Skip to content

Enable automated CVE/security patching for Go modules#346

Open
clcollins wants to merge 1 commit intoopenshift:masterfrom
clcollins:enable-gomod-cve-updates
Open

Enable automated CVE/security patching for Go modules#346
clcollins wants to merge 1 commit intoopenshift:masterfrom
clcollins:enable-gomod-cve-updates

Conversation

@clcollins
Copy link
Member

Summary

This PR enables automated security updates for Go module dependencies by leveraging Renovate's security:only-security-updates preset. PRs will only be created when CVEs or security vulnerabilities are detected in Go dependencies.

What Changed

Updated .github/renovate.json to:

  • Add security:only-security-updates preset for CVE-only dependency updates
  • Enable gomod manager (was disabled by boilerplate's config)
  • Re-enable tekton manager to maintain regular pipeline task updates

Behavior

Go Module Updates (gomod)

  • CVE/Security fixes only - PRs created when vulnerabilities detected
  • ✅ Uses GitHub vulnerability alerts
  • ✅ Uses OSV (Open Source Vulnerability) database
  • ✅ PRs tagged with [SECURITY] suffix
  • ❌ No regular version bump PRs

Tekton Updates (tekton)

  • ✅ Regular pipeline task bundle digest updates
  • ✅ Automerge enabled (inherited from boilerplate)
  • ✅ Labeled with lgtm and approved

Testing

After merge, monitor for:

  1. Konflux PRs created only for Go modules with known CVEs
  2. Regular tekton task bundle updates continue
  3. No PRs for routine Go dependency version bumps

Expected timeline: 24-48 hours for MintMaker to detect and create first PR (when CVEs exist)

Related Work

Documentation References

Renovate Configuration

Konflux/MintMaker

Technical Details


🤖 Created with assistance from Claude Code

Add security:only-security-updates preset to enable automated dependency
updates only when vulnerabilities are detected. Re-enable tekton updates
to maintain regular pipeline task bundle updates with automerge.

This configuration:
- Enables gomod manager for Go dependency updates
- Restricts gomod updates to CVE/security fixes only
- Maintains regular tekton task bundle updates
- Uses GitHub vulnerability alerts and OSV database

Fixes: SREP-3419

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 5, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: clcollins

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 5, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 5, 2026

@clcollins: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant