Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR updates all usage of Go in the service to the latest major version available (1.23).
I've created an umbrella PR here to bring all the elements of the go update together - the actions, docker, makefile, go mod etc - it's really hard to manage them all via dependabot (without creating multiple PRs). Going forward, we will work in a scheduled PR for the Golang update every go release cycle. Given the inconsistencies between local versions, actions versions and upstream availability, we're opting for the most recent available version in the GitHub runner images (currently https://github.com/actions/runner-images/blob/main/images/ubuntu/Ubuntu2404-Readme.md) - which at Golang 1.23.2 is a patch release behind the current head.
I've also run a module update here (which may close some other PRs, too). This necessitated a license review for a couple of dependencies, which I've added to the local config here on review - again following the CNCF lead where possible and conducting a desktop assessment of any outliers.
I experimented with the fail_on_severity setting, but I feel that not seeing the vulnerabilities displayed below "critical" isn't enough information. Realistically, we're not in a place to be super-strict with vulnerabilities, but the intelligence provided here is valuable as part of the PR review process.
closes #402
closes #395
closes #380