Skip to content

chore(deps): bump google.golang.org/grpc from 1.77.0 to 1.79.3#86

Merged
ajitpratap0 merged 4 commits intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3
Mar 25, 2026
Merged

chore(deps): bump google.golang.org/grpc from 1.77.0 to 1.79.3#86
ajitpratap0 merged 4 commits intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Mar 19, 2026

Bumps google.golang.org/grpc from 1.77.0 to 1.79.3.

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.79.3

Security

  • server: fix an authorization bypass where malformed :path headers (missing the leading slash) could bypass path-based restricted "deny" rules in interceptors like grpc/authz. Any request with a non-canonical path is now immediately rejected with an Unimplemented error. (#8981)

Release 1.79.2

Bug Fixes

  • stats: Prevent redundant error logging in health/ORCA producers by skipping stats/tracing processing when no stats handler is configured. (grpc/grpc-go#8874)

Release 1.79.1

Bug Fixes

Release 1.79.0

API Changes

  • mem: Add experimental API SetDefaultBufferPool to change the default buffer pool. (#8806)
  • experimental/stats: Update MetricsRecorder to require embedding the new UnimplementedMetricsRecorder (a no-op struct) in all implementations for forward compatibility. (#8780)

Behavior Changes

  • balancer/weightedtarget: Remove handling of Addresses and only handle Endpoints in resolver updates. (#8841)

New Features

  • experimental/stats: Add support for asynchronous gauge metrics through the new AsyncMetricReporter and RegisterAsyncReporter APIs. (#8780)
  • pickfirst: Add support for weighted random shuffling of endpoints, as described in gRFC A113.
    • This is enabled by default, and can be turned off using the environment variable GRPC_EXPERIMENTAL_PF_WEIGHTED_SHUFFLING. (#8864)
  • xds: Implement :authority rewriting, as specified in gRFC A81. (#8779)
  • balancer/randomsubsetting: Implement the random_subsetting LB policy, as specified in gRFC A68. (#8650)

Bug Fixes

  • credentials/tls: Fix a bug where the port was not stripped from the authority override before validation. (#8726)
  • xds/priority: Fix a bug causing delayed failover to lower-priority clusters when a higher-priority cluster is stuck in CONNECTING state. (#8813)
  • health: Fix a bug where health checks failed for clients using legacy compression options (WithDecompressor or RPCDecompressor). (#8765)
  • transport: Fix an issue where the HTTP/2 server could skip header size checks when terminating a stream early. (#8769)
  • server: Propagate status detail headers, if available, when terminating a stream during request header processing. (#8754)

Performance Improvements

  • credentials/alts: Optimize read buffer alignment to reduce copies. (#8791)
  • mem: Optimize pooling and creation of buffer objects. (#8784)
  • transport: Reduce slice re-allocations by reserving slice capacity. (#8797)

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Mar 19, 2026
@ajitpratap0
Copy link
Copy Markdown
Owner

Dependency Review: google.golang.org/grpc 1.77.0 → 1.79.3

Assessment: Safe to merge.

What changed

  • 1.79.3 (security): Fixes an authorization bypass where malformed :path headers (missing leading slash) could bypass path-based restricted "deny" rules in interceptors. Any request with a non-canonical path is now rejected with Unimplemented.
  • 1.79.2: Prevents redundant error logging in health/ORCA producers when no stats handler is configured.
  • 1.79.1: Removes the -dev suffix from the User-Agent header.

Usage in this repo

google.golang.org/grpc is an indirect dependency (// indirect in go.mod) — pulled in transitively via go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc. We do not import google.golang.org/grpc directly in any cmd/ or internal/ package, so there are no API compatibility concerns.

CI status

All substantive checks pass: Build, Test, Lint, Integration Tests, Security Scan, Go Security Scanner, Dependency Vulnerability Check. The only failures are Dependency Review (expects explicit approval for dependency changes, not an error) and claude-review (automated review bot, not a blocking issue).

No action needed beyond merging. This is a pure patch/minor security fix in a transitive dependency.

@dependabot dependabot Bot force-pushed the dependabot/go_modules/google.golang.org/grpc-1.79.3 branch from 4b5eaff to 565ef95 Compare March 19, 2026 17:07
Copy link
Copy Markdown
Owner

@ajitpratap0 ajitpratap0 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Safe indirect bump — grpc is pulled in transitively only. Includes 1.79.3 path-based authz bypass security fix. The Dependency Review failure was a false-positive on the longstanding golang.org/x/net patent license grant; this has now been fixed in main (allowlist updated in pr-checks.yml). ✅ Approve and merge.

Copy link
Copy Markdown
Owner

@ajitpratap0 ajitpratap0 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Safe indirect bump — grpc is purely transitive, no direct usage. Includes 1.79.3 path-based authz bypass security fix. The Dependency Review failure was a false-positive on the golang.org/x/net Google patent license grant (longstanding, not a new restriction); the allowlist in pr-checks.yml has been updated on main to prevent recurrence.

Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.77.0 to 1.79.3.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.77.0...v1.79.3)

---
updated-dependencies:
- dependency-name: google.golang.org/grpc
  dependency-version: 1.79.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@ajitpratap0 ajitpratap0 force-pushed the dependabot/go_modules/google.golang.org/grpc-1.79.3 branch from 565ef95 to 9e18f59 Compare March 25, 2026 07:00
@claude
Copy link
Copy Markdown

claude Bot commented Mar 25, 2026

PR Review: Dependabot bump google.golang.org/grpc 1.77.0 to 1.79.3

Summary: Routine Dependabot dependency update confined to go.mod and go.sum. Spans three minor versions and includes a security fix.

SECURITY (Important): grpc v1.79.3 patches an authorization bypass where malformed :path headers missing the leading slash could bypass path-based deny rules in grpc/authz interceptors. Any non-canonical path is now immediately rejected with Unimplemented.

CryptoFunk uses gRPC as an indirect dependency via OpenTelemetry and Envoy control plane libraries, not directly for inbound servers. Merging is strongly recommended to pick up the security fix.

Indirect dependencies bumped:

  • cel.dev/expr v0.24.0 to v0.25.1
  • cncf/xds/go date bump Oct to Dec 2025
  • envoyproxy/go-control-plane/envoy v1.35.0 to v1.36.0
  • envoyproxy/protoc-gen-validate v1.2.1 to v1.3.0
  • otelcontrib/detectors/gcp v1.38.0 to v1.39.0
  • golang.org/x/net v0.47.0 to v0.48.0
  • golang.org/x/oauth2 v0.32.0 to v0.34.0

Code quality: Only go.mod and go.sum modified. Hashes updated correctly. All bumped packages are indirect with no call-site changes needed. No direct gRPC server usage in CryptoFunk so the new path-rejection behavior in v1.79.3 has no impact on existing functionality.

Note: The x/net bump underlies HTTP/2 - worth running task test-unit post-merge to confirm the MCP Streamable HTTP transport is unaffected.

Recommendation: Approve and merge. Security fix makes this a priority. Run task validate in CI before merging.

@claude
Copy link
Copy Markdown

claude Bot commented Mar 25, 2026

Dependency Bump Review: google.golang.org/grpc v1.77.0 to v1.79.3

This is a Dependabot security + maintenance bump. Recommend merging.

Security Fix (v1.79.3)

Authorization bypass patched: Malformed :path headers missing a leading slash could bypass path-based deny rules in gRPC interceptors (e.g., grpc/authz). Any request with a non-canonical path is now immediately rejected with an Unimplemented error. See grpc/grpc-go issue 8981.

This project uses gRPC as an indirect dependency pulled in via cloud/observability libraries. While the orchestrator and agents use HTTP/MCP rather than gRPC directly, this fix eliminates the vulnerability in any gRPC-speaking component in the dependency chain.

Other Transitive Updates

  • golang.org/x/net v0.47.0 -> v0.48.0
  • golang.org/x/oauth2 v0.32.0 -> v0.34.0
  • github.com/envoyproxy/go-control-plane/envoy v1.35.0 -> v1.36.0
  • github.com/envoyproxy/protoc-gen-validate v1.2.1 -> v1.3.0
  • cel.dev/expr v0.24.0 -> v0.25.1
  • go.opentelemetry.io/contrib/detectors/gcp v1.38.0 -> v1.39.0

All transitive updates are consistent with the gRPC version bump (xDS, Envoy control plane, and cel-go are gRPC ecosystem libraries).

Code Quality

Only go.mod and go.sum are modified — no application code changes. No breaking API changes in this upgrade path that would affect this project's indirect usage.

Verdict: Approve and merge. The security fix in v1.79.3 is important and the diff is clean. No risk to application behavior.

@claude
Copy link
Copy Markdown

claude Bot commented Mar 25, 2026

Dependency Bump Review: grpc 1.77.0 to 1.79.3

Recommendation: Approve and merge - this bump contains a security fix.

Security Fix (1.79.3): Authorization bypass where malformed :path headers (missing leading slash) could bypass path-based restricted deny rules in interceptors like grpc/authz. Requests with non-canonical paths are now rejected with Unimplemented. While CryptoFunk grpc usage is indirect (via cloud SDKs and OTel transitive deps), picking up this fix is the right call.

Changes: google.golang.org/grpc 1.77.0 to 1.79.3, golang.org/x/net 0.47.0 to 0.48.0, golang.org/x/oauth2 0.32.0 to 0.34.0, envoyproxy/go-control-plane/envoy 1.35.0 to 1.36.0, plus several other indirect deps.

Intermediate releases: 1.79.0 adds UnimplementedMetricsRecorder requirement in experimental/stats (no impact on CryptoFunk); 1.79.2 prevents redundant error logging in health/ORCA producers; 1.79.1 removes -dev User-Agent suffix.

Verdict: Safe additive change. No API breakage expected. go.sum hashes are consistent with the bumps. Good to merge.

Reviewed by Claude Code

@claude
Copy link
Copy Markdown

claude Bot commented Mar 25, 2026

Dependency Bump Review: google.golang.org/grpc 1.77.0 to 1.79.3

Summary

Routine Dependabot update. Changes are limited to go.mod and go.sum only — no application code modified.

Security — Merge Recommended

The headline change is a security fix in gRPC 1.79.3:

Authorization bypass where malformed :path headers (missing the leading slash) could bypass path-based restricted "deny" rules in interceptors like grpc/authz. Any request with a non-canonical path is now immediately rejected with an Unimplemented error. (grpc/grpc-go#8981)

Even though google.golang.org/grpc is an indirect dependency here, this is a meaningful risk if any upstream library exposes gRPC endpoints with path-based authorization rules.

All Version Bumps

  • google.golang.org/grpc: 1.77.0 → 1.79.3 — security + bug fixes (key change)
  • golang.org/x/net: 0.47.0 → 0.48.0 — minor
  • golang.org/x/oauth2: 0.32.0 → 0.34.0 — minor
  • cel.dev/expr: 0.24.0 → 0.25.1 — minor
  • github.com/envoyproxy/go-control-plane/envoy: 1.35.0 → 1.36.0 — minor
  • github.com/envoyproxy/protoc-gen-validate: 1.2.1 → 1.3.0 — minor
  • go.opentelemetry.io/contrib/detectors/gcp: 1.38.0 → 1.39.0 — minor
  • github.com/cncf/xds/go: 2025-10-22 snapshot → 2025-12-10 snapshot — minor

Assessment

  • No code changes: only go.mod and go.sum lock file updates, no application logic to review.
  • All non-gRPC bumps are minor releases with no breaking API changes noted.
  • gRPC 1.79.x introduced one API change (experimental/stats requires embedding UnimplementedMetricsRecorder) — this only affects code that directly implements the experimental stats interface, which is unlikely given this is an indirect dependency.
  • go.sum hashes are consistent with the corresponding version changes.

Recommendation: Approve and merge promptly. The gRPC security fix (authorization bypass) alone justifies not delaying this.

@ajitpratap0 ajitpratap0 merged commit 92a4885 into main Mar 25, 2026
35 checks passed
@dependabot dependabot Bot deleted the dependabot/go_modules/google.golang.org/grpc-1.79.3 branch March 25, 2026 09:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant