published November 25, 2025, making it current. The main concern is whether removing ignored vulnerabilities in .govulncheck.yaml reflects actual risk mitigation or changes to the security posture—the current versions themselves are sound.
9-17: Verify controller-tools v0.18.0 compatibility with k8s.io v0.33.2 and consider updating to newer controller-runtime.
Controller-tools v0.18.0 exists but its compatibility with k8s.io v0.33.2 is unclear from official documentation. The published compatibility matrix shows CT v0.17 paired with k8s.io v0.32; confirm v0.18.0 is the correct match for v0.33.2.
Controller-runtime v0.22.4 is available (newer than v0.21.0) and supports k8s.io v0.34. Evaluate whether upgrading to v0.22.x is appropriate for this project, or if v0.21.0 is deliberately locked for compatibility reasons.
The k8s.io v0.33.2 and controller-runtime v0.21.0 compatibility is confirmed correct.
README.adoc (1)
11-11: Go 1.24.11 is the current latest stable patch release for Go 1.24.x.The README accurately recommends Go 1.24.11 (or higher) for development. Go 1.24.11 was released on December 2, 2025 and is the most recent patch version available, ensuring developers have the latest security fixes and bug improvements.
.govulncheck.yaml (1)
1-1: Verify that previously ignored Go standard library vulnerabilities are resolved.The removal of four ignored vulnerability exceptions (GO-2025-4010, GO-2025-4007, GO-2025-4009, GO-2025-4011) is appropriate as these are Go standard library vulnerabilities that have been patched. GO-2025-4007 addresses quadratic complexity when checking name constraints in crypto/x509, while GO-2025-4011 addresses parsing DER payload causing memory exhaustion in encoding/asn1. These vulnerabilities are fixed by upgrading to a patched Go version (e.g., Go 1.24.8 or 1.25.2), not external dependencies. Confirm the project uses a Go version containing these patches; otherwise govulncheck will fail.
| require ( | ||
| github.com/go-bindata/go-bindata v3.1.2+incompatible | ||
| // using latest commit from 'github.com/openshift/api branch release-4.19' | ||
| github.com/openshift/api v0.0.0-20250903165707-ce7baf0afbc4 | ||
| k8s.io/api v0.32.2 | ||
| k8s.io/apimachinery v0.32.2 | ||
| k8s.io/code-generator v0.32.2 | ||
| // using latest commit from 'github.com/openshift/api branch release-4.20' | ||
| github.com/openshift/api v0.0.0-20251202204302-1cb53e34ca33 | ||
| k8s.io/api v0.33.2 | ||
| k8s.io/apimachinery v0.33.2 | ||
| k8s.io/code-generator v0.33.2 | ||
| k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 | ||
| k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f | ||
| sigs.k8s.io/controller-runtime v0.20.4 | ||
| sigs.k8s.io/controller-tools v0.17.3 | ||
| k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff | ||
| sigs.k8s.io/controller-runtime v0.21.0 | ||
| sigs.k8s.io/controller-tools v0.18.0 | ||
| ) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Coordinate dependent PRs before merging.
The PR description indicates that CRD changes need to be propagated to host-operator and member-operator repositories, but the PR links are incomplete (showing "#" placeholders). Per the README.adoc guidance, these changes should be promoted separately with proper PRs in the dependent repositories.
Ensure the following before merging:
- Complete the host-operator PR and update the PR description with the actual PR number
- Complete the member-operator PR and update the PR description with the actual PR number
- Verify that
make generatehas successfully propagated CRD changes to both repositories - Coordinate the merge order (typically api → host-operator → member-operator)
🤖 Prompt for AI Agents
In go.mod around lines 7 to 18: the PR references dependent host-operator and
member-operator changes with placeholder "#" links and CRD changes must be
propagated; create and complete the corresponding PRs in host-operator and
member-operator, update this PR description to include the real PR
numbers/links, run make generate to propagate CRD changes and verify the
generated CRDs appear in both repositories, and coordinate and document the
correct merge order (api → host-operator → member-operator) before merging.
|



Description
Update dependencies
Related PRs
codeready-toolchain/toolchain-common#503
codeready-toolchain/member-operator#718
codeready-toolchain/host-operator#1226
codeready-toolchain/toolchain-e2e#1239
codeready-toolchain/registration-service#565
codeready-toolchain/toolchain-cicd#165
kubesaw/ksctl#137
wa#311
https://github.com/codeready-toolchain/sandboxctl/pull/59
https://github.com/codeready-toolchain/sandbox-sre/pull/2815
https://github.com/codeready-toolchain/mcp-server-devsandbox/pull/49
Issue ticket number and link
SANDBOX-1465
Checks
Did you run
make generatetarget? yesDid
make generatechange anything in other projects (host-operator, member-operator)? yesIn case of new CRD, did you the following? N/A
resources/setup/roles/host.yamlin the sandbox-sre repositoryPROJECTfile: https://github.com/codeready-toolchain/host-operator/blob/master/PROJECTCSVfile: https://github.com/codeready-toolchain/host-operator/blob/master/config/manifests/bases/host-operator.clusterserviceversion.yamlIn case other projects are changed, please provides PR links.
Summary by CodeRabbit
Documentation
Chores
✏️ Tip: You can customize this high-level summary in your review settings.