-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/net/html: non-linear parsing of case-insensitive content #70906
Comments
This comment was marked as off-topic.
This comment was marked as off-topic.
Change https://go.dev/cl/637536 mentions this issue: |
golang/go#70906 Signed-off-by: Guillaume Lours <705411+glours@users.noreply.github.com>
A high vulnerability(CVE-2024-45338)[1] is resolved in golang.org/x/net v0.33.0[2] Update to this verion. [1] https://nvd.nist.gov/vuln/detail/CVE-2024-45338 [2] golang/go#70906 Signed-off-by: Brian Carey <bcarey@redhat.com>
*Issue #, if available:* golang/go#70906 *Description of changes:* This change updates the version of the net/html package provided by the Golang project. By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice. Signed-off-by: Daniel Carl Jones <djonesoa@amazon.com>
Reference: - [CVE-2024-45338](GHSA-w32m-9786-jp63) - [x/net/html: non-linear parsing of case-insensitive content golang/go#70906](golang/go#70906)
The following reproducer prints the execution time of package main
import (
"golang.org/x/net/html"
"strings"
"bytes"
"fmt"
"time"
)
func generate(size int) []byte {
size1 := size / 2
size2 := size / 8
out := []byte("<math><Annotation-xml encoding=")
out = append(out, bytes.Repeat([]byte{0xFF}, size1)...)
out = append(out, bytes.Repeat([]byte("><</"), size2)...)
return out
}
func main() {
for kb := 1; kb <= 1024; kb *= 2 {
data := generate(1024 * kb)
start := time.Now()
html.Parse(strings.NewReader(string(data)))
duration := time.Since(start)
fmt.Printf("Parsing %d kb took %s\n", kb, duration)
}
} Output on AMD Ryzen 5 5600G, Linux x64 using go1.23.2 linux/amd64 (from https://go.dev/dl/go1.23.2.linux-amd64.tar.gz)
|
golang/go#70906 Signed-off-by: Guillaume Lours <705411+glours@users.noreply.github.com>
No evidence that these CVEs were actually exploitable in any way, I believe they're false positives. The CVEs are: - CVE-2024-51744 (github.com/golang-jwt/jwt/v4) - CVE-2024-45338 (x/net) - CVE-2024-45337 (x/crypto) Trivy output before this PR: ```json { "SchemaVersion": 2, "CreatedAt": "2025-01-09T12:23:03.224784Z", "ArtifactName": ".", "ArtifactType": "filesystem", "Metadata": { "ImageConfig": { "architecture": "", "created": "0001-01-01T00:00:00Z", "os": "", "rootfs": { "type": "", "diff_ids": null }, "config": {} } }, "Results": [ { "Target": "go.mod", "Class": "lang-pkgs", "Type": "gomod", "Vulnerabilities": [ { "VulnerabilityID": "CVE-2024-51744", "PkgID": "github.com/golang-jwt/jwt/v4@v4.5.0", "PkgName": "github.com/golang-jwt/jwt/v4", "PkgIdentifier": { "PURL": "pkg:golang/github.com/golang-jwt/jwt/v4@v4.5.0", "UID": "fcf0d6f346ee1743" }, "InstalledVersion": "v4.5.0", "FixedVersion": "4.5.1", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-51744", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt", "Description": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above.", "Severity": "LOW", "CweIDs": [ "CWE-755" ], "VendorSeverity": { "ghsa": 1, "redhat": 1 }, "CVSS": { "ghsa": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "V3Score": 3.1 }, "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "V3Score": 3.1 } }, "References": [ "https://access.redhat.com/security/cve/CVE-2024-51744", "https://github.com/golang-jwt/jwt", "golang-jwt/jwt@7b1c1c0", "GHSA-29wx-vh33-7x7r", "https://nvd.nist.gov/vuln/detail/CVE-2024-51744", "https://www.cve.org/CVERecord?id=CVE-2024-51744" ], "PublishedDate": "2024-11-04T22:15:03.997Z", "LastModifiedDate": "2024-11-05T16:04:26.053Z" }, { "VulnerabilityID": "CVE-2024-45337", "PkgID": "golang.org/x/crypto@v0.24.0", "PkgName": "golang.org/x/crypto", "PkgIdentifier": { "PURL": "pkg:golang/golang.org/x/crypto@v0.24.0", "UID": "1e2401ae941babb7" }, "InstalledVersion": "v0.24.0", "FixedVersion": "0.31.0", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-45337", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto", "Description": "Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.", "Severity": "CRITICAL", "VendorSeverity": { "azure": 4, "cbl-mariner": 4, "ghsa": 4, "redhat": 3 }, "CVSS": { "ghsa": { "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "V3Score": 9.1 }, "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "V3Score": 8.2 } }, "References": [ "http://www.openwall.com/lists/oss-security/2024/12/11/2", "https://access.redhat.com/security/cve/CVE-2024-45337", "https://github.com/golang/crypto", "golang/crypto@b4f1988", "https://go.dev/cl/635315", "https://go.dev/issue/70779", "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ", "https://nvd.nist.gov/vuln/detail/CVE-2024-45337", "https://pkg.go.dev/vuln/GO-2024-3321", "https://www.cve.org/CVERecord?id=CVE-2024-45337" ], "PublishedDate": "2024-12-12T02:02:07.97Z", "LastModifiedDate": "2024-12-12T21:15:08.5Z" }, { "VulnerabilityID": "CVE-2024-45338", "PkgID": "golang.org/x/net@v0.26.0", "PkgName": "golang.org/x/net", "PkgIdentifier": { "PURL": "pkg:golang/golang.org/x/net@v0.26.0", "UID": "eef2f1c0560c161f" }, "InstalledVersion": "v0.26.0", "FixedVersion": "0.33.0", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-45338", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html", "Description": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.", "Severity": "HIGH", "CweIDs": [ "CWE-1333" ], "VendorSeverity": { "ghsa": 3, "redhat": 3, "ubuntu": 2 }, "CVSS": { "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "V3Score": 7.5 } }, "References": [ "https://access.redhat.com/security/cve/CVE-2024-45338", "https://cs.opensource.google/go/x/net", "golang/go#70906", "https://go-review.googlesource.com/c/net/+/637536", "https://go.dev/cl/637536", "https://go.dev/issue/70906", "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ", "https://nvd.nist.gov/vuln/detail/CVE-2024-45338", "https://pkg.go.dev/vuln/GO-2024-3333", "https://www.cve.org/CVERecord?id=CVE-2024-45338" ], "PublishedDate": "2024-12-18T21:15:08.173Z", "LastModifiedDate": "2024-12-31T20:16:06.603Z" } ] }, { "Target": "make/_shared/oci-build/image_tool/go.mod", "Class": "lang-pkgs", "Type": "gomod" } ] } ``` Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
No evidence that these CVEs were actually exploitable in any way, I believe they're false positives. The CVEs are: - CVE-2024-51744 (github.com/golang-jwt/jwt/v4) - CVE-2024-45338 (x/net) - CVE-2024-45337 (x/crypto) Trivy output before this PR: ```json { "SchemaVersion": 2, "CreatedAt": "2025-01-09T12:23:03.224784Z", "ArtifactName": ".", "ArtifactType": "filesystem", "Metadata": { "ImageConfig": { "architecture": "", "created": "0001-01-01T00:00:00Z", "os": "", "rootfs": { "type": "", "diff_ids": null }, "config": {} } }, "Results": [ { "Target": "go.mod", "Class": "lang-pkgs", "Type": "gomod", "Vulnerabilities": [ { "VulnerabilityID": "CVE-2024-51744", "PkgID": "github.com/golang-jwt/jwt/v4@v4.5.0", "PkgName": "github.com/golang-jwt/jwt/v4", "PkgIdentifier": { "PURL": "pkg:golang/github.com/golang-jwt/jwt/v4@v4.5.0", "UID": "fcf0d6f346ee1743" }, "InstalledVersion": "v4.5.0", "FixedVersion": "4.5.1", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-51744", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt", "Description": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above.", "Severity": "LOW", "CweIDs": [ "CWE-755" ], "VendorSeverity": { "ghsa": 1, "redhat": 1 }, "CVSS": { "ghsa": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "V3Score": 3.1 }, "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "V3Score": 3.1 } }, "References": [ "https://access.redhat.com/security/cve/CVE-2024-51744", "https://github.com/golang-jwt/jwt", "golang-jwt/jwt@7b1c1c0", "GHSA-29wx-vh33-7x7r", "https://nvd.nist.gov/vuln/detail/CVE-2024-51744", "https://www.cve.org/CVERecord?id=CVE-2024-51744" ], "PublishedDate": "2024-11-04T22:15:03.997Z", "LastModifiedDate": "2024-11-05T16:04:26.053Z" }, { "VulnerabilityID": "CVE-2024-45337", "PkgID": "golang.org/x/crypto@v0.24.0", "PkgName": "golang.org/x/crypto", "PkgIdentifier": { "PURL": "pkg:golang/golang.org/x/crypto@v0.24.0", "UID": "1e2401ae941babb7" }, "InstalledVersion": "v0.24.0", "FixedVersion": "0.31.0", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-45337", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto", "Description": "Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.", "Severity": "CRITICAL", "VendorSeverity": { "azure": 4, "cbl-mariner": 4, "ghsa": 4, "redhat": 3 }, "CVSS": { "ghsa": { "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "V3Score": 9.1 }, "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "V3Score": 8.2 } }, "References": [ "http://www.openwall.com/lists/oss-security/2024/12/11/2", "https://access.redhat.com/security/cve/CVE-2024-45337", "https://github.com/golang/crypto", "golang/crypto@b4f1988", "https://go.dev/cl/635315", "https://go.dev/issue/70779", "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ", "https://nvd.nist.gov/vuln/detail/CVE-2024-45337", "https://pkg.go.dev/vuln/GO-2024-3321", "https://www.cve.org/CVERecord?id=CVE-2024-45337" ], "PublishedDate": "2024-12-12T02:02:07.97Z", "LastModifiedDate": "2024-12-12T21:15:08.5Z" }, { "VulnerabilityID": "CVE-2024-45338", "PkgID": "golang.org/x/net@v0.26.0", "PkgName": "golang.org/x/net", "PkgIdentifier": { "PURL": "pkg:golang/golang.org/x/net@v0.26.0", "UID": "eef2f1c0560c161f" }, "InstalledVersion": "v0.26.0", "FixedVersion": "0.33.0", "Status": "fixed", "Layer": {}, "SeveritySource": "ghsa", "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-45338", "DataSource": { "ID": "ghsa", "Name": "GitHub Security Advisory Go", "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago" }, "Title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html", "Description": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.", "Severity": "HIGH", "CweIDs": [ "CWE-1333" ], "VendorSeverity": { "ghsa": 3, "redhat": 3, "ubuntu": 2 }, "CVSS": { "redhat": { "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "V3Score": 7.5 } }, "References": [ "https://access.redhat.com/security/cve/CVE-2024-45338", "https://cs.opensource.google/go/x/net", "golang/go#70906", "https://go-review.googlesource.com/c/net/+/637536", "https://go.dev/cl/637536", "https://go.dev/issue/70906", "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ", "https://nvd.nist.gov/vuln/detail/CVE-2024-45338", "https://pkg.go.dev/vuln/GO-2024-3333", "https://www.cve.org/CVERecord?id=CVE-2024-45338" ], "PublishedDate": "2024-12-18T21:15:08.173Z", "LastModifiedDate": "2024-12-31T20:16:06.603Z" } ] }, { "Target": "make/_shared/oci-build/image_tool/go.mod", "Class": "lang-pkgs", "Type": "gomod" } ] } ``` Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…32.2 Bumping compose to version v2.26.1-287-gfa3950346, which comprises the following commits: fa3950346 image can be set to a local ID, that isn't a valid docker ref a35158502 can't render progress concurrently with buildkit b6db1380e exclude one-off container running convergence 2ebb47543 Only override service mac if set on the main network. d474515d4 remove engine v25 from e2e test matrix The 1st version available for Ubuntu 24.x is Docker Engine v26 2b21c5df9 fix relative path in compose file 1f3c10eb4 bump compose-go to v2.4.7 68ad165a5 replace tibdex/github-app-token by official GitHub create-github-app-token 3060ed279 bump golang.org/x/net to v0.33.0 to fix potential security issue golang/go#70906 be09b2e8c checkExpectedVolumes must ignore anonymous volumes 571a1af01 When retrying to resolveOrCreateNetwork, retry with a valid network name 8f644eea7 only check bind mount conflict if sync action is involved 56e92e34b use the 3 latest major versions of the engine to run e2e step a42a04dfe bump Golang version to v1.22.10 and update CI actions 34bcd03a7 add --pull to run command ed61e42f9 CI to validate fmt 65696bb1c `make fmt` so any contributor can enforce formatting 446e00520 format code with gofumpt c01c9c29f e2e test to prevent future regression 038c81f34 only check volume mounts for updated config a20b69ac5 e2e test for recreate volume 977530c22 build(deps): bump google.golang.org/grpc from 1.68.0 to 1.68.1 d4db8b6b1 build(deps): bump golang.org/x/crypto from 0.27.0 to 0.31.0 f8ce0f04e build(deps): bump golang.org/x/sys from 0.27.0 to 0.28.0 8e0520e71 prompt user to confirm volume recreation 332311358 Recreate container on volume configuration change df9e420dd introduce watch restart action 142f5dba8 bump otel dependencies to v1.28.0 and v0.53.0 to align with buildx, buildkit and engine versions 700c586bc bump docker/buildx to latest release fc566509d fix support for service.mac_address e73c2303f update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ 624303233 build(deps): bump golang.org/x/sync from 0.9.0 to 0.10.0 a1729c52d Update pkg/e2e/watch_test.go 254224c18 first watch action for a file event wins 0861e6845 fix af5b74850 revisit TestDebounceBatching 32a22c1f4 introduce sync+exec watch action e6ea8fb96 log configuration error as a watch log event 043465448 do not require a build section but for `rebuild` action 1d0839086 pull --quiet should not drop status message, only progress 69a83d130 use latest engine tags 781b9f1cd Bump buildx to 0.19.1 cbff0e555 be sure everything has been cleanup at the end of each tests e4222bff5 add local config.json to test configuration dir if exists 25197fe6d disable failing TestBuildSSH test 85cdaf9dd fix build with bake a8469db83 bump containerd to v1.7,24 08488dae5 bump google.golang.org/grpc to v1.68.0 cc3a216f2 build(deps): bump github.com/moby/buildkit from 0.17.1 to 0.17.2 6e818b9ae build(deps): bump github.com/compose-spec/compose-go/v2 6b3e57503 only stop dependent containers ... if there's some 8e497a128 disable TestNetworkConfigChanged which is unstable on CI 5aed70437 only check attached networks on running containers 1ff9b758d fix: commit tests 9eaba5597 feat: add commit command a85f8a40a run build tests against bake 095f65cb4 delegate build to buildx bake 208e57ded build(deps): bump github.com/stretchr/testify from 1.9.0 to 1.10.0 2d148faed use service.stop to stop dependent containers 43ac1e31c Update wait-timeout flag usage to include the unit 5561a778c go.mod: github.com/docker/cli v27.4.0-rc.2 ae48f488d go.mod: github.com/docker/docker v27.4.0-rc.2 5e3a09538 go.mod: github.com/docker/cli 8d1bacae3e49 (v27.4.0-rc.2-dev) a2a3eb72e go.mod: github.com/docker/cli v27.4.0-rc.1 3513b4242 go.mod: github.com/docker/docker v27.4.0-rc.1 d4fa63fdc Update pkg/compose/convergence.go c21d4cfb4 detect network config changes and recreate if needed 61f1d4f69 go.mod: github.com/docker/buildx v0.18.0 f7cce281d go.mod: github.com/moby/buildkit v0.17.1 bcaacc7f2 gha: test against docker engine v27.4.0 3f5898f8d push empty descriptor layer when using OCI version 1.1 for Compose artifact it fixes a repository creation issue when pushing the 1st time a Compose OCI artifact on the Hub 2bb67f270 remove ddev e2e tests bf521fe3a implement remove-orphans on run 11e9621da ci: enable testifylint linter a9de9abcf Emit events for building images 799ab842a Fix compose images that reutn a different image with the same ID 2f65ace2a remove obsolete containers first on scale down aa0a4189e pass stal bot inactivity limit from 6 to 3 months eba3ff8f3 fix(config): Print service names with --no-interpolate 6313365ba build(deps): bump golang.org/x/sys from 0.26.0 to 0.27.0 dbd51745c build(deps): bump golang.org/x/sync from 0.8.0 to 0.9.0 a8bfbc147 bump compose-go v2.4.4 fbbd6f83d Avoid starting all services on rebuild a00097898 remove ArtifactType from Config in OCI v1.1 definition of the artifact 361c0893a build(deps): bump github.com/compose-spec/compose-go/v2 513b6128c Service being declared in a profile must not trigger re-creation eececb9ad Add profile e2e test case to document in compose 501b5acde Update `MAINTAINERS` file f51bc4cd0 bump compose-go to version v2.4.2 517f87a37 bump google.golang.org/grpc to v1.67.1 718049cbd bump go.uber.org/mock to v0.5.0 02371f312 bump golang minimal version to 1.22 in go.mod a7c9de82b build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23 51ebeb544 introduce generate command as alpha command fafaa9c5b bump compose-go to version v2.4.1 fc9c3cde0 Add license header to dockerignore_test.go 73bfbab54 fix 2ac081b4c fix(dockerignore): Add wildcard support to dockerignore.go eeea049f1 push: Fix error message typo 26064d4b6 allow usage of -f flag with oci Compose artifact 7c46beb8a resurrect --all flag for cp to target oneoff container aa1ec4524 connect to external networks by name a4ee6ca7a don't warn about uid/gid not being supported while ... they are 5617eff0c bump compose-go to v2.4.0 fa24ab8e2 one-off container are not indexed, and must be ignored by exec --index command 0aad9595a don't use progress to render restart, which hides logs 813900180 compose-go clean volume target to avoid ambiguous comparisons 82417bd5b add support for bind.recursive 0cbb73c02 Improve error message to include expected network label 38e3d670a desktop: allow this client to be identified via user-agent 24c78728e bump compose-go to v2.3.0 9eeb2d315 convert gpus to DeviceRequests with implicit "gpu" capability 8da82c98e gha: set default permissions to "contents: read" 1a8c85548 Add security policy 15bd0b0c5 add support for raw env_file format 39d0f6477 build(deps): bump golang.org/x/sys from 0.25.0 to 0.26.0 3a95a0872 add support for CDI device request using `devices` f794c79eb Support Dockerfile-specific ignore-file with watch 407d82570 Remove feature flag integration with Docker Desktop for ComposeUI and ComposeNav 82b41b9eb introduce service hooks 6c06170eb pass device.options to engine 60c1311f6 chore: remove errors depricated pkg 17add87e4 fix: validate-go-mod bf0418bac fix: lint b9d0c77cd feat: add export command bdb854561 fix(convergence): Serialize access to observed state 41df35c1f Remove bind options when creating a volume type 3ef5045a0 Bump docker v27.3.1 d9df7aab6 fix(push): Fix unexpected EOF on alpha publish c9d96b449 use compose-go version fixing extra_hosts unicity issue 1744b4576 Show watch error message and open DD only when w is pressed 87f457e7d add tests to down.go abcc91e2b fix(down): Fix down command if specified services are not running 8b9fe8984 After container restart register printer consumer 34b18194f check secret source exists, as bind mount would create target as a folder otherwise ce27dba52 wait for dependent service up to delay set by --wait-timeout d2b945613 append unix-style relative path when computing container target path 9c60fe67d revert commits link to mount API over bind changes c16df17e1 don't set propagation if target engine isn't linux 20404db12 build(deps): bump github.com/docker/docker v27.3.0-rc.2 f2ff7fd75 build(deps): bump github.com/docker/cli v27.3.0-rc.2 cb00aaad2 set propagation default e885bc084 Remove custom codeql workflow 73d3a25eb fix import 3524bcfad chore(watch): Add debug log when skipping service without build context 1076f1d9a stop dependent containers before recreating diverged service 16652ed26 Fixed possible `nil` pointer dereference c6a76b9bd bump github.com/docker/buildx v0.17.1 3a0e3ba7e build(deps): bump docker, docker/cli to v27.3.0-rc.1 86ef8e62c gha: test against docker engine v27.3.0 8bf0627ea show sync files only in debug level 2e1419168 chore(watch): Add changed files path/count to log 155f64182 build(deps): bump golang.org/x/sync from 0.7.0 to 0.8.0 8db0cba0a bump compose-go to version v2.2.0 a7424435b Restore compose v1 behavior to recreate containers when ran with -V d445ebba3 fix linting issues with golangci-lint 1.60.2 f592aad10 bump golang to version 1.22.7 ef46445ed bump dependencies versions, engine and cli v27.2.1 containerd v1.7.22 buildx v0.17.0 buildkit v0.16.0 150593298 build(deps): bump golang.org/x/sys from 0.22.0 to 0.25.0 524a97e55 Fix typos 1d608e033 Use logrus instead of direct output to stderr. 329ad7392 attach: close streams when done b633c5c3e Fix typo in pull.go e6ef8629a Allow combination of bind mounts and 'rebuild' watches d658fecc6 service hash must exlude depends_on f9c7a0cc0 prefer mount API over bind 6e172d6b8 docs: duplicate documentation for root cmd 98e261ba3 docs(wait): Fix wait command description 11c7a25ae allow to add empty line in the logs when nav menu activated 234036756 upgrade docker versions 9c03797f9 initial sync files that modified after image creation 485c0eba5 initial sync for root directory 69384a9a0 Removes redundant condition from toAPIBuildOptions in build.go 1601ead7b docs: Update docker compose kill usage ea4ccf639 Fix stop on file chane for sync-restart action b1850ea4d bump engine and cli to v27.1.1, buildx to v0.16.1 adba639e8 remove all dependabot update PRs for OTel dependencies d8518529c gp.mod: github.com/gofrs/flock v0.12.1 c79f15da9 go.mod: golang.org/x/sys v0.22.0 3f55382ff update to go1.21.12 44337d2bb Enhance JSON progress events with more fields. bc733508d bump compose-go v2.1.5 c422b5447 bump github.com/docker/cli v27.1.0 e74441c90 bump github.com/docker/docker v27.1.0 2bac32a46 bump github.com/containerd/containerd v1.7.20 f278400fb gha: add docker 27.1.0 4f9db4d3e fix(containers): fix sorting logic by adding secondary sorting for one-off containers 06bf339a4 fix: typos 231ea1005 update docs generation to avoid man pages generation 46679150d bump compose-go to v2.1.4, buildx to v0.16.0, containerd to v1.7.19 and buildx to v0.15.0 d3d378b92 restore setEnvWithDotEnv 163cdfd31 empty env variable with no value must be unset in container 25f85938b exclude unnecessary resources after services have been selected cacbca859 change time for stale bot ecac13f27 Remove debug mode and run twice a week 14793cc2e Add stale workflow 11d5ecdc7 update docs 9549a213b feat(watch): Add --prune option to docker-compose watch command da434013e Remove COMPOSE_MENU env from e2e tests ace69c96a Use rawjson for the build backend. 2db04c1e4 Set logging format to JSON. 8f7cd0048 Format errors as JSON when in JSON progress mode. 5a6e1a7e2 Pass 'plain' instead of 'json' to build backend 06545d066 Add JSON stream progress writer 075fd9345 go.mod: docker/cli, docker/docker v27.0.3 d062ad739 gha: test against docker v27.0.3 7cd5209cc go.mod: docker/cli, docker/docker v27.0.2 f79c28168 Remove `console.Terminal` check and use `IsTerminal` from `streams.Out` Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
…32.2 Bumping compose to version v2.26.1-287-gfa3950346, which comprises the following commits: fa3950346 image can be set to a local ID, that isn't a valid docker ref a35158502 can't render progress concurrently with buildkit b6db1380e exclude one-off container running convergence 2ebb47543 Only override service mac if set on the main network. d474515d4 remove engine v25 from e2e test matrix The 1st version available for Ubuntu 24.x is Docker Engine v26 2b21c5df9 fix relative path in compose file 1f3c10eb4 bump compose-go to v2.4.7 68ad165a5 replace tibdex/github-app-token by official GitHub create-github-app-token 3060ed279 bump golang.org/x/net to v0.33.0 to fix potential security issue golang/go#70906 be09b2e8c checkExpectedVolumes must ignore anonymous volumes 571a1af01 When retrying to resolveOrCreateNetwork, retry with a valid network name 8f644eea7 only check bind mount conflict if sync action is involved 56e92e34b use the 3 latest major versions of the engine to run e2e step a42a04dfe bump Golang version to v1.22.10 and update CI actions 34bcd03a7 add --pull to run command ed61e42f9 CI to validate fmt 65696bb1c `make fmt` so any contributor can enforce formatting 446e00520 format code with gofumpt c01c9c29f e2e test to prevent future regression 038c81f34 only check volume mounts for updated config a20b69ac5 e2e test for recreate volume 977530c22 build(deps): bump google.golang.org/grpc from 1.68.0 to 1.68.1 d4db8b6b1 build(deps): bump golang.org/x/crypto from 0.27.0 to 0.31.0 f8ce0f04e build(deps): bump golang.org/x/sys from 0.27.0 to 0.28.0 8e0520e71 prompt user to confirm volume recreation 332311358 Recreate container on volume configuration change df9e420dd introduce watch restart action 142f5dba8 bump otel dependencies to v1.28.0 and v0.53.0 to align with buildx, buildkit and engine versions 700c586bc bump docker/buildx to latest release fc566509d fix support for service.mac_address e73c2303f update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ 624303233 build(deps): bump golang.org/x/sync from 0.9.0 to 0.10.0 a1729c52d Update pkg/e2e/watch_test.go 254224c18 first watch action for a file event wins 0861e6845 fix af5b74850 revisit TestDebounceBatching 32a22c1f4 introduce sync+exec watch action e6ea8fb96 log configuration error as a watch log event 043465448 do not require a build section but for `rebuild` action 1d0839086 pull --quiet should not drop status message, only progress 69a83d130 use latest engine tags 781b9f1cd Bump buildx to 0.19.1 cbff0e555 be sure everything has been cleanup at the end of each tests e4222bff5 add local config.json to test configuration dir if exists 25197fe6d disable failing TestBuildSSH test 85cdaf9dd fix build with bake a8469db83 bump containerd to v1.7,24 08488dae5 bump google.golang.org/grpc to v1.68.0 cc3a216f2 build(deps): bump github.com/moby/buildkit from 0.17.1 to 0.17.2 6e818b9ae build(deps): bump github.com/compose-spec/compose-go/v2 6b3e57503 only stop dependent containers ... if there's some 8e497a128 disable TestNetworkConfigChanged which is unstable on CI 5aed70437 only check attached networks on running containers 1ff9b758d fix: commit tests 9eaba5597 feat: add commit command a85f8a40a run build tests against bake 095f65cb4 delegate build to buildx bake 208e57ded build(deps): bump github.com/stretchr/testify from 1.9.0 to 1.10.0 2d148faed use service.stop to stop dependent containers 43ac1e31c Update wait-timeout flag usage to include the unit 5561a778c go.mod: github.com/docker/cli v27.4.0-rc.2 ae48f488d go.mod: github.com/docker/docker v27.4.0-rc.2 5e3a09538 go.mod: github.com/docker/cli 8d1bacae3e49 (v27.4.0-rc.2-dev) a2a3eb72e go.mod: github.com/docker/cli v27.4.0-rc.1 3513b4242 go.mod: github.com/docker/docker v27.4.0-rc.1 d4fa63fdc Update pkg/compose/convergence.go c21d4cfb4 detect network config changes and recreate if needed 61f1d4f69 go.mod: github.com/docker/buildx v0.18.0 f7cce281d go.mod: github.com/moby/buildkit v0.17.1 bcaacc7f2 gha: test against docker engine v27.4.0 3f5898f8d push empty descriptor layer when using OCI version 1.1 for Compose artifact it fixes a repository creation issue when pushing the 1st time a Compose OCI artifact on the Hub 2bb67f270 remove ddev e2e tests bf521fe3a implement remove-orphans on run 11e9621da ci: enable testifylint linter a9de9abcf Emit events for building images 799ab842a Fix compose images that reutn a different image with the same ID 2f65ace2a remove obsolete containers first on scale down aa0a4189e pass stal bot inactivity limit from 6 to 3 months eba3ff8f3 fix(config): Print service names with --no-interpolate 6313365ba build(deps): bump golang.org/x/sys from 0.26.0 to 0.27.0 dbd51745c build(deps): bump golang.org/x/sync from 0.8.0 to 0.9.0 a8bfbc147 bump compose-go v2.4.4 fbbd6f83d Avoid starting all services on rebuild a00097898 remove ArtifactType from Config in OCI v1.1 definition of the artifact 361c0893a build(deps): bump github.com/compose-spec/compose-go/v2 513b6128c Service being declared in a profile must not trigger re-creation eececb9ad Add profile e2e test case to document in compose 501b5acde Update `MAINTAINERS` file f51bc4cd0 bump compose-go to version v2.4.2 517f87a37 bump google.golang.org/grpc to v1.67.1 718049cbd bump go.uber.org/mock to v0.5.0 02371f312 bump golang minimal version to 1.22 in go.mod a7c9de82b build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23 51ebeb544 introduce generate command as alpha command fafaa9c5b bump compose-go to version v2.4.1 fc9c3cde0 Add license header to dockerignore_test.go 73bfbab54 fix 2ac081b4c fix(dockerignore): Add wildcard support to dockerignore.go eeea049f1 push: Fix error message typo 26064d4b6 allow usage of -f flag with oci Compose artifact 7c46beb8a resurrect --all flag for cp to target oneoff container aa1ec4524 connect to external networks by name a4ee6ca7a don't warn about uid/gid not being supported while ... they are 5617eff0c bump compose-go to v2.4.0 fa24ab8e2 one-off container are not indexed, and must be ignored by exec --index command 0aad9595a don't use progress to render restart, which hides logs 813900180 compose-go clean volume target to avoid ambiguous comparisons 82417bd5b add support for bind.recursive 0cbb73c02 Improve error message to include expected network label 38e3d670a desktop: allow this client to be identified via user-agent 24c78728e bump compose-go to v2.3.0 9eeb2d315 convert gpus to DeviceRequests with implicit "gpu" capability 8da82c98e gha: set default permissions to "contents: read" 1a8c85548 Add security policy 15bd0b0c5 add support for raw env_file format 39d0f6477 build(deps): bump golang.org/x/sys from 0.25.0 to 0.26.0 3a95a0872 add support for CDI device request using `devices` f794c79eb Support Dockerfile-specific ignore-file with watch 407d82570 Remove feature flag integration with Docker Desktop for ComposeUI and ComposeNav 82b41b9eb introduce service hooks 6c06170eb pass device.options to engine 60c1311f6 chore: remove errors depricated pkg 17add87e4 fix: validate-go-mod bf0418bac fix: lint b9d0c77cd feat: add export command bdb854561 fix(convergence): Serialize access to observed state 41df35c1f Remove bind options when creating a volume type 3ef5045a0 Bump docker v27.3.1 d9df7aab6 fix(push): Fix unexpected EOF on alpha publish c9d96b449 use compose-go version fixing extra_hosts unicity issue 1744b4576 Show watch error message and open DD only when w is pressed 87f457e7d add tests to down.go abcc91e2b fix(down): Fix down command if specified services are not running 8b9fe8984 After container restart register printer consumer 34b18194f check secret source exists, as bind mount would create target as a folder otherwise ce27dba52 wait for dependent service up to delay set by --wait-timeout d2b945613 append unix-style relative path when computing container target path 9c60fe67d revert commits link to mount API over bind changes c16df17e1 don't set propagation if target engine isn't linux 20404db12 build(deps): bump github.com/docker/docker v27.3.0-rc.2 f2ff7fd75 build(deps): bump github.com/docker/cli v27.3.0-rc.2 cb00aaad2 set propagation default e885bc084 Remove custom codeql workflow 73d3a25eb fix import 3524bcfad chore(watch): Add debug log when skipping service without build context 1076f1d9a stop dependent containers before recreating diverged service 16652ed26 Fixed possible `nil` pointer dereference c6a76b9bd bump github.com/docker/buildx v0.17.1 3a0e3ba7e build(deps): bump docker, docker/cli to v27.3.0-rc.1 86ef8e62c gha: test against docker engine v27.3.0 8bf0627ea show sync files only in debug level 2e1419168 chore(watch): Add changed files path/count to log 155f64182 build(deps): bump golang.org/x/sync from 0.7.0 to 0.8.0 8db0cba0a bump compose-go to version v2.2.0 a7424435b Restore compose v1 behavior to recreate containers when ran with -V d445ebba3 fix linting issues with golangci-lint 1.60.2 f592aad10 bump golang to version 1.22.7 ef46445ed bump dependencies versions, engine and cli v27.2.1 containerd v1.7.22 buildx v0.17.0 buildkit v0.16.0 150593298 build(deps): bump golang.org/x/sys from 0.22.0 to 0.25.0 524a97e55 Fix typos 1d608e033 Use logrus instead of direct output to stderr. 329ad7392 attach: close streams when done b633c5c3e Fix typo in pull.go e6ef8629a Allow combination of bind mounts and 'rebuild' watches d658fecc6 service hash must exlude depends_on f9c7a0cc0 prefer mount API over bind 6e172d6b8 docs: duplicate documentation for root cmd 98e261ba3 docs(wait): Fix wait command description 11c7a25ae allow to add empty line in the logs when nav menu activated 234036756 upgrade docker versions 9c03797f9 initial sync files that modified after image creation 485c0eba5 initial sync for root directory 69384a9a0 Removes redundant condition from toAPIBuildOptions in build.go 1601ead7b docs: Update docker compose kill usage ea4ccf639 Fix stop on file chane for sync-restart action b1850ea4d bump engine and cli to v27.1.1, buildx to v0.16.1 adba639e8 remove all dependabot update PRs for OTel dependencies d8518529c gp.mod: github.com/gofrs/flock v0.12.1 c79f15da9 go.mod: golang.org/x/sys v0.22.0 3f55382ff update to go1.21.12 44337d2bb Enhance JSON progress events with more fields. bc733508d bump compose-go v2.1.5 c422b5447 bump github.com/docker/cli v27.1.0 e74441c90 bump github.com/docker/docker v27.1.0 2bac32a46 bump github.com/containerd/containerd v1.7.20 f278400fb gha: add docker 27.1.0 4f9db4d3e fix(containers): fix sorting logic by adding secondary sorting for one-off containers 06bf339a4 fix: typos 231ea1005 update docs generation to avoid man pages generation 46679150d bump compose-go to v2.1.4, buildx to v0.16.0, containerd to v1.7.19 and buildx to v0.15.0 d3d378b92 restore setEnvWithDotEnv 163cdfd31 empty env variable with no value must be unset in container 25f85938b exclude unnecessary resources after services have been selected cacbca859 change time for stale bot ecac13f27 Remove debug mode and run twice a week 14793cc2e Add stale workflow 11d5ecdc7 update docs 9549a213b feat(watch): Add --prune option to docker-compose watch command da434013e Remove COMPOSE_MENU env from e2e tests ace69c96a Use rawjson for the build backend. 2db04c1e4 Set logging format to JSON. 8f7cd0048 Format errors as JSON when in JSON progress mode. 5a6e1a7e2 Pass 'plain' instead of 'json' to build backend 06545d066 Add JSON stream progress writer 075fd9345 go.mod: docker/cli, docker/docker v27.0.3 d062ad739 gha: test against docker v27.0.3 7cd5209cc go.mod: docker/cli, docker/docker v27.0.2 f79c28168 Remove `console.Terminal` check and use `IsTerminal` from `streams.Out` Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
…for merge: update to v2.32.2 Bumping compose to version v2.26.1-287-gfa3950346, which comprises the following commits: fa3950346 image can be set to a local ID, that isn't a valid docker ref a35158502 can't render progress concurrently with buildkit b6db1380e exclude one-off container running convergence 2ebb47543 Only override service mac if set on the main network. d474515d4 remove engine v25 from e2e test matrix The 1st version available for Ubuntu 24.x is Docker Engine v26 2b21c5df9 fix relative path in compose file 1f3c10eb4 bump compose-go to v2.4.7 68ad165a5 replace tibdex/github-app-token by official GitHub create-github-app-token 3060ed279 bump golang.org/x/net to v0.33.0 to fix potential security issue golang/go#70906 be09b2e8c checkExpectedVolumes must ignore anonymous volumes 571a1af01 When retrying to resolveOrCreateNetwork, retry with a valid network name 8f644eea7 only check bind mount conflict if sync action is involved 56e92e34b use the 3 latest major versions of the engine to run e2e step a42a04dfe bump Golang version to v1.22.10 and update CI actions 34bcd03a7 add --pull to run command ed61e42f9 CI to validate fmt 65696bb1c `make fmt` so any contributor can enforce formatting 446e00520 format code with gofumpt c01c9c29f e2e test to prevent future regression 038c81f34 only check volume mounts for updated config a20b69ac5 e2e test for recreate volume 977530c22 build(deps): bump google.golang.org/grpc from 1.68.0 to 1.68.1 d4db8b6b1 build(deps): bump golang.org/x/crypto from 0.27.0 to 0.31.0 f8ce0f04e build(deps): bump golang.org/x/sys from 0.27.0 to 0.28.0 8e0520e71 prompt user to confirm volume recreation 332311358 Recreate container on volume configuration change df9e420dd introduce watch restart action 142f5dba8 bump otel dependencies to v1.28.0 and v0.53.0 to align with buildx, buildkit and engine versions 700c586bc bump docker/buildx to latest release fc566509d fix support for service.mac_address e73c2303f update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ 624303233 build(deps): bump golang.org/x/sync from 0.9.0 to 0.10.0 a1729c52d Update pkg/e2e/watch_test.go 254224c18 first watch action for a file event wins 0861e6845 fix af5b74850 revisit TestDebounceBatching 32a22c1f4 introduce sync+exec watch action e6ea8fb96 log configuration error as a watch log event 043465448 do not require a build section but for `rebuild` action 1d0839086 pull --quiet should not drop status message, only progress 69a83d130 use latest engine tags 781b9f1cd Bump buildx to 0.19.1 cbff0e555 be sure everything has been cleanup at the end of each tests e4222bff5 add local config.json to test configuration dir if exists 25197fe6d disable failing TestBuildSSH test 85cdaf9dd fix build with bake a8469db83 bump containerd to v1.7,24 08488dae5 bump google.golang.org/grpc to v1.68.0 cc3a216f2 build(deps): bump github.com/moby/buildkit from 0.17.1 to 0.17.2 6e818b9ae build(deps): bump github.com/compose-spec/compose-go/v2 6b3e57503 only stop dependent containers ... if there's some 8e497a128 disable TestNetworkConfigChanged which is unstable on CI 5aed70437 only check attached networks on running containers 1ff9b758d fix: commit tests 9eaba5597 feat: add commit command a85f8a40a run build tests against bake 095f65cb4 delegate build to buildx bake 208e57ded build(deps): bump github.com/stretchr/testify from 1.9.0 to 1.10.0 2d148faed use service.stop to stop dependent containers 43ac1e31c Update wait-timeout flag usage to include the unit 5561a778c go.mod: github.com/docker/cli v27.4.0-rc.2 ae48f488d go.mod: github.com/docker/docker v27.4.0-rc.2 5e3a09538 go.mod: github.com/docker/cli 8d1bacae3e49 (v27.4.0-rc.2-dev) a2a3eb72e go.mod: github.com/docker/cli v27.4.0-rc.1 3513b4242 go.mod: github.com/docker/docker v27.4.0-rc.1 d4fa63fdc Update pkg/compose/convergence.go c21d4cfb4 detect network config changes and recreate if needed 61f1d4f69 go.mod: github.com/docker/buildx v0.18.0 f7cce281d go.mod: github.com/moby/buildkit v0.17.1 bcaacc7f2 gha: test against docker engine v27.4.0 3f5898f8d push empty descriptor layer when using OCI version 1.1 for Compose artifact it fixes a repository creation issue when pushing the 1st time a Compose OCI artifact on the Hub 2bb67f270 remove ddev e2e tests bf521fe3a implement remove-orphans on run 11e9621da ci: enable testifylint linter a9de9abcf Emit events for building images 799ab842a Fix compose images that reutn a different image with the same ID 2f65ace2a remove obsolete containers first on scale down aa0a4189e pass stal bot inactivity limit from 6 to 3 months eba3ff8f3 fix(config): Print service names with --no-interpolate 6313365ba build(deps): bump golang.org/x/sys from 0.26.0 to 0.27.0 dbd51745c build(deps): bump golang.org/x/sync from 0.8.0 to 0.9.0 a8bfbc147 bump compose-go v2.4.4 fbbd6f83d Avoid starting all services on rebuild a00097898 remove ArtifactType from Config in OCI v1.1 definition of the artifact 361c0893a build(deps): bump github.com/compose-spec/compose-go/v2 513b6128c Service being declared in a profile must not trigger re-creation eececb9ad Add profile e2e test case to document in compose 501b5acde Update `MAINTAINERS` file f51bc4cd0 bump compose-go to version v2.4.2 517f87a37 bump google.golang.org/grpc to v1.67.1 718049cbd bump go.uber.org/mock to v0.5.0 02371f312 bump golang minimal version to 1.22 in go.mod a7c9de82b build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23 51ebeb544 introduce generate command as alpha command fafaa9c5b bump compose-go to version v2.4.1 fc9c3cde0 Add license header to dockerignore_test.go 73bfbab54 fix 2ac081b4c fix(dockerignore): Add wildcard support to dockerignore.go eeea049f1 push: Fix error message typo 26064d4b6 allow usage of -f flag with oci Compose artifact 7c46beb8a resurrect --all flag for cp to target oneoff container aa1ec4524 connect to external networks by name a4ee6ca7a don't warn about uid/gid not being supported while ... they are 5617eff0c bump compose-go to v2.4.0 fa24ab8e2 one-off container are not indexed, and must be ignored by exec --index command 0aad9595a don't use progress to render restart, which hides logs 813900180 compose-go clean volume target to avoid ambiguous comparisons 82417bd5b add support for bind.recursive 0cbb73c02 Improve error message to include expected network label 38e3d670a desktop: allow this client to be identified via user-agent 24c78728e bump compose-go to v2.3.0 9eeb2d315 convert gpus to DeviceRequests with implicit "gpu" capability 8da82c98e gha: set default permissions to "contents: read" 1a8c85548 Add security policy 15bd0b0c5 add support for raw env_file format 39d0f6477 build(deps): bump golang.org/x/sys from 0.25.0 to 0.26.0 3a95a0872 add support for CDI device request using `devices` f794c79eb Support Dockerfile-specific ignore-file with watch 407d82570 Remove feature flag integration with Docker Desktop for ComposeUI and ComposeNav 82b41b9eb introduce service hooks 6c06170eb pass device.options to engine 60c1311f6 chore: remove errors depricated pkg 17add87e4 fix: validate-go-mod bf0418bac fix: lint b9d0c77cd feat: add export command bdb854561 fix(convergence): Serialize access to observed state 41df35c1f Remove bind options when creating a volume type 3ef5045a0 Bump docker v27.3.1 d9df7aab6 fix(push): Fix unexpected EOF on alpha publish c9d96b449 use compose-go version fixing extra_hosts unicity issue 1744b4576 Show watch error message and open DD only when w is pressed 87f457e7d add tests to down.go abcc91e2b fix(down): Fix down command if specified services are not running 8b9fe8984 After container restart register printer consumer 34b18194f check secret source exists, as bind mount would create target as a folder otherwise ce27dba52 wait for dependent service up to delay set by --wait-timeout d2b945613 append unix-style relative path when computing container target path 9c60fe67d revert commits link to mount API over bind changes c16df17e1 don't set propagation if target engine isn't linux 20404db12 build(deps): bump github.com/docker/docker v27.3.0-rc.2 f2ff7fd75 build(deps): bump github.com/docker/cli v27.3.0-rc.2 cb00aaad2 set propagation default e885bc084 Remove custom codeql workflow 73d3a25eb fix import 3524bcfad chore(watch): Add debug log when skipping service without build context 1076f1d9a stop dependent containers before recreating diverged service 16652ed26 Fixed possible `nil` pointer dereference c6a76b9bd bump github.com/docker/buildx v0.17.1 3a0e3ba7e build(deps): bump docker, docker/cli to v27.3.0-rc.1 86ef8e62c gha: test against docker engine v27.3.0 8bf0627ea show sync files only in debug level 2e1419168 chore(watch): Add changed files path/count to log 155f64182 build(deps): bump golang.org/x/sync from 0.7.0 to 0.8.0 8db0cba0a bump compose-go to version v2.2.0 a7424435b Restore compose v1 behavior to recreate containers when ran with -V d445ebba3 fix linting issues with golangci-lint 1.60.2 f592aad10 bump golang to version 1.22.7 ef46445ed bump dependencies versions, engine and cli v27.2.1 containerd v1.7.22 buildx v0.17.0 buildkit v0.16.0 150593298 build(deps): bump golang.org/x/sys from 0.22.0 to 0.25.0 524a97e55 Fix typos 1d608e033 Use logrus instead of direct output to stderr. 329ad7392 attach: close streams when done b633c5c3e Fix typo in pull.go e6ef8629a Allow combination of bind mounts and 'rebuild' watches d658fecc6 service hash must exlude depends_on f9c7a0cc0 prefer mount API over bind 6e172d6b8 docs: duplicate documentation for root cmd 98e261ba3 docs(wait): Fix wait command description 11c7a25ae allow to add empty line in the logs when nav menu activated 234036756 upgrade docker versions 9c03797f9 initial sync files that modified after image creation 485c0eba5 initial sync for root directory 69384a9a0 Removes redundant condition from toAPIBuildOptions in build.go 1601ead7b docs: Update docker compose kill usage ea4ccf639 Fix stop on file chane for sync-restart action b1850ea4d bump engine and cli to v27.1.1, buildx to v0.16.1 adba639e8 remove all dependabot update PRs for OTel dependencies d8518529c gp.mod: github.com/gofrs/flock v0.12.1 c79f15da9 go.mod: golang.org/x/sys v0.22.0 3f55382ff update to go1.21.12 44337d2bb Enhance JSON progress events with more fields. bc733508d bump compose-go v2.1.5 c422b5447 bump github.com/docker/cli v27.1.0 e74441c90 bump github.com/docker/docker v27.1.0 2bac32a46 bump github.com/containerd/containerd v1.7.20 f278400fb gha: add docker 27.1.0 4f9db4d3e fix(containers): fix sorting logic by adding secondary sorting for one-off containers 06bf339a4 fix: typos 231ea1005 update docs generation to avoid man pages generation 46679150d bump compose-go to v2.1.4, buildx to v0.16.0, containerd to v1.7.19 and buildx to v0.15.0 d3d378b92 restore setEnvWithDotEnv 163cdfd31 empty env variable with no value must be unset in container 25f85938b exclude unnecessary resources after services have been selected cacbca859 change time for stale bot ecac13f27 Remove debug mode and run twice a week 14793cc2e Add stale workflow 11d5ecdc7 update docs 9549a213b feat(watch): Add --prune option to docker-compose watch command da434013e Remove COMPOSE_MENU env from e2e tests ace69c96a Use rawjson for the build backend. 2db04c1e4 Set logging format to JSON. 8f7cd0048 Format errors as JSON when in JSON progress mode. 5a6e1a7e2 Pass 'plain' instead of 'json' to build backend 06545d066 Add JSON stream progress writer 075fd9345 go.mod: docker/cli, docker/docker v27.0.3 d062ad739 gha: test against docker v27.0.3 7cd5209cc go.mod: docker/cli, docker/docker v27.0.2 f79c28168 Remove `console.Terminal` check and use `IsTerminal` from `streams.Out` Signed-off-by: Bruce Ashfield <bruce.ashfieldgmail.com>
so when I look at the go/src/go.mod file = in the latest release of go, it still refers to the versions of net that is failing this CVE. Is there any plans to address this? |
The Go standard library does not use the golang.org/x/net/html package, so there isn't anything to address. golang.org/x/net is there for other packages (dns, http, http2, idna, lif, nettest, route). |
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing.
Thanks to Guido Vranken for reporting this issue.
This is CVE-2024-45338.
The text was updated successfully, but these errors were encountered: