Conversation
|
Caution Review failedPull request was closed or merged during review 📝 WalkthroughSummary by CodeRabbit
WalkthroughGo toolchain upgraded uniformly from 1.26.1 to 1.26.2 across all Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~5 minutes Possibly related PRs
Suggested reviewers
Poem
🚥 Pre-merge checks | ✅ 3 | ❌ 2❌ Failed checks (2 warnings)
✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Warning There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure. 🔧 Trivy (0.69.3)Failed to read Trivy output file: ENOENT: no such file or directory, open '/inmem/1269/nsjail-2dc74983-b86f-42f4-ba66-95c518ecc493/merged/.trivy-output.json' 🔧 golangci-lint (2.11.4)level=error msg="[linters_context] typechecking error: pattern ./...: directory prefix . does not contain main module or its selected dependencies" Comment |
|
|
🧪 Test Suite AvailableThis PR can be tested by a repository admin. |
Confidence Score: 5/5Safe to merge — purely mechanical release-cut with no logic changes All changes are version bumps, Go toolchain upgrades (1.26.1 → 1.26.2), Docker image digest updates, and changelog entries. No business logic was modified. No files require special attention Important Files Changed
Reviews (1): Last reviewed commit: "v1.5.0-prerelease5 cut" | Re-trigger Greptile |
Merge activity
|

Summary
Bumps the Go toolchain from
1.26.1to1.26.2across all modules and CI workflows, and cuts new patch/prerelease versions for core, framework, transports, and all plugins to pick up a bug fix in the governance plugin's rate limit persistence.Changes
1.26.2in allgo.modfiles, CI workflow steps, and Docker build images (including pinned SHA digests forgolang:1.26.2-alpine3.23)corebumped tov1.5.4,frameworktov1.3.4,transportstov1.5.0-prerelease5governance,compat,jsonparser,logging,maxim,mocker,otel,prompts,semanticcache,telemetry) bumped to their respective next patch versionsDumpRateLimitsnow includes access profile rate limit counters, which were previously always persisted as 0 due to a missing range in the dump logicType of change
Affected areas
How to test
Screenshots/Recordings
N/A
Breaking changes
Related issues
N/A
Security considerations
No security implications. The Go patch release and Docker image digest update may include upstream security fixes in the Go toolchain itself.
Checklist
docs/contributing/README.mdand followed the guidelines