Skip to content

Comments

chore(deps): bump the go_modules group across 2 directories with 4 updates#1730

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/go_modules-aeb5edb1b9
Open

chore(deps): bump the go_modules group across 2 directories with 4 updates#1730
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/go_modules-aeb5edb1b9

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Feb 19, 2026

Bumps the go_modules group with 1 update in the / directory: github.com/ethereum/go-ethereum.
Bumps the go_modules group with 1 update in the /script/releases/v1.9.0-slashing-ux/7-script directory: github.com/ethereum/go-ethereum.

Updates github.com/ethereum/go-ethereum from 1.14.0 to 1.17.0

Release notes

Sourced from github.com/ethereum/go-ethereum's releases.

Eezo-Inlaid Circuitry (v1.17.0)

This is a feature release, with all accumulated development from the last 3 months. See below for the highlights.

Note that this release contains multiple critical security fixes, as well as many bug fixes, and is recommended for all users. However, if you are cautious about upgrades, you can also install v1.16.9 which has just the critical security fixes. Specifically, this release fixes CVE-2026-26313, CVE-2026-26314, CVE-2026-26315.

We recommend recreating your p2p node key after installing this update, which you can do by removing the DATADIR/geth/nodekey file before restarting geth. Note this will cause a change in the p2p node ID, which may break static peering setups.

Highlights

Path-based Archive Node with Proofs

The path-based archive node can now serve proofs (via eth_getProof) for the state of older blocks.

You can configure the block range that supports proving independently from other archive state availability. Specifically, you can use the --history.trienode command-line flag to set the amount of blocks for which tree nodes will be tracked.

This feature is disabled by default. Note that state history cannot easily be recovered once deleted, as it can only be generated by processing blocks. However, you can enable trienode history (and/or state history) at any time to turn a full node into a partial archive node, keeping state from that point in time onwards.

#32727, #32621, #33551, #32981, #33399, #32913, #33303, #33584, #33329, #33681, #33103, #33098, #33515, #32247

EraE History Support

Geth now suports the EraE file format, an archival format for post-merge chain history.

#32157, #33827

OpenTelemetry Tracing

OpenTelemetry tracing is now supported by the RPC server, including support for distributed tracing. We have also added some tracing spans for block processing via the engine API, i.e. engine_newPayload.

#33599, #33452, #33780, #33521

All Changes

Geth CLI

  • The geth version-check subcommand has been removed. This command checked the geth website for signed vulnerability notices, and would tell if updates are necessary (#33498)
  • There is now a --miner.maxblobs command-line flag to set a limit on blobs included in built blocks (#33129, #33302)
  • Geth now supports continuous profiling with Grafana Pyroscope (#33623)
  • A rare bug that could halt block production in geth --dev mode was fixed (#33146)
  • A new --rpc.rangelimit flag configures the maximum block range for eth_getLogs (#33163)
  • geth --exitwhensynced will now set the finalized and safe block (#33038)
  • geth --ethstats now reports the newPayload processing time to the stats server (#33395)
  • A lot of minor issues in Geth's command-line flag processing have been fixed (#33379, #33338, #33330, #32999, #33279, #33252)
  • The evm blocktest command can now read filenames from stdin when no path is provided (#32824)

Fork Implementation

... (truncated)

Commits
  • 0cf3d3b version: release go-ethereum v1.17.0 stable
  • 9b78f45 crypto/secp256k1: fix coordinate check
  • c709c19 eth/catalyst: add initial OpenTelemetry tracing for newPayload (#33521)
  • 550ca91 consensus/misc: hardening header verification (#33860)
  • a4b3898 internal/telemetry: don't create internal spans without parents (#33780)
  • 0cba803 eth/protocols/eth, eth/protocols/snap: delayed p2p message decoding (#33835)
  • ad88b68 internal/download: show progress bar only if server gives length (#33842)
  • c50e5ed cmd/geth, internal/telemetry: wire OpenTelemetry tracing via CLI flags (#33484)
  • d8b92cb rpc,internal/telemetry: fix deferred spanEnd to capture errors via pointer (#...
  • ac85a6f rlp: add back Iterator.Count, with fixes (#33841)
  • Additional commits viewable in compare view

Updates github.com/consensys/gnark-crypto from 0.12.1 to 0.18.1

Release notes

Sourced from github.com/consensys/gnark-crypto's releases.

v0.18.1

Full Changelog: Consensys/gnark-crypto@v0.18.0...v0.18.1

v0.18.0

What's Changed

New Contributors

Full Changelog: Consensys/gnark-crypto@v0.17.0...v0.18.0

v0.17.0

What's Changed

New Contributors

... (truncated)

Changelog

Sourced from github.com/consensys/gnark-crypto's changelog.

[v0.18.1] - 2025-10-28

Docs

  • add CHANGELOG for 0.18.1

Perf

  • limit memory allocation during Vector deserialization (#759)

[v0.18.0] - 2025-06-09

Build

  • deps: bump golang.org/x/crypto from 0.33.0 to 0.35.0 (#677)

Chore

  • remove unused benchmark script (#675)

Docs

  • replace outdated link to article (#690)

Experiment

  • vortex on koalabear (#645)

Feat

  • remove dependency on internal package in ecc.go (#693)
  • make <31 bit field generated using uint32 (#676)

Fix

  • remove unimplemented path from fft ext
  • Eisenstein Half-GCD convergence (#680)

Perf

  • adds avx512 poseidon2 for small fields (#665)
  • remove useless copies in e4 mul by elem (#667)
  • disable cobra bit reverse for small fields (#662)

Refactor

  • hash to curve (#674)

[v0.17.0] - 2025-03-11

Chore

  • remove useless github workflow
  • generify poseidon2 parameters for other curves/fr (#636)
  • add auto close PR workflow (#638)

Feat

  • baby-bear and koala-bear extensions of degree 4 (#643)
  • poseidon2 for koala-bear, baby-bear and goldilocks (#629)
  • add sis avx512 and fft avx512 for koalabear (#622)

... (truncated)

Commits

Updates golang.org/x/crypto from 0.22.0 to 0.44.0

Commits
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • 017a1aa chacha20poly1305: panic on dst and additionalData overlap
  • cf29fa9 sha3: make it mostly a wrapper around crypto/sha3
  • 0b7aa0c ssh: use reflect.TypeFor instead of reflect.TypeOf
  • 1faea29 all: fix some typos in comment
  • 627cb89 go.mod: update golang.org/x dependencies
  • dca4914 acme: fix autocert TestHTTPHandlerDefaultFallback
  • 1336e21 x509roots/fallback: update bundle
  • Additional commits viewable in compare view

Updates github.com/ethereum/go-ethereum from 1.14.0 to 1.17.0

Release notes

Sourced from github.com/ethereum/go-ethereum's releases.

Eezo-Inlaid Circuitry (v1.17.0)

This is a feature release, with all accumulated development from the last 3 months. See below for the highlights.

Note that this release contains multiple critical security fixes, as well as many bug fixes, and is recommended for all users. However, if you are cautious about upgrades, you can also install v1.16.9 which has just the critical security fixes. Specifically, this release fixes CVE-2026-26313, CVE-2026-26314, CVE-2026-26315.

We recommend recreating your p2p node key after installing this update, which you can do by removing the DATADIR/geth/nodekey file before restarting geth. Note this will cause a change in the p2p node ID, which may break static peering setups.

Highlights

Path-based Archive Node with Proofs

The path-based archive node can now serve proofs (via eth_getProof) for the state of older blocks.

You can configure the block range that supports proving independently from other archive state availability. Specifically, you can use the --history.trienode command-line flag to set the amount of blocks for which tree nodes will be tracked.

This feature is disabled by default. Note that state history cannot easily be recovered once deleted, as it can only be generated by processing blocks. However, you can enable trienode history (and/or state history) at any time to turn a full node into a partial archive node, keeping state from that point in time onwards.

#32727, #32621, #33551, #32981, #33399, #32913, #33303, #33584, #33329, #33681, #33103, #33098, #33515, #32247

EraE History Support

Geth now suports the EraE file format, an archival format for post-merge chain history.

#32157, #33827

OpenTelemetry Tracing

OpenTelemetry tracing is now supported by the RPC server, including support for distributed tracing. We have also added some tracing spans for block processing via the engine API, i.e. engine_newPayload.

#33599, #33452, #33780, #33521

All Changes

Geth CLI

  • The geth version-check subcommand has been removed. This command checked the geth website for signed vulnerability notices, and would tell if updates are necessary (#33498)
  • There is now a --miner.maxblobs command-line flag to set a limit on blobs included in built blocks (#33129, #33302)
  • Geth now supports continuous profiling with Grafana Pyroscope (#33623)
  • A rare bug that could halt block production in geth --dev mode was fixed (#33146)
  • A new --rpc.rangelimit flag configures the maximum block range for eth_getLogs (#33163)
  • geth --exitwhensynced will now set the finalized and safe block (#33038)
  • geth --ethstats now reports the newPayload processing time to the stats server (#33395)
  • A lot of minor issues in Geth's command-line flag processing have been fixed (#33379, #33338, #33330, #32999, #33279, #33252)
  • The evm blocktest command can now read filenames from stdin when no path is provided (#32824)

Fork Implementation

... (truncated)

Commits
  • 0cf3d3b version: release go-ethereum v1.17.0 stable
  • 9b78f45 crypto/secp256k1: fix coordinate check
  • c709c19 eth/catalyst: add initial OpenTelemetry tracing for newPayload (#33521)
  • 550ca91 consensus/misc: hardening header verification (#33860)
  • a4b3898 internal/telemetry: don't create internal spans without parents (#33780)
  • 0cba803 eth/protocols/eth, eth/protocols/snap: delayed p2p message decoding (#33835)
  • ad88b68 internal/download: show progress bar only if server gives length (#33842)
  • c50e5ed cmd/geth, internal/telemetry: wire OpenTelemetry tracing via CLI flags (#33484)
  • d8b92cb rpc,internal/telemetry: fix deferred spanEnd to capture errors via pointer (#...
  • ac85a6f rlp: add back Iterator.Count, with fixes (#33841)
  • Additional commits viewable in compare view

Updates github.com/consensys/gnark-crypto from 0.12.1 to 0.18.1

Release notes

Sourced from github.com/consensys/gnark-crypto's releases.

v0.18.1

Full Changelog: Consensys/gnark-crypto@v0.18.0...v0.18.1

v0.18.0

What's Changed

New Contributors

Full Changelog: Consensys/gnark-crypto@v0.17.0...v0.18.0

v0.17.0

What's Changed

New Contributors

... (truncated)

Changelog

Sourced from github.com/consensys/gnark-crypto's changelog.

[v0.18.1] - 2025-10-28

Docs

  • add CHANGELOG for 0.18.1

Perf

  • limit memory allocation during Vector deserialization (#759)

[v0.18.0] - 2025-06-09

Build

  • deps: bump golang.org/x/crypto from 0.33.0 to 0.35.0 (#677)

Chore

  • remove unused benchmark script (#675)

Docs

  • replace outdated link to article (#690)

Experiment

  • vortex on koalabear (#645)

Feat

  • remove dependency on internal package in ecc.go (#693)
  • make <31 bit field generated using uint32 (#676)

Fix

  • remove unimplemented path from fft ext
  • Eisenstein Half-GCD convergence (#680)

Perf

  • adds avx512 poseidon2 for small fields (#665)
  • remove useless copies in e4 mul by elem (#667)
  • disable cobra bit reverse for small fields (#662)

Refactor

  • hash to curve (#674)

[v0.17.0] - 2025-03-11

Chore

  • remove useless github workflow
  • generify poseidon2 parameters for other curves/fr (#636)
  • add auto close PR workflow (#638)

Feat

  • baby-bear and koala-bear extensions of degree 4 (#643)
  • poseidon2 for koala-bear, baby-bear and goldilocks (#629)
  • add sis avx512 and fft avx512 for koalabear (#622)

... (truncated)

Commits

Updates golang.org/x/crypto from 0.22.0 to 0.44.0

Commits
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • 017a1aa chacha20poly1305: panic on dst and additionalData overlap
  • cf29fa9 sha3: make it mostly a wrapper around crypto/sha3
  • 0b7aa0c ssh: use reflect.TypeFor instead of reflect.TypeOf
  • 1faea29 all: fix some typos in comment
  • 627cb89 go.mod: update golang.org/x dependencies
  • dca4914 acme: fix autocert TestHTTPHandlerDefaultFallback
  • 1336e21 x509roots/fallback: update bundle
  • Additional commits viewable in compare view

Updates golang.org/x/net from 0.24.0 to 0.47.0

Commits
  • 9a29643 go.mod: update golang.org/x dependencies
  • 07cefd8 context: deprecate
  • 5ac9dac publicsuffix: don't treat ip addresses as domain names
  • d1f64cc quic: use testing/synctest
  • fff0469 http2: document that RFC 7540 prioritization does not work with small payloads
  • f35e3a4 http2: fix weight overflow in RFC 7540 write scheduler
  • 89adc90 http2: fix typo referring to RFC 9218 as RFC 9128 instead
  • 8d76a2c quic: don't defer MAX_STREAMS frames indefinitely
  • 027f8b7 quic: fix expected ACK Delay in client's ACK after HANDSHAKE_DONE
  • dec9fe7 dns/dnsmessage: update SVCB packing to prohibit name compression
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

…dates

Bumps the go_modules group with 1 update in the / directory: [github.com/ethereum/go-ethereum](https://github.com/ethereum/go-ethereum).
Bumps the go_modules group with 1 update in the /script/releases/v1.9.0-slashing-ux/7-script directory: [github.com/ethereum/go-ethereum](https://github.com/ethereum/go-ethereum).


Updates `github.com/ethereum/go-ethereum` from 1.14.0 to 1.17.0
- [Release notes](https://github.com/ethereum/go-ethereum/releases)
- [Commits](ethereum/go-ethereum@v1.14.0...v1.17.0)

Updates `github.com/consensys/gnark-crypto` from 0.12.1 to 0.18.1
- [Release notes](https://github.com/consensys/gnark-crypto/releases)
- [Changelog](https://github.com/Consensys/gnark-crypto/blob/master/CHANGELOG.md)
- [Commits](Consensys/gnark-crypto@v0.12.1...v0.18.1)

Updates `golang.org/x/crypto` from 0.22.0 to 0.44.0
- [Commits](golang/crypto@v0.22.0...v0.44.0)

Updates `github.com/ethereum/go-ethereum` from 1.14.0 to 1.17.0
- [Release notes](https://github.com/ethereum/go-ethereum/releases)
- [Commits](ethereum/go-ethereum@v1.14.0...v1.17.0)

Updates `github.com/consensys/gnark-crypto` from 0.12.1 to 0.18.1
- [Release notes](https://github.com/consensys/gnark-crypto/releases)
- [Changelog](https://github.com/Consensys/gnark-crypto/blob/master/CHANGELOG.md)
- [Commits](Consensys/gnark-crypto@v0.12.1...v0.18.1)

Updates `golang.org/x/crypto` from 0.22.0 to 0.44.0
- [Commits](golang/crypto@v0.22.0...v0.44.0)

Updates `golang.org/x/net` from 0.24.0 to 0.47.0
- [Commits](golang/net@v0.24.0...v0.47.0)

---
updated-dependencies:
- dependency-name: github.com/ethereum/go-ethereum
  dependency-version: 1.17.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/consensys/gnark-crypto
  dependency-version: 0.18.1
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.44.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/ethereum/go-ethereum
  dependency-version: 1.17.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/consensys/gnark-crypto
  dependency-version: 0.18.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.44.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-version: 0.47.0
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants