Skip to content

fix(deps): update go dependencies (non-major)#85

Open
renovate[bot] wants to merge 1 commit into
localstackfrom
renovate/go-dependencies-(non-major)
Open

fix(deps): update go dependencies (non-major)#85
renovate[bot] wants to merge 1 commit into
localstackfrom
renovate/go-dependencies-(non-major)

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate Bot commented Mar 5, 2026

This PR contains the following updates:

Package Change Age Confidence
github.com/aws/aws-lambda-go v1.52.0v1.54.0 age confidence
github.com/fsnotify/fsnotify v1.9.0v1.10.1 age confidence
github.com/go-chi/chi/v5 v5.2.5v5.3.0 age confidence
github.com/stretchr/testify v1.10.0v1.11.1 age confidence
golang.org/x/sync v0.19.0v0.20.0 age confidence
golang.org/x/sys v0.41.0v0.45.0 age confidence

Release Notes

aws/aws-lambda-go (github.com/aws/aws-lambda-go)

v1.54.0

Compare Source

What's Changed

New Contributors

Full Changelog: aws/aws-lambda-go@v1.54.0...v1.53.0

v1.53.0

Compare Source

What's Changed

New Contributors

Full Changelog: aws/aws-lambda-go@v1.53.0...v1.52.0

fsnotify/fsnotify (github.com/fsnotify/fsnotify)

v1.10.1

Compare Source

Changes and fixes
  • inotify: don't remove sibling watches sharing a path prefix (#​754)

  • inotify, windows: don't rename sibling watches sharing a path prefix
    (#​755)

v1.10.0

Compare Source

This version of fsnotify needs Go 1.23.

Changes and fixes
  • inotify: improve initialization error message (#​731)

  • inotify: send Rename event if recursive watch is renamed (#​696)

  • inotify: avoid copying event buffers when reading names (#​741)

  • kqueue: skip dangling symlinks (ENOENT) in watchDirectoryFiles, so a bad entry no longer aborts Watcher.Add for the whole directory (#​748)

  • kqueue: drop watches directly in Close() to fix a file descriptor leak when recycling watchers (#​740)

  • windows: fix nil pointer dereference in remWatch (#​736)

  • windows: lock watch field updates against concurrent WatchList to fix a race introduced in v1.9.0 (#​709, #​749)

go-chi/chi (github.com/go-chi/chi/v5)

v5.3.0

Compare Source

What's Changed

New Contributors

SECURITY: middleware.ClientIP, a replacement for middleware.RealIP

PR #​967 introduced middleware.ClientIP, a replacement for middleware.RealIP that closes the three open spoofing advisories:

It also addresses issues outlined at:

middleware.RealIP is deprecated in this PR with pointers to the new API.

The deprecation only adds a // Deprecated: doc comment; the function keeps working for backward compatibility.

Why a new middleware (not "fix RealIP in place")

RealIP has two unfixable design choices: it mutates r.RemoteAddr, and it tries to be a one-size-fits-all default by walking a hard-coded list of headers any client can supply. Per adam-p's "The perils of the 'real' client IP" (which calls chi out by name on this), there is no safe default — the user must pick their trust source explicitly.

The new API

Four middlewares, two accessors. Pick exactly one middleware based on your
infrastructure, read the result with one of the two accessors:

// One of the four. There is no safe default — pick exactly one.
func ClientIPFromHeader(trustedHeader string) func(http.Handler) http.Handler
func ClientIPFromXFF(trustedIPPrefixes ...string) func(http.Handler) http.Handler
func ClientIPFromXFFTrustedProxies(numTrustedProxies int) func(http.Handler) http.Handler
func ClientIPFromRemoteAddr(h http.Handler) http.Handler

// Read the result.
func GetClientIP(ctx context.Context) string         // for logs, rate-limit keys
func GetClientIPAddr(ctx context.Context) netip.Addr // for typed work

Example usage:

// Pick a single ClientIP middleware based on your deployment
  
// Cloudflare.
r.Use(middleware.ClientIPFromHeader("CF-Connecting-IP"))

// Nginx with ngx_http_realip_module.
r.Use(middleware.ClientIPFromHeader("X-Real-IP"))

// Apache with mod_remoteip.
r.Use(middleware.ClientIPFromHeader("X-Client-IP"))

// AWS CloudFront, or any proxy fleet with known CIDRs.
r.Use(middleware.ClientIPFromXFF(
    "13.32.0.0/15",   // CloudFront IPv4
    "52.46.0.0/18",   // CloudFront IPv4
    "2600:9000::/28", // CloudFront IPv6
))

// Behind exactly 2 trusted proxies with dynamic IPs (autoscaling pools,
// ephemeral containers, dynamic CDN edges).
r.Use(middleware.ClientIPFromXFFTrustedProxies(2))

// Server directly on the public internet, no proxy in front.
r.Use(middleware.ClientIPFromRemoteAddr)

And in your handler or downstream middleware:

clientIP := middleware.GetClientIP(r.Context())
// log it, use it as a rate-limit key, etc.

Thanks to @​adam-p, @​c2h5oh, @​rezmoss, @​Saku0512, @​convto, @​Dirbaio, @​jawnsy, @​lrstanley, @​mfridman, @​n33pm, @​pkieltyka for the prior discussions, detailed reviews, advisory reports, and test contributions that shaped this PR.

Full Changelog: go-chi/chi@v5.2.5...v5.3.0

stretchr/testify (github.com/stretchr/testify)

v1.11.1

Compare Source

This release fixes #​1785 introduced in v1.11.0 where expected argument values implementing the stringer interface (String() string) with a method which mutates their value, when passed to mock.Mock.On (m.On("Method", <expected>).Return()) or actual argument values passed to mock.Mock.Called may no longer match one another where they previously did match. The behaviour prior to v1.11.0 where the stringer is always called is restored. Future testify releases may not call the stringer method at all in this case.

What's Changed

Full Changelog: stretchr/testify@v1.11.0...v1.11.1

v1.11.0

Compare Source

What's Changed

Functional Changes

v1.11.0 Includes a number of performance improvements.

Fixes
Documentation, Build & CI

New Contributors

Full Changelog: stretchr/testify@v1.10.0...v1.11.0


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch from ad238b5 to 80d6539 Compare March 8, 2026 13:01
@dfangl dfangl removed the request for review from gregfurman March 12, 2026 09:44
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 2 times, most recently from 923e720 to ff31d92 Compare March 13, 2026 05:58
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 3 times, most recently from bbdc4ae to e669392 Compare March 25, 2026 01:29
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch from e669392 to ab7994c Compare April 1, 2026 17:07
@dfangl dfangl removed their request for review April 7, 2026 11:48
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 3 times, most recently from 2a3b1e9 to ca69d62 Compare April 9, 2026 15:39
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 3 times, most recently from 6d80387 to 487b095 Compare May 4, 2026 13:37
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 3 times, most recently from 336363f to d632575 Compare May 8, 2026 13:14
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch 8 times, most recently from c047a49 to 5b1d3f4 Compare May 21, 2026 22:43
@renovate renovate Bot force-pushed the renovate/go-dependencies-(non-major) branch from 5b1d3f4 to 5190d1a Compare May 22, 2026 19:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants