veza/veza-backend-api/go.sum

498 lines
44 KiB
Text
Raw Permalink Normal View History

feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
cloud.google.com/go/compute/metadata v0.9.0 h1:pDUj4QMoPejqq20dK0Pg2N4yG9zIkYGdBtwLoEkH9Zs=
cloud.google.com/go/compute/metadata v0.9.0/go.mod h1:E0bWwX5wTnLPedCKqk3pJmVgCBSM6qQI1yTBdEb3C10=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
dario.cat/mergo v1.0.2 h1:85+piFYR1tMbRrLcDwR18y4UKJ3aH1Tbzi24VRW1TK8=
dario.cat/mergo v1.0.2/go.mod h1:E/hbnu0NxMFBjpMIE34DRGLWqDy0g5FuKDhCb31ngxA=
github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 h1:He8afgbRMd7mFxO99hRNu+6tazq8nFF9lIwo9JFroBk=
github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6/go.mod h1:8o94RPi1/7XTJvwPpRSzSUedZrtlirdB3r9Z20bi2f8=
github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c h1:udKWzYgxTojEKWjV8V+WSxDXJ4NFATAsZjh8iIbsQIg=
github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
github.com/BurntSushi/toml v1.6.0 h1:dRaEfpa2VI55EwlIW72hMRHdWouJeRF7TPYhI+AUQjk=
github.com/BurntSushi/toml v1.6.0/go.mod h1:ukJfTF/6rtPPRCnwkur4qwRxa8vTRFBF0uk2lLoLwho=
github.com/DATA-DOG/go-sqlmock v1.5.2 h1:OcvFkGmslmlZibjAjaHm3L//6LiuBgolP7OputlJIzU=
github.com/DATA-DOG/go-sqlmock v1.5.2/go.mod h1:88MAG/4G7SMwSE3CeA0ZKzrT5CiOU3OJ+JlNzwDqpNU=
2025-12-03 19:29:37 +00:00
github.com/KyleBanks/depth v1.2.1 h1:5h8fQADFrWtarTdtDudMmGsC7GPbOAu6RVB3ffsVFHc=
github.com/KyleBanks/depth v1.2.1/go.mod h1:jzSb9d0L43HxTQfT+oSA1EEp2q+ne2uh6XgeJcm8brE=
github.com/Microsoft/go-winio v0.6.2 h1:F2VQgta7ecxGYO8k3ZZz3RS8fVIXVxONVUPlNERoyfY=
github.com/Microsoft/go-winio v0.6.2/go.mod h1:yd8OoFMLzJbo9gZq8j5qaps8bJ9aShtEA8Ipt1oGCvU=
github.com/PuerkitoBio/purell v1.1.1 h1:WEQqlqaGbrPkxLJWfBwQmfEAE1Z7ONdDLqrN38tNFfI=
github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578 h1:d+Bc7a5rLufV/sSk/8dngufqelfh6jnri85riMAaF/M=
github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
github.com/SherClockHolmes/webpush-go v1.4.0 h1:ocnzNKWN23T9nvHi6IfyrQjkIc0oJWv1B1pULsf9i3s=
github.com/SherClockHolmes/webpush-go v1.4.0/go.mod h1:XSq8pKX11vNV8MJEMwjrlTkxhAj1zKfxmyhdV7Pd6UA=
github.com/aws/aws-sdk-go-v2 v1.41.0 h1:tNvqh1s+v0vFYdA1xq0aOJH+Y5cRyZ5upu6roPgPKd4=
github.com/aws/aws-sdk-go-v2 v1.41.0/go.mod h1:MayyLB8y+buD9hZqkCW3kX1AKq07Y5pXxtgB+rRFhz0=
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.4 h1:489krEF9xIGkOaaX3CE/Be2uWjiXrkCH6gUX+bZA/BU=
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.4/go.mod h1:IOAPF6oT9KCsceNTvvYMNHy0+kMF8akOjeDvPENWxp4=
github.com/aws/aws-sdk-go-v2/config v1.32.6 h1:hFLBGUKjmLAekvi1evLi5hVvFQtSo3GYwi+Bx4lpJf8=
github.com/aws/aws-sdk-go-v2/config v1.32.6/go.mod h1:lcUL/gcd8WyjCrMnxez5OXkO3/rwcNmvfno62tnXNcI=
github.com/aws/aws-sdk-go-v2/credentials v1.19.6 h1:F9vWao2TwjV2MyiyVS+duza0NIRtAslgLUM0vTA1ZaE=
github.com/aws/aws-sdk-go-v2/credentials v1.19.6/go.mod h1:SgHzKjEVsdQr6Opor0ihgWtkWdfRAIwxYzSJ8O85VHY=
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.16 h1:80+uETIWS1BqjnN9uJ0dBUaETh+P1XwFy5vwHwK5r9k=
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.16/go.mod h1:wOOsYuxYuB/7FlnVtzeBYRcjSRtQpAW0hCP7tIULMwo=
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.20.18 h1:9vWXHtaepwoAl/UuKzxwgOoJDXPCC3hvgNMfcmdS2Tk=
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.20.18/go.mod h1:sKuUZ+MwUTuJbYvZ8pK0x10LvgcJK3Y4rmh63YBekwk=
github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.16 h1:rgGwPzb82iBYSvHMHXc8h9mRoOUBZIGFgKb9qniaZZc=
github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.16/go.mod h1:L/UxsGeKpGoIj6DxfhOWHWQ/kGKcd4I1VncE4++IyKA=
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.16 h1:1jtGzuV7c82xnqOVfx2F0xmJcOw5374L7N6juGW6x6U=
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.16/go.mod h1:M2E5OQf+XLe+SZGmmpaI2yy+J326aFf6/+54PoxSANc=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.4 h1:WKuaxf++XKWlHWu9ECbMlha8WOEGm0OUEZqm4K/Gcfk=
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.4/go.mod h1:ZWy7j6v1vWGmPReu0iSGvRiise4YI5SkR3OHKTZ6Wuc=
github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.16 h1:CjMzUs78RDDv4ROu3JnJn/Ig1r6ZD7/T2DXLLRpejic=
github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.16/go.mod h1:uVW4OLBqbJXSHJYA9svT9BluSvvwbzLQ2Crf6UPzR3c=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.4 h1:0ryTNEdJbzUCEWkVXEXoqlXV72J5keC1GvILMOuD00E=
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.4/go.mod h1:HQ4qwNZh32C3CBeO6iJLQlgtMzqeG17ziAA/3KDJFow=
github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.7 h1:DIBqIrJ7hv+e4CmIk2z3pyKT+3B6qVMgRsawHiR3qso=
github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.7/go.mod h1:vLm00xmBke75UmpNvOcZQ/Q30ZFjbczeLFqGx5urmGo=
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.16 h1:oHjJHeUy0ImIV0bsrX0X91GkV5nJAyv1l1CC9lnO0TI=
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.16/go.mod h1:iRSNGgOYmiYwSCXxXaKb9HfOEj40+oTKn8pTxMlYkRM=
github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.16 h1:NSbvS17MlI2lurYgXnCOLvCFX38sBW4eiVER7+kkgsU=
github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.16/go.mod h1:SwT8Tmqd4sA6G1qaGdzWCJN99bUmPGHfRwwq3G5Qb+A=
github.com/aws/aws-sdk-go-v2/service/s3 v1.95.0 h1:MIWra+MSq53CFaXXAywB2qg9YvVZifkk6vEGl/1Qor0=
github.com/aws/aws-sdk-go-v2/service/s3 v1.95.0/go.mod h1:79S2BdqCJpScXZA2y+cpZuocWsjGjJINyXnOsf5DTz8=
github.com/aws/aws-sdk-go-v2/service/signin v1.0.4 h1:HpI7aMmJ+mm1wkSHIA2t5EaFFv5EFYXePW30p1EIrbQ=
github.com/aws/aws-sdk-go-v2/service/signin v1.0.4/go.mod h1:C5RdGMYGlfM0gYq/tifqgn4EbyX99V15P2V3R+VHbQU=
github.com/aws/aws-sdk-go-v2/service/sso v1.30.8 h1:aM/Q24rIlS3bRAhTyFurowU8A0SMyGDtEOY/l/s/1Uw=
github.com/aws/aws-sdk-go-v2/service/sso v1.30.8/go.mod h1:+fWt2UHSb4kS7Pu8y+BMBvJF0EWx+4H0hzNwtDNRTrg=
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.12 h1:AHDr0DaHIAo8c9t1emrzAlVDFp+iMMKnPdYy6XO4MCE=
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.12/go.mod h1:GQ73XawFFiWxyWXMHWfhiomvP3tXtdNar/fi8z18sx0=
github.com/aws/aws-sdk-go-v2/service/sts v1.41.5 h1:SciGFVNZ4mHdm7gpD1dgZYnCuVdX1s+lFTg4+4DOy70=
github.com/aws/aws-sdk-go-v2/service/sts v1.41.5/go.mod h1:iW40X4QBmUxdP+fZNOpfmkdMZqsovezbAeO+Ubiv2pk=
github.com/aws/smithy-go v1.24.0 h1:LpilSUItNPFr1eY85RYgTIg5eIEPtvFbskaFcmmIUnk=
github.com/aws/smithy-go v1.24.0/go.mod h1:LEj2LM3rBRQJxPZTB4KuzZkaZYnZPnvgIhb4pu07mx0=
2025-12-03 19:29:37 +00:00
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
github.com/boombuler/barcode v1.0.1-0.20190219062509-6c824513bacc/go.mod h1:paBWMcWSl3LHKBqUq+rly7CNSldXjb2rDl3JlRe0mD8=
github.com/boombuler/barcode v1.0.1 h1:NDBbPmhS+EqABEs5Kg3n/5ZNjy73Pz7SIV+KCeqyXcs=
github.com/boombuler/barcode v1.0.1/go.mod h1:paBWMcWSl3LHKBqUq+rly7CNSldXjb2rDl3JlRe0mD8=
2025-12-03 19:29:37 +00:00
github.com/bsm/ginkgo/v2 v2.12.0 h1:Ny8MWAHyOepLGlLKYmXG4IEkioBysk6GpaRTLC8zwWs=
github.com/bsm/ginkgo/v2 v2.12.0/go.mod h1:SwYbGRRDovPVboqFv0tPTcG1sN61LM1Z4ARdbAV9g4c=
github.com/bsm/gomega v1.27.10 h1:yeMWxP2pV2fG3FgAODIY8EiRE3dy0aeFYt4l7wh6yKA=
github.com/bsm/gomega v1.27.10/go.mod h1:JyEr/xRbxbtgWNi8tIEVPUYZ5Dzef52k01W3YH0H+O0=
github.com/bytedance/sonic v1.14.0 h1:/OfKt8HFw0kh2rj8N0F6C/qPGRESq0BbaNZgcNXXzQQ=
github.com/bytedance/sonic v1.14.0/go.mod h1:WoEbx8WTcFJfzCe0hbmyTGrfjt8PzNEBdxlNUO24NhA=
github.com/bytedance/sonic/loader v0.3.0 h1:dskwH8edlzNMctoruo8FPTJDF3vLtDT0sXZwvZJyqeA=
github.com/bytedance/sonic/loader v0.3.0/go.mod h1:N8A3vUdtUebEY2/VQC0MyhYeKUFosQU6FxH2JmUe6VI=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/cenkalti/backoff/v4 v4.3.0 h1:MyRJ/UdXutAwSAT+s3wNd7MfTIcy71VQueUuFK343L8=
github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
github.com/cenkalti/backoff/v5 v5.0.3 h1:ZN+IMa753KfX5hd8vVaMixjnqRZ3y8CuJKRKj1xcsSM=
github.com/cenkalti/backoff/v5 v5.0.3/go.mod h1:rkhZdG3JZukswDf7f0cwqPNk4K0sa+F97BxZthm/crw=
2025-12-03 19:29:37 +00:00
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/cloudwego/base64x v0.1.6 h1:t11wG9AECkCDk5fMSoxmufanudBtJ+/HemLstXDLI2M=
github.com/cloudwego/base64x v0.1.6/go.mod h1:OFcloc187FXDaYHvrNIjxSe8ncn0OOM8gEHfghB2IPU=
github.com/coder/websocket v1.8.14 h1:9L0p0iKiNOibykf283eHkKUHHrpG7f65OE3BhhO7v9g=
github.com/coder/websocket v1.8.14/go.mod h1:NX3SzP+inril6yawo5CQXx8+fk145lPDC6pumgx0mVg=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/containerd/errdefs v1.0.0 h1:tg5yIfIlQIrxYtu9ajqY42W3lpS19XqdxRQeEwYG8PI=
github.com/containerd/errdefs v1.0.0/go.mod h1:+YBYIdtsnF4Iw6nWZhJcqGSg/dwvV7tyJ/kCkyJ2k+M=
github.com/containerd/errdefs/pkg v0.3.0 h1:9IKJ06FvyNlexW690DXuQNx2KA2cUJXx151Xdx3ZPPE=
github.com/containerd/errdefs/pkg v0.3.0/go.mod h1:NJw6s9HwNuRhnjJhM7pylWwMyAkmCQvQ4GpJHEqRLVk=
2025-12-03 19:29:37 +00:00
github.com/containerd/log v0.1.0 h1:TCJt7ioM2cr/tfR8GPbGf9/VRAX8D2B4PjzCpfX540I=
github.com/containerd/log v0.1.0/go.mod h1:VRRf09a7mHDIRezVKTRCrOq78v577GXq3bSa3EhrzVo=
github.com/containerd/platforms v0.2.1 h1:zvwtM3rz2YHPQsF2CHYM8+KtB5dvhISiXh5ZpSBQv6A=
github.com/containerd/platforms v0.2.1/go.mod h1:XHCb+2/hzowdiut9rkudds9bE5yJ7npe7dG/wG+uFPw=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/cpuguy83/dockercfg v0.3.2 h1:DlJTyZGBDlXqUZ2Dk2Q3xHs/FtnooJJVaad2S9GKorA=
github.com/cpuguy83/dockercfg v0.3.2/go.mod h1:sugsbF4//dDlL/i+S+rtpIWp+5h0BHJHfjj5/jFyUJc=
2025-12-03 19:29:37 +00:00
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/creack/pty v1.1.24 h1:bJrF4RRfyJnbTJqzRLHzcGaZK1NeM5kTC9jGgovnR1s=
github.com/creack/pty v1.1.24/go.mod h1:08sCNb52WyoAwi2QDyzUCTgcvVFhUzewun7wtTfvcwE=
2025-12-03 19:29:37 +00:00
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc=
github.com/dhowden/tag v0.0.0-20240417053706-3d75831295e8 h1:OtSeLS5y0Uy01jaKK4mA/WVIYtpzVm63vLVAPzJXigg=
github.com/dhowden/tag v0.0.0-20240417053706-3d75831295e8/go.mod h1:apkPC/CR3s48O2D7Y++n1XWEpgPNNCjXYga3PPbJe2E=
github.com/disintegration/imaging v1.6.2 h1:w1LecBlG2Lnp8B3jk5zSuNqd7b4DXhcjwek1ei82L+c=
github.com/disintegration/imaging v1.6.2/go.mod h1:44/5580QXChDfwIclfc/PCwrr44amcmDAg8hxG0Ewe4=
github.com/distribution/reference v0.6.0 h1:0IXCQ5g4/QMHHkarYzh5l+u8T3t73zM5QvfrDyIgxBk=
github.com/distribution/reference v0.6.0/go.mod h1:BbU0aIcezP1/5jX/8MP0YiH4SdvB5Y4f/wlDRiLyi3E=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/docker/go-connections v0.6.0 h1:LlMG9azAe1TqfR7sO+NJttz1gy6KO7VJBh+pMmjSD94=
github.com/docker/go-connections v0.6.0/go.mod h1:AahvXYshr6JgfUJGdDCs2b5EZG/vmaMAntpSFH5BFKE=
2025-12-03 19:29:37 +00:00
github.com/docker/go-units v0.5.0 h1:69rxXcBk27SvSaaxTtLh/8llcHD8vYHT7WSdRZ/jvr4=
github.com/docker/go-units v0.5.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/ebitengine/purego v0.10.0 h1:QIw4xfpWT6GWTzaW5XEKy3HXoqrJGx1ijYHzTF0/ISU=
github.com/ebitengine/purego v0.10.0/go.mod h1:iIjxzd6CiRiOG0UyXP+V1+jWqUXVjPKLAI0mRfJZTmQ=
github.com/elastic/elastic-transport-go/v8 v8.3.0 h1:DJGxovyQLXGr62e9nDMPSxRyWION0Bh6d9eCFBriiHo=
github.com/elastic/elastic-transport-go/v8 v8.3.0/go.mod h1:87Tcz8IVNe6rVSLdBux1o/PEItLtyabHU3naC7IoqKI=
github.com/elastic/go-elasticsearch/v8 v8.11.0 h1:gUazf443rdYAEAD7JHX5lSXRgTkG4N4IcsV8dcWQPxM=
github.com/elastic/go-elasticsearch/v8 v8.11.0/go.mod h1:GU1BJHO7WeamP7UhuElYwzzHtvf9SDmeVpSSy9+o6Qg=
2025-12-03 19:29:37 +00:00
github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
github.com/fsnotify/fsnotify v1.9.0 h1:2Ml+OJNzbYCTzsxtv8vKSFD9PbJjmhYF14k/jKC7S9k=
github.com/fsnotify/fsnotify v1.9.0/go.mod h1:8jBTzvmWwFyi3Pb8djgCCO5IBqzKJ/Jwo8TRcHyHii0=
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
P0: stabilisation backend/chat/stream + nouvelle base migrations v1 Backend Go: - Remplacement complet des anciennes migrations par la base V1 alignée sur ORIGIN. - Durcissement global du parsing JSON (BindAndValidateJSON + RespondWithAppError). - Sécurisation de config.go, CORS, statuts de santé et monitoring. - Implémentation des transactions P0 (RBAC, duplication de playlists, social toggles). - Ajout d’un job worker structuré (emails, analytics, thumbnails) + tests associés. - Nouvelle doc backend : AUDIT_CONFIG, BACKEND_CONFIG, AUTH_PASSWORD_RESET, JOB_WORKER_*. Chat server (Rust): - Refonte du pipeline JWT + sécurité, audit et rate limiting avancé. - Implémentation complète du cycle de message (read receipts, delivered, edit/delete, typing). - Nettoyage des panics, gestion d’erreurs robuste, logs structurés. - Migrations chat alignées sur le schéma UUID et nouvelles features. Stream server (Rust): - Refonte du moteur de streaming (encoding pipeline + HLS) et des modules core. - Transactions P0 pour les jobs et segments, garanties d’atomicité. - Documentation détaillée de la pipeline (AUDIT_STREAM_*, DESIGN_STREAM_PIPELINE, TRANSACTIONS_P0_IMPLEMENTATION). Documentation & audits: - TRIAGE.md et AUDIT_STABILITY.md à jour avec l’état réel des 3 services. - Cartographie complète des migrations et des transactions (DB_MIGRATIONS_*, DB_TRANSACTION_PLAN, AUDIT_DB_TRANSACTIONS, TRANSACTION_TESTS_PHASE3). - Scripts de reset et de cleanup pour la lab DB et la V1. Ce commit fige l’ensemble du travail de stabilisation P0 (UUID, backend, chat et stream) avant les phases suivantes (Coherence Guardian, WS hardening, etc.).
2025-12-06 10:14:38 +00:00
github.com/getsentry/sentry-go v0.40.0 h1:VTJMN9zbTvqDqPwheRVLcp0qcUcM+8eFivvGocAaSbo=
github.com/getsentry/sentry-go v0.40.0/go.mod h1:eRXCoh3uvmjQLY6qu63BjUZnaBu5L5WhMV1RwYO8W5s=
2025-12-03 19:29:37 +00:00
github.com/gin-contrib/gzip v0.0.6 h1:NjcunTcGAj5CO1gn4N8jHOSIeRFHIbn51z6K+xaN4d4=
github.com/gin-contrib/gzip v0.0.6/go.mod h1:QOJlmV2xmayAjkNS2Y8NQsMneuRShOU/kjovCXNuzzk=
github.com/gin-contrib/sse v1.1.0 h1:n0w2GMuUpWDVp7qSpvze6fAu9iRxJY4Hmj6AmBOU05w=
github.com/gin-contrib/sse v1.1.0/go.mod h1:hxRZ5gVpWMT7Z0B0gSNYqqsSCNIJMjzvm6fqCz9vjwM=
github.com/gin-gonic/gin v1.11.0 h1:OW/6PLjyusp2PPXtyxKHU0RbX6I/l28FTdDlae5ueWk=
github.com/gin-gonic/gin v1.11.0/go.mod h1:+iq/FyxlGzII0KHiBGjuNn4UNENUlKbGlNmc+W50Dls=
2025-12-06 13:45:07 +00:00
github.com/go-errors/errors v1.4.2 h1:J6MZopCL4uSllY1OfXM374weqZFFItUbrImctkmUxIA=
github.com/go-errors/errors v1.4.2/go.mod h1:sIVyrIiJhuEF+Pj9Ebtd6P/rEYROXFi3BopGUQ5a5Og=
2025-12-03 19:29:37 +00:00
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/go-logr/logr v1.4.3 h1:CjnDlHq8ikf6E492q6eKboGOC0T8CDaOvkHCIg8idEI=
github.com/go-logr/logr v1.4.3/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
2025-12-03 19:29:37 +00:00
github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
github.com/go-ole/go-ole v1.2.6 h1:/Fpf6oFPoeFik9ty7siob0G6Ke8QvQEuVcuChpwXzpY=
github.com/go-ole/go-ole v1.2.6/go.mod h1:pprOEPIfldk/42T2oK7lQ4v4JSDwmV0As9GaiUsvbm0=
github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
github.com/go-openapi/jsonpointer v0.21.0 h1:YgdVicSA9vH5RiHs9TZW5oyafXZFc6+2Vc1rr/O9oNQ=
github.com/go-openapi/jsonpointer v0.21.0/go.mod h1:IUyH9l/+uyhIYQ/PXVA41Rexl+kOkAPDdXEYns6fzUY=
2025-12-03 19:29:37 +00:00
github.com/go-openapi/jsonreference v0.19.6 h1:UBIxjkht+AWIgYzCDSv2GN+E/togfwXUJFRTWhl2Jjs=
github.com/go-openapi/jsonreference v0.19.6/go.mod h1:diGHMEHg2IqXZGKxqyvWdfWU/aim5Dprw5bqpKkTvns=
github.com/go-openapi/spec v0.20.4 h1:O8hJrt0UMnhHcluhIdUgCLRWyM2x7QkBXRvOs7m+O1M=
github.com/go-openapi/spec v0.20.4/go.mod h1:faYFR1CvsJZ0mNsmsphTMSoRrNV3TEDoAM7FOEWeq8I=
github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
github.com/go-openapi/swag v0.19.15/go.mod h1:QYRuS/SOXUCsnplDa677K7+DxSOj6IPNl/eQntq43wQ=
github.com/go-openapi/swag v0.23.0 h1:vsEVJDUo2hPJ2tu0/Xc+4noaxyEffXNIs3cOULZ+GrE=
github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ577vPjgQ=
github.com/go-pdf/fpdf v0.9.0 h1:PPvSaUuo1iMi9KkaAn90NuKi+P4gwMedWPHhj8YlJQw=
github.com/go-pdf/fpdf v0.9.0/go.mod h1:oO8N111TkmKb9D7VvWGLvLJlaZUQVPM+6V42pp3iV4Y=
2025-12-03 19:29:37 +00:00
github.com/go-playground/assert/v2 v2.2.0 h1:JvknZsQTYeFEAhQwI4qEt9cyV5ONwRHC+lYKSsYSR8s=
github.com/go-playground/assert/v2 v2.2.0/go.mod h1:VDjEfimB/XKnb+ZQfWdccd7VUvScMdVu0Titje2rxJ4=
github.com/go-playground/locales v0.14.1 h1:EWaQ/wswjilfKLTECiXz7Rh+3BjFhfDFKv/oXslEjJA=
github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
github.com/go-playground/universal-translator v0.18.1 h1:Bcnm0ZwsGyWbCzImXv+pAJnYK9S473LQFuzCbDbfSFY=
github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
github.com/go-playground/validator/v10 v10.27.0 h1:w8+XrWVMhGkxOaaowyKH35gFydVHOvC0/uWoy2Fzwn4=
github.com/go-playground/validator/v10 v10.27.0/go.mod h1:I5QpIEbmr8On7W0TktmJAumgzX4CA1XNl4ZmDuVHKKo=
2025-12-03 19:29:37 +00:00
github.com/goccy/go-json v0.10.2 h1:CrxCmQqYDkv1z7lO7Wbh2HN93uovUHgrECaO5ZrCXAU=
github.com/goccy/go-json v0.10.2/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
github.com/goccy/go-yaml v1.18.0 h1:8W7wMFS12Pcas7KU+VVkaiCng+kG8QiFeFwzFb+rwuw=
github.com/goccy/go-yaml v1.18.0/go.mod h1:XBurs7gK8ATbW4ZPGKgcbrY1Br56PdM69F7LkFRi1kA=
github.com/golang-jwt/jwt/v5 v5.2.1/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk=
2025-12-03 19:29:37 +00:00
github.com/golang-jwt/jwt/v5 v5.3.0 h1:pv4AsKCKKZuqlgs5sUmn4x8UlGa0kEVt/puTpKx9vvo=
github.com/golang-jwt/jwt/v5 v5.3.0/go.mod h1:fxCRLWMO43lRc8nhHWY6LGqRcf+1gQWArsqaEUEa5bE=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
2025-12-03 19:29:37 +00:00
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0 h1:HWRh5R2+9EifMyIHV7ZV+MIZqgz+PMpZ14Jynv3O2Zs=
github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0/go.mod h1:JfhWUomR1baixubs02l85lZYYOm7LV6om4ceouMv45c=
2025-12-03 19:29:37 +00:00
github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=
github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761/go.mod h1:5TJZWKEWniPve33vlWYSoGYefn3gLQRzjfDlhSJ9ZKM=
github.com/jackc/pgx/v5 v5.6.0 h1:SWJzexBzPL5jb0GEsrPMLIsi/3jOo7RHlzTjcAeDrPY=
github.com/jackc/pgx/v5 v5.6.0/go.mod h1:DNZ/vlrUnhWCoFGxHAG8U2ljioxukquj7utPDgtQdTw=
github.com/jackc/puddle/v2 v2.2.2 h1:PR8nw+E/1w0GLuRFSmiioY6UooMp6KJv0/61nB7icHo=
github.com/jackc/puddle/v2 v2.2.2/go.mod h1:vriiEXHvEE654aYKXXjOvZM39qJ0q+azkZFrfEOc3H4=
github.com/jinzhu/inflection v1.0.0 h1:K317FqzuhWc8YvSVlFMCCUb36O/S9MCKRDI7QkRKD/E=
github.com/jinzhu/inflection v1.0.0/go.mod h1:h+uFLlag+Qp1Va5pdKtLDYj+kHp5pxUVkryuEj+Srlc=
github.com/jinzhu/now v1.1.5 h1:/o9tlHleP7gOFmsnYNz3RGnqzefHA47wQpKrrdTIwXQ=
github.com/jinzhu/now v1.1.5/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8=
github.com/joho/godotenv v1.5.1 h1:7eLL/+HRGLY0ldzfGMeQkb7vMd0as4CfYvUVzLqw0N0=
github.com/joho/godotenv v1.5.1/go.mod h1:f4LDr5Voq0i2e/R5DDNOoa2zzDfwtkZa6DnEwAbqwq4=
github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
github.com/jpillora/backoff v1.0.0 h1:uvFg412JmmHBHw7iwprIxkPMI+sGQ4kzOWsMeHnm2EA=
github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
2025-12-03 19:29:37 +00:00
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
github.com/kisielk/sqlstruct v0.0.0-20201105191214-5f3e10d3ab46/go.mod h1:yyMNCyc/Ib3bDTKd379tNMpB/7/H5TjM2Y9QJ5THLbE=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/klauspost/compress v1.18.5 h1:/h1gH5Ce+VWNLSWqPzOVn6XBO+vJbCNGvjoaGBFW2IE=
github.com/klauspost/compress v1.18.5/go.mod h1:cwPg85FWrGar70rWktvGQj8/hthj3wpl0PGDogxkrSQ=
github.com/klauspost/cpuid/v2 v2.3.0 h1:S4CRMLnYUhGeDFDqkGriYKdfoFlDnMtqTiI/sFzhA9Y=
github.com/klauspost/cpuid/v2 v2.3.0/go.mod h1:hqwkgyIinND0mEev00jJYCxPNVRVXFQeu1XKlok6oO0=
2025-12-03 19:29:37 +00:00
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
github.com/leodido/go-urn v1.4.0 h1:WT9HwE9SGECu3lg4d/dIA+jxlljEa1/ffXKmRjqdmIQ=
github.com/leodido/go-urn v1.4.0/go.mod h1:bvxc+MVxLKB4z00jd1z+Dvzr47oO32F/QSNjSBOlFxI=
2025-12-03 19:29:37 +00:00
github.com/lib/pq v1.10.9 h1:YXG7RB+JIjhP29X+OtkiDnYaXQwpS4JEWq7dtCCRUEw=
github.com/lib/pq v1.10.9/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o=
github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0 h1:6E+4a0GO5zZEnZ81pIr0yLvtUWk2if982qA3F3QD6H4=
github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0/go.mod h1:zJYVVT2jmtg6P3p1VtQj7WsuWi/y4VnjVBn7F8KPB3I=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/magiconair/properties v1.8.10 h1:s31yESBquKXCV9a/ScB3ESkOjUYYv+X0rg8SYxI99mE=
github.com/magiconair/properties v1.8.10/go.mod h1:Dhd985XPs7jluiymwWYZ0G4Z61jb3vdS329zhj2hYo0=
2025-12-03 19:29:37 +00:00
github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
github.com/mailru/easyjson v0.7.6/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mailru/easyjson v0.7.7 h1:UGYAvKxe3sBsEDzO8ZeWOSlIQfWFlxbzLZe7hwFURr0=
github.com/mailru/easyjson v0.7.7/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY=
github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
2025-12-03 19:29:37 +00:00
github.com/mattn/go-sqlite3 v1.14.22 h1:2gZY6PC6kBnID23Tichd1K+Z0oS6nE/XwU+Vz/5o4kU=
github.com/mattn/go-sqlite3 v1.14.22/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/mdelapenya/tlscert v0.2.0 h1:7H81W6Z/4weDvZBNOfQte5GpIMo0lGYEeWbkGp5LJHI=
github.com/mdelapenya/tlscert v0.2.0/go.mod h1:O4njj3ELLnJjGdkN7M/vIVCpZ+Cf0L6muqOG4tLSl8o=
2025-12-03 19:29:37 +00:00
github.com/moby/docker-image-spec v1.3.1 h1:jMKff3w6PgbfSa69GfNg+zN/XLhfXJGnEx3Nl2EsFP0=
github.com/moby/docker-image-spec v1.3.1/go.mod h1:eKmb5VW8vQEh/BAr2yvVNvuiJuY6UIocYsFu/DxxRpo=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/moby/go-archive v0.2.0 h1:zg5QDUM2mi0JIM9fdQZWC7U8+2ZfixfTYoHL7rWUcP8=
github.com/moby/go-archive v0.2.0/go.mod h1:mNeivT14o8xU+5q1YnNrkQVpK+dnNe/K6fHqnTg4qPU=
github.com/moby/moby/api v1.54.1 h1:TqVzuJkOLsgLDDwNLmYqACUuTehOHRGKiPhvH8V3Nn4=
github.com/moby/moby/api v1.54.1/go.mod h1:+RQ6wluLwtYaTd1WnPLykIDPekkuyD/ROWQClE83pzs=
github.com/moby/moby/client v0.4.0 h1:S+2XegzHQrrvTCvF6s5HFzcrywWQmuVnhOXe2kiWjIw=
github.com/moby/moby/client v0.4.0/go.mod h1:QWPbvWchQbxBNdaLSpoKpCdf5E+WxFAgNHogCWDoa7g=
github.com/moby/patternmatcher v0.6.1 h1:qlhtafmr6kgMIJjKJMDmMWq7WLkKIo23hsrpR3x084U=
github.com/moby/patternmatcher v0.6.1/go.mod h1:hDPoyOpDY7OrrMDLaYoY3hf52gNCR/YOUYxkhApJIxc=
github.com/moby/sys/sequential v0.6.0 h1:qrx7XFUd/5DxtqcoH1h438hF5TmOvzC/lspjy7zgvCU=
github.com/moby/sys/sequential v0.6.0/go.mod h1:uyv8EUTrca5PnDsdMGXhZe6CCe8U/UiTWd+lL+7b/Ko=
github.com/moby/sys/user v0.4.0 h1:jhcMKit7SA80hivmFJcbB1vqmw//wU61Zdui2eQXuMs=
github.com/moby/sys/user v0.4.0/go.mod h1:bG+tYYYJgaMtRKgEmuueC0hJEAZWwtIbZTB+85uoHjs=
github.com/moby/sys/userns v0.1.0 h1:tVLXkFOxVu9A64/yh59slHVv9ahO9UIev4JZusOLG/g=
github.com/moby/sys/userns v0.1.0/go.mod h1:IHUYgu/kao6N8YZlp9Cf444ySSvCmDlmzUcYfDHOl28=
github.com/moby/term v0.5.2 h1:6qk3FJAFDs6i/q3W/pQ97SX192qKfZgGjCQqfCJkgzQ=
github.com/moby/term v0.5.2/go.mod h1:d3djjFCrjnB+fl8NJux+EJzu0msscUP+f8it8hPkFLc=
2025-12-03 19:29:37 +00:00
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f h1:KUppIJq7/+SVif2QVs3tOP0zanoHgBEVAwHxUSIzRqU=
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
2025-12-03 19:29:37 +00:00
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
github.com/opencontainers/go-digest v1.0.0 h1:apOUWs51W5PlhuyGyz9FCeeBIOUDA/6nW8Oi/yOhh5U=
github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/opencontainers/image-spec v1.1.1 h1:y0fUlFfIZhPF1W537XOLg0/fcx6zcHCJwooC2xJA040=
github.com/opencontainers/image-spec v1.1.1/go.mod h1:qpqAh3Dmcf36wStyyWU+kCeDgrGnAve2nCC8+7h8Q0M=
github.com/pelletier/go-toml/v2 v2.2.4 h1:mye9XuhQ6gvn5h28+VilKrrPoQVanw5PMw/TB0t5Ec4=
github.com/pelletier/go-toml/v2 v2.2.4/go.mod h1:2gIqNv+qfxSVS7cM2xJQKtLSTLUE9V8t9Stt+h56mCY=
2025-12-06 13:45:07 +00:00
github.com/pingcap/errors v0.11.4 h1:lFuQV/oaUMGcD2tqt+01ROSmJs75VG1ToEOkZIZ4nE4=
github.com/pingcap/errors v0.11.4/go.mod h1:Oi8TUi2kEtXXLMJk9l1cGmz20kV3TaQ0usTwv5KuLY8=
2025-12-03 19:29:37 +00:00
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/power-devops/perfstat v0.0.0-20240221224432-82ca36839d55 h1:o4JXh1EVt9k/+g42oCprj/FisM4qX9L3sZB3upGN2ZU=
github.com/power-devops/perfstat v0.0.0-20240221224432-82ca36839d55/go.mod h1:OmDBASR4679mdNQnz2pUhc2G8CO2JrUAVFDRBDP/hJE=
2025-12-03 19:29:37 +00:00
github.com/pquerna/otp v1.5.0 h1:NMMR+WrmaqXU4EzdGJEE1aUUI0AMRzsp96fFFWNPwxs=
github.com/pquerna/otp v1.5.0/go.mod h1:dkJfzwRKNiegxyNb54X/3fLwhCynbMspSyWKnvi1AEg=
github.com/prometheus/client_golang v1.22.0 h1:rb93p9lokFEsctTys46VnV1kLCDpVZ0a/Y92Vm0Zc6Q=
github.com/prometheus/client_golang v1.22.0/go.mod h1:R7ljNsLXhuQXYZYtw6GAE9AZg8Y7vEW5scdCXrWRXC0=
github.com/prometheus/client_model v0.6.2 h1:oBsgwpGs7iVziMvrGhE53c/GrLUsZdHnqNwqPLxwZyk=
github.com/prometheus/client_model v0.6.2/go.mod h1:y3m2F6Gdpfy6Ut/GBsUqTWZqCUvMVzSfMLjcu6wAwpE=
github.com/prometheus/common v0.63.0 h1:YR/EIY1o3mEFP/kZCD7iDMnLPlGyuU2Gb3HIcXnA98k=
github.com/prometheus/common v0.63.0/go.mod h1:VVFF/fBIoToEnWRVkYoXEkq3R3paCoxG9PXP74SnV18=
github.com/prometheus/procfs v0.16.1 h1:hZ15bTNuirocR6u0JZ6BAHHmwS1p8B4P6MRqxtzMyRg=
github.com/prometheus/procfs v0.16.1/go.mod h1:teAbpZRB1iIAJYREa1LsoWUXykVXA1KlTmWl8x/U+Is=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/quic-go/qpack v0.6.0 h1:g7W+BMYynC1LbYLSqRt8PBg5Tgwxn214ZZR34VIOjz8=
github.com/quic-go/qpack v0.6.0/go.mod h1:lUpLKChi8njB4ty2bFLX2x4gzDqXwUpaO1DP9qMDZII=
github.com/quic-go/quic-go v0.57.0 h1:AsSSrrMs4qI/hLrKlTH/TGQeTMY0ib1pAOX7vA3AdqE=
github.com/quic-go/quic-go v0.57.0/go.mod h1:ly4QBAjHA2VhdnxhojRsCUOeJwKYg+taDlos92xb1+s=
2025-12-03 19:29:37 +00:00
github.com/rabbitmq/amqp091-go v1.10.0 h1:STpn5XsHlHGcecLmMFCtg7mqq0RnD+zFr4uzukfVhBw=
github.com/rabbitmq/amqp091-go v1.10.0/go.mod h1:Hy4jKW5kQART1u+JkDTF9YYOQUHXqMuhrgxOEeS7G4o=
github.com/redis/go-redis/v9 v9.16.0 h1:OotgqgLSRCmzfqChbQyG1PHC3tLNR89DG4jdOERSEP4=
github.com/redis/go-redis/v9 v9.16.0/go.mod h1:u410H11HMLoB+TP67dz8rL9s6QW2j76l0//kSOd3370=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/rogpeppe/go-internal v1.14.1 h1:UQB4HGPB6osV0SQTLymcB4TgvyWu6ZyliaW0tI/otEQ=
github.com/rogpeppe/go-internal v1.14.1/go.mod h1:MaRKkUm5W0goXpeCfT7UZI6fk/L7L7so1lCWt35ZSgc=
github.com/shirou/gopsutil/v4 v4.26.3 h1:2ESdQt90yU3oXF/CdOlRCJxrP+Am1aBYubTMTfxJ1qc=
github.com/shirou/gopsutil/v4 v4.26.3/go.mod h1:LZ6ewCSkBqUpvSOf+LsTGnRinC6iaNUNMGBtDkJBaLQ=
github.com/sirupsen/logrus v1.9.4 h1:TsZE7l11zFCLZnZ+teH4Umoq5BhEIfIzfRDZ1Uzql2w=
github.com/sirupsen/logrus v1.9.4/go.mod h1:ftWc9WdOfJ0a92nsE2jF5u5ZwH8Bv2zdeOC42RjbV2g=
2025-12-16 16:23:49 +00:00
github.com/sony/gobreaker v1.0.0 h1:feX5fGGXSl3dYd4aHZItw+FpHLvvoaqkawKjVNiFMNQ=
github.com/sony/gobreaker v1.0.0/go.mod h1:ZKptC7FHNvhBz7dN2LGjPVBz2sZJmc0/PkyDJOjmxWY=
2025-12-03 19:29:37 +00:00
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/stretchr/objx v0.5.3 h1:jmXUvGomnU1o3W/V5h2VEradbpJDwGrzugQQvL0POH4=
github.com/stretchr/objx v0.5.3/go.mod h1:rDQraq+vQZU7Fde9LOZLr8Tax6zZvy4kuNKF+QYS+U0=
2025-12-03 19:29:37 +00:00
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
github.com/stripe/stripe-go/v82 v82.5.1 h1:05q6ZDKoe8PLMpQV072obF74HCgP4XJeJYoNuRSX2+8=
github.com/stripe/stripe-go/v82 v82.5.1/go.mod h1:majCQX6AfObAvJiHraPi/5udwHi4ojRvJnnxckvHrX8=
2025-12-03 19:29:37 +00:00
github.com/swaggo/files v1.0.1 h1:J1bVJ4XHZNq0I46UU90611i9/YzdrF7x92oX1ig5IdE=
github.com/swaggo/files v1.0.1/go.mod h1:0qXmMNH6sXNf+73t65aKeB+ApmgxdnkQzVTAj2uaMUg=
github.com/swaggo/gin-swagger v1.6.1 h1:Ri06G4gc9N4t4k8hekMigJ9zKTFSlqj/9paAQCQs7cY=
github.com/swaggo/gin-swagger v1.6.1/go.mod h1:LQ+hJStHakCWRiK/YNYtJOu4mR2FP+pxLnILT/qNiTw=
github.com/swaggo/swag v1.16.6 h1:qBNcx53ZaX+M5dxVyTrgQ0PJ/ACK+NzhwcbieTt+9yI=
github.com/swaggo/swag v1.16.6/go.mod h1:ngP2etMK5a0P3QBizic5MEwpRmluJZPHjXcMoj4Xesg=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/testcontainers/testcontainers-go v0.42.0 h1:He3IhTzTZOygSXLJPMX7n44XtK+qhjat1nI9cneBbUY=
github.com/testcontainers/testcontainers-go v0.42.0/go.mod h1:vZjdY1YmUA1qEForxOIOazfsrdyORJAbhi0bp8plN30=
github.com/testcontainers/testcontainers-go/modules/postgres v0.42.0 h1:GCbb1ndrF7OTDiIvxXyItaDab4qkzTFJ48LKFdM7EIo=
github.com/testcontainers/testcontainers-go/modules/postgres v0.42.0/go.mod h1:IRPBaI8jXdrNfD0e4Zm7Fbcgaz5shKxOQv4axiL09xs=
github.com/tklauser/go-sysconf v0.3.16 h1:frioLaCQSsF5Cy1jgRBrzr6t502KIIwQ0MArYICU0nA=
github.com/tklauser/go-sysconf v0.3.16/go.mod h1:/qNL9xxDhc7tx3HSRsLWNnuzbVfh3e7gh/BmM179nYI=
github.com/tklauser/numcpus v0.11.0 h1:nSTwhKH5e1dMNsCdVBukSZrURJRoHbSEQjdEbY+9RXw=
github.com/tklauser/numcpus v0.11.0/go.mod h1:z+LwcLq54uWZTX0u/bGobaV34u6V7KNlTZejzM6/3MQ=
2025-12-03 19:29:37 +00:00
github.com/twitchyliquid64/golang-asm v0.15.1 h1:SU5vSMR7hnwNxj24w34ZyCi/FmDZTkS4MhqMhdFk5YI=
github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
github.com/ugorji/go/codec v1.3.0 h1:Qd2W2sQawAfG8XSvzwhBeoGq71zXOC/Q1E9y/wUcsUA=
github.com/ugorji/go/codec v1.3.0/go.mod h1:pRBVtBSKl77K30Bv8R2P+cLSGaTtex6fsA2Wjqmfxj4=
2025-12-03 19:29:37 +00:00
github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
github.com/yusufpapurcu/wmi v1.2.4 h1:zFUKzehAFReQwLys1b/iSMl+JQGSCSjtVqQn9bBrPo0=
github.com/yusufpapurcu/wmi v1.2.4/go.mod h1:SBZ9tNy3G9/m5Oi98Zks0QjeHVDvuK0qfxQmPyzfmi0=
go.opentelemetry.io/auto/sdk v1.2.1 h1:jXsnJ4Lmnqd11kwkBV2LgLoFMZKizbCi5fNZ/ipaZ64=
go.opentelemetry.io/auto/sdk v1.2.1/go.mod h1:KRTj+aOaElaLi+wW1kO/DZRXwkF4C5xPbEe3ZiIhN7Y=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0 h1:sbiXRNDSWJOTobXh5HyQKjq6wUC5tNybqjIqDpAY4CU=
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0/go.mod h1:69uWxva0WgAA/4bu2Yy70SLDBwZXuQ6PbBpbsa5iZrQ=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
go.opentelemetry.io/otel v1.43.0 h1:mYIM03dnh5zfN7HautFE4ieIig9amkNANT+xcVxAj9I=
go.opentelemetry.io/otel v1.43.0/go.mod h1:JuG+u74mvjvcm8vj8pI5XiHy1zDeoCS2LB1spIq7Ay0=
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.43.0 h1:88Y4s2C8oTui1LGM6bTWkw0ICGcOLCAI5l6zsD1j20k=
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.43.0/go.mod h1:Vl1/iaggsuRlrHf/hfPJPvVag77kKyvrLeD10kpMl+A=
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.43.0 h1:RAE+JPfvEmvy+0LzyUA25/SGawPwIUbZ6u0Wug54sLc=
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.43.0/go.mod h1:AGmbycVGEsRx9mXMZ75CsOyhSP6MFIcj/6dnG+vhVjk=
go.opentelemetry.io/otel/metric v1.43.0 h1:d7638QeInOnuwOONPp4JAOGfbCEpYb+K6DVWvdxGzgM=
go.opentelemetry.io/otel/metric v1.43.0/go.mod h1:RDnPtIxvqlgO8GRW18W6Z/4P462ldprJtfxHxyKd2PY=
go.opentelemetry.io/otel/sdk v1.43.0 h1:pi5mE86i5rTeLXqoF/hhiBtUNcrAGHLKQdhg4h4V9Dg=
go.opentelemetry.io/otel/sdk v1.43.0/go.mod h1:P+IkVU3iWukmiit/Yf9AWvpyRDlUeBaRg6Y+C58QHzg=
go.opentelemetry.io/otel/sdk/metric v1.43.0 h1:S88dyqXjJkuBNLeMcVPRFXpRw2fuwdvfCGLEo89fDkw=
go.opentelemetry.io/otel/sdk/metric v1.43.0/go.mod h1:C/RJtwSEJ5hzTiUz5pXF1kILHStzb9zFlIEe85bhj6A=
go.opentelemetry.io/otel/trace v1.43.0 h1:BkNrHpup+4k4w+ZZ86CZoHHEkohws8AY+WTX09nk+3A=
go.opentelemetry.io/otel/trace v1.43.0/go.mod h1:/QJhyVBUUswCphDVxq+8mld+AvhXZLhe+8WVFxiFff0=
go.opentelemetry.io/proto/otlp v1.10.0 h1:IQRWgT5srOCYfiWnpqUYz9CVmbO8bFmKcwYxpuCSL2g=
go.opentelemetry.io/proto/otlp v1.10.0/go.mod h1:/CV4QoCR/S9yaPj8utp3lvQPoqMtxXdzn7ozvvozVqk=
2025-12-03 19:29:37 +00:00
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
go.uber.org/mock v0.5.2 h1:LbtPTcP8A5k9WPXj54PPPbjcI4Y6lhyOZXn+VS7wNko=
go.uber.org/mock v0.5.2/go.mod h1:wLlUxC2vVTPTaE3UD51E0BGOAElKrILxhVSDYQLld5o=
2025-12-03 19:29:37 +00:00
go.uber.org/multierr v1.10.0 h1:S0h4aNzvfcFsC3dRF1jLoaov7oRaKqRGC/pUEJ2yvPQ=
go.uber.org/multierr v1.10.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
golang.org/x/arch v0.20.0 h1:dx1zTU0MAE98U+TQ8BLl7XsJbgze2WnNKF/8tGp/Q6c=
golang.org/x/arch v0.20.0/go.mod h1:bdwinDaKcfZUGpH09BB7ZmOfhalA8lQdzl62l8gGWsk=
2025-12-03 19:29:37 +00:00
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
golang.org/x/crypto v0.23.0/go.mod h1:CKFgDieR+mRhux2Lsu27y0fO304Db0wZe70UKqHu0v8=
golang.org/x/crypto v0.31.0/go.mod h1:kDsLvtWBEx7MV9tJOj9bnXsPbxwJQ6csT/x4KIN4Ssk=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
golang.org/x/crypto v0.49.0 h1:+Ng2ULVvLHnJ/ZFEq4KdcDd/cfjrrjjNSXNzxg0Y4U4=
golang.org/x/crypto v0.49.0/go.mod h1:ErX4dUh2UM+CFYiXZRTcMpEcN8b/1gxEuv3nODoYtCA=
2025-12-03 19:29:37 +00:00
golang.org/x/image v0.0.0-20191009234506-e7c1f5e7dbb8/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/image v0.38.0 h1:5l+q+Y9JDC7mBOMjo4/aPhMDcxEptsX+Tt3GgRQRPuE=
golang.org/x/image v0.38.0/go.mod h1:/3f6vaXC+6CEanU4KJxbcUZyEePbyKbaLoDOe4ehFYY=
2025-12-03 19:29:37 +00:00
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
golang.org/x/mod v0.15.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/mod v0.33.0 h1:tHFzIWbBifEmbwtGz65eaWyGiGZatSrT9prnU8DbVL8=
golang.org/x/mod v0.33.0/go.mod h1:swjeQEj+6r7fODbD2cqrnje9PnziFuw4bmLbBZFrQ5w=
2025-12-03 19:29:37 +00:00
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
golang.org/x/net v0.0.0-20210421230115-4e50805a0758/go.mod h1:72T/g9IO56b78aLF+1Kcs5dz7/ng1VjMUvfKvpfy+jM=
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
2025-12-03 19:29:37 +00:00
golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
golang.org/x/net v0.52.0 h1:He/TN1l0e4mmR3QqHMT2Xab3Aj3L9qjbhRm78/6jrW0=
golang.org/x/net v0.52.0/go.mod h1:R1MAz7uMZxVMualyPXb+VaqGSa3LIaUqk0eEt3w36Sw=
golang.org/x/oauth2 v0.35.0 h1:Mv2mzuHuZuY2+bkyWXIHMfhNdJAdwW3FuWeCPYN5GVQ=
golang.org/x/oauth2 v0.35.0/go.mod h1:lzm5WQJQwKZ3nwavOZ3IS5Aulzxi68dUSgRHujetwEA=
2025-12-03 19:29:37 +00:00
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
golang.org/x/sync v0.10.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/sync v0.20.0 h1:e0PTpb7pjO8GAtTs2dQ6jYa5BWYlMuX047Dco/pItO4=
golang.org/x/sync v0.20.0/go.mod h1:9xrNwdLfx4jkKbNva9FpL6vEN7evnE43NNNJQ2LF3+0=
2025-12-03 19:29:37 +00:00
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190916202348-b4ddaad3f8a3/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20201204225414-ed752295db88/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210420072515-93ed5bcd2bfe/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.17.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/sys v0.28.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/sys v0.42.0 h1:omrd2nAlyT5ESRdCLYdm3+fMfNFE/+Rf4bDIQImRJeo=
golang.org/x/sys v0.42.0/go.mod h1:4GL1E5IUh+htKOUEOaiffhrAeqysfVGipDYzABqnCmw=
golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE=
2025-12-03 19:29:37 +00:00
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo=
golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU=
golang.org/x/term v0.17.0/go.mod h1:lLRBjIVuehSbZlaOtGMbcMncT+aqLLLmKrsjNrUguwk=
golang.org/x/term v0.20.0/go.mod h1:8UkIAJTvZgivsXaD6/pH6U9ecQzZ45awqEOzuCvwpFY=
golang.org/x/term v0.27.0/go.mod h1:iMsnZpn0cago0GOrHO2+Y7u7JPn5AylBrcoWkElMTSM=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
golang.org/x/term v0.41.0 h1:QCgPso/Q3RTJx2Th4bDLqML4W6iJiaXFq2/ftQF13YU=
golang.org/x/term v0.41.0/go.mod h1:3pfBgksrReYfZ5lvYM0kSO0LIkAl4Yl2bXOkKP7Ec2A=
2025-12-03 19:29:37 +00:00
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/text v0.35.0 h1:JOVx6vVDFokkpaq1AEptVzLTpDe9KGpj5tR4/X+ybL8=
golang.org/x/text v0.35.0/go.mod h1:khi/HExzZJ2pGnjenulevKNX1W67CUy0AsXcNubPGCA=
2025-12-03 19:29:37 +00:00
golang.org/x/time v0.12.0 h1:ScB/8o8olJvc+CQPWrK3fPZNfh7qgwCrY0zJmoEQLSE=
golang.org/x/time v0.12.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
golang.org/x/tools v0.42.0 h1:uNgphsn75Tdz5Ji2q36v/nsFSfR/9BRFvqhGBaJGd5k=
golang.org/x/tools v0.42.0/go.mod h1:Ma6lCIwGZvHK6XtgbswSoWroEkhugApmsXyrUmBhfr0=
2025-12-03 19:29:37 +00:00
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
feat(observability): OTel SDK + collector + Tempo + 4 hot path spans (W2 Day 9) Wires distributed tracing end-to-end. Backend exports OTLP/gRPC to a collector, which tail-samples (errors + slow always, 10% rest) and ships to Tempo. Grafana service-map dashboard pivots on the 4 instrumented hot paths. - internal/tracing/otlp_exporter.go : InitOTLPTracer + Provider.Shutdown, BatchSpanProcessor (5s/512 batch), ParentBased(TraceIDRatio) sampler, W3C trace-context + baggage propagators. OTEL_SDK_DISABLED=true short-circuits to a no-op. Failure to dial collector is non-fatal. - cmd/api/main.go : init at boot, defer Shutdown(5s) on exit. appVersion ldflag-overridable for resource attributes. - 4 hot paths instrumented : * handlers/auth.go::Login → "auth.login" * core/track/track_upload_handler.go::InitiateChunkedUpload → "track.upload.initiate" * core/marketplace/service.go::ProcessPaymentWebhook → "payment.webhook" * handlers/search_handlers.go::Search → "search.query" PII guarded — email masked, query content not recorded (length only). - infra/ansible/roles/otel_collector : pin v0.116.1 contrib build, systemd unit, tail-sampling config (errors + > 500ms always kept). - infra/ansible/roles/tempo : pin v2.7.1 monolithic, local-disk backend (S3 deferred to v1.1), 14d retention. - infra/ansible/playbooks/observability.yml : provisions both Incus containers + applies common baseline + roles in order. - inventory/lab.yml : new groups observability, otel_collectors, tempo. - config/grafana/dashboards/service-map.json : node graph + 4 hot-path span tables + collector throughput/queue panels. - docs/ENV_VARIABLES.md §30 : 4 OTEL_* env vars documented. Acceptance criterion (Day 9) : login → span visible in Tempo UI. Lab deployment to validate with `ansible-playbook -i inventory/lab.yml playbooks/observability.yml` once roles/postgres_ha is up. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-27 23:15:11 +00:00
gonum.org/v1/gonum v0.17.0 h1:VbpOemQlsSMrYmn7T2OUvQ4dqxQXU+ouZFQsZOx50z4=
gonum.org/v1/gonum v0.17.0/go.mod h1:El3tOrEuMpv2UdMrbNlKEh9vd86bmQ6vqIcDwxEOc1E=
google.golang.org/genproto/googleapis/api v0.0.0-20260401024825-9d38bb4040a9 h1:VPWxll4HlMw1Vs/qXtN7BvhZqsS9cdAittCNvVENElA=
google.golang.org/genproto/googleapis/api v0.0.0-20260401024825-9d38bb4040a9/go.mod h1:7QBABkRtR8z+TEnmXTqIqwJLlzrZKVfAUm7tY3yGv0M=
google.golang.org/genproto/googleapis/rpc v0.0.0-20260401024825-9d38bb4040a9 h1:m8qni9SQFH0tJc1X0vmnpw/0t+AImlSvp30sEupozUg=
google.golang.org/genproto/googleapis/rpc v0.0.0-20260401024825-9d38bb4040a9/go.mod h1:4Hqkh8ycfw05ld/3BWL7rJOSfebL2Q+DVDeRgYgxUU8=
google.golang.org/grpc v1.80.0 h1:Xr6m2WmWZLETvUNvIUmeD5OAagMw3FiKmMlTdViWsHM=
google.golang.org/grpc v1.80.0/go.mod h1:ho/dLnxwi3EDJA4Zghp7k2Ec1+c2jqup0bFkw07bwF4=
google.golang.org/protobuf v1.36.11 h1:fV6ZwhNocDyBLK0dj+fg8ektcVegBBuEolpbTQyBNVE=
google.golang.org/protobuf v1.36.11/go.mod h1:HTf+CrKn2C3g5S8VImy6tdcUvCska2kB7j23XfzDpco=
2025-12-03 19:29:37 +00:00
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
gopkg.in/natefinch/lumberjack.v2 v2.2.1 h1:bBRl1b0OH9s/DuPhuXpNl+VtCaJXFZ5/uEFST95x9zc=
gopkg.in/natefinch/lumberjack.v2 v2.2.1/go.mod h1:YD8tP3GAjkrDg1eZH7EGmyESg/lsYskCTPBJVb9jqSc=
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gorm.io/driver/postgres v1.6.0 h1:2dxzU8xJ+ivvqTRph34QX+WrRaJlmfyPqXmoGVjMBa4=
gorm.io/driver/postgres v1.6.0/go.mod h1:vUw0mrGgrTK+uPHEhAdV4sfFELrByKVGnaVRkXDhtWo=
gorm.io/driver/sqlite v1.6.0 h1:WHRRrIiulaPiPFmDcod6prc4l2VGVWHz80KspNsxSfQ=
gorm.io/driver/sqlite v1.6.0/go.mod h1:AO9V1qIQddBESngQUKWL9yoH93HIeA1X6V633rBwyT8=
gorm.io/gorm v1.30.0 h1:qbT5aPv1UH8gI99OsRlvDToLxW5zR7FzS9acZDOZcgs=
gorm.io/gorm v1.30.0/go.mod h1:8Z33v652h4//uMA76KjeDH8mJXPm1QNCYrMeatR0DOE=
fix(deps): bump vulnerable modules to unblock govulncheck CI Backend (Go) CI has been red for the entire v1.0.4 cleanup sprint (and before it) because govulncheck reports 7 vulnerabilities in transitive test-infrastructure deps, while the test suite itself passes cleanly. Bump three direct dependencies to pull fixed versions of the affected modules. Direct bumps: golang.org/x/image v0.36.0 → v0.38.0 (GO-2026-4815) github.com/quic-go/quic-go v0.54.0 → v0.57.0 (GO-2025-4233) github.com/testcontainers/testcontainers-go v0.33.0 → v0.42.0 github.com/testcontainers/testcontainers-go/modules/postgres v0.33.0 → v0.42.0 Indirect / transitive side effects: - containerd/containerd v1.7.18 is REMOVED from the dependency graph. Newer testcontainers-go depends on containerd/errdefs + log + platforms sub-packages only, which do not carry GO-2025-4108 / GO-2025-4100 / GO-2025-3528. - docker/docker v27.1.1 is REMOVED from the dependency graph for the same reason — it was reached only via testcontainers-go, and the new version no longer pulls the full Moby engine. This eliminates GO-2026-4887 and GO-2026-4883 (the two vulns with no upstream fix) WITHOUT needing a govulncheck allowlist/exclude wrapper. - quic-go/qpack, x/crypto, x/net, x/sync, x/sys, x/text, x/tools and a handful of otel-* modules bumped as a coherent set. - Transitive opentelemetry bump (otel v1.24.0 → v1.41.0) is expected since testcontainers-go v0.42 pulls a newer instrumentation. All 7 vulnerabilities previously reported are now resolved: GO-2026-4887 docker/docker — vuln module removed GO-2026-4883 docker/docker — vuln module removed GO-2026-4815 x/image — fixed in v0.38.0 GO-2025-4233 quic-go — fixed in v0.57.0 GO-2025-4108 containerd — vuln module removed GO-2025-4100 containerd — vuln module removed GO-2025-3528 containerd — vuln module removed Verification (local): go build ./... OK go vet ./... OK govulncheck ./... OK (no findings) VEZA_SKIP_INTEGRATION=1 go test ./internal/... -short OK No breaking API changes observed from the testcontainers-go v0.33 → v0.42 bump (the project only uses GenericContainer, DockerContainer .Terminate, and modules/postgres which are stable across these versions). The shared Redis testcontainer helper in internal/testutils and the hard-delete worker integration test from J4 still compile and pass. This commit enables the v1.0.4 tag to be cut on a green CI. No J7 (release) commit is part of this change — that ships separately. Refs: AUDIT_REPORT.md §10 P5 (test infra hygiene), CI run 98
2026-04-15 12:38:48 +00:00
gotest.tools/v3 v3.5.2 h1:7koQfIKdy+I8UTetycgUqXWSDwpgv193Ka+qRsmBY8Q=
gotest.tools/v3 v3.5.2/go.mod h1:LtdLGcnqToBH83WByAAi/wiwSFCArdFIUV/xxN4pcjA=
pgregory.net/rapid v1.2.0 h1:keKAYRcjm+e1F0oAuU5F5+YPAWcyxNNRK2wud503Gnk=
pgregory.net/rapid v1.2.0/go.mod h1:PY5XlDGj0+V1FCq0o192FdRhpKHGTRIWBgqjDBTrq04=