Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump the go_modules group with 6 updates #85

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github May 20, 2024

Bumps the go_modules group with 6 updates:

Package From To
github.com/containers/image/v5 5.29.2 5.30.1
github.com/docker/docker 24.0.7+incompatible 25.0.3+incompatible
github.com/sigstore/cosign/v2 2.2.3 2.2.4
helm.sh/helm/v3 3.14.2 3.14.3
golang.org/x/net 0.20.0 0.22.0
google.golang.org/protobuf 1.32.0 1.33.0

Updates github.com/containers/image/v5 from 5.29.2 to 5.30.1

Release notes

Sourced from github.com/containers/image/v5's releases.

v5.30.1

This fixes CVE-2024-3727 .

Digest values used throughout this library were not always validated. That allowed attackers to trigger, when pulling untrusted images, unexpected authenticated registry accesses on behalf of a victim user.

In less common uses of this library (using other transports or not using the containers/image/v5/copy.Image API), an attacker could also trigger local path traversals or crashes.

v5.30.0

What's Changed

A fair number of improvements when working with zstd and zstd:chunked-compressed images.

Note that make install now installs policy.json and registries.d/default.yaml.

New Contributors

Full Changelog: containers/image@v5.29.2...v5.30.0

Commits
  • 56e750a Release 5.30.1
  • 132678b Merge pull request #2404 from mtrmac/digest-unmarshal-5.30
  • b724ee7 Validate the tags returned by a registry
  • a9225e4 Call .Validate() before digest.Digest.String() if necessary
  • 4a3785d Refactor the error handling further
  • a802d65 Refactor the error handling path of saveStream
  • 39e7c91 Call .Validate() before digest.Hex() / digest.Encoded()
  • 2bcb834 Validate digests before using them
  • b29bde5 Bump to v5.30.0
  • 3cc0bb4 Merge pull request #2328 from containers/renovate/github.com-containers-stora...
  • Additional commits viewable in compare view

Updates github.com/docker/docker from 24.0.7+incompatible to 25.0.3+incompatible

Release notes

Sourced from github.com/docker/docker's releases.

v25.0.3

25.0.3

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Bug fixes and enhancements

  • containerd image store: Fix a bug where docker image history would fail if a manifest wasn't found in the content store. moby/moby#47348

  • Ensure that a generated MAC address is not restored when a container is restarted, but a configured MAC address is preserved. moby/moby#47304

    Note

    • Containers created with Docker Engine version 25.0.0 may have duplicate MAC addresses. They must be re-created.
    • Containers with user-defined MAC addresses created with Docker Engine versions 25.0.0 or 25.0.1 receive new MAC addresses when started using Docker Engine version 25.0.2. They must also be re-created.
  • Fix docker save <image>@<digest> producing an OCI archive with index without manifests. moby/moby#47294
  • Fix a bug preventing bridge networks from being created with an MTU higher than 1500 on RHEL and CentOS 7. moby/moby#47308, moby/moby#47311
  • Fix a bug where containers are unable to communicate over an internal network. moby/moby#47303
  • Fix a bug where the value of the ipv6 daemon option was ignored. moby/moby#47310
  • Fix a bug where trying to install a pulling using a digest revision would cause a panic. moby/moby#47323
  • Fix a potential race condition in the managed containerd supervisor. moby/moby#47313
  • Fix an issue with the journald log driver preventing container logs from being followed correctly with systemd version 255. moby/moby47243
  • seccomp: Update the builtin seccomp profile to include syscalls added in kernel v5.17 - v6.7 to align the profile with the profile used by containerd. moby/moby#47341
  • Windows: Fix cache not being used when building images based on Windows versions older than the host's version. moby/moby#47307, moby/moby#47337

Packaging updates

v25.0.2

25.0.2

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Security

This release contains security fixes for the following CVEs affecting Docker Engine and its components.

CVE Component Fix version Severity

... (truncated)

Commits
  • f417435 Merge pull request #47348 from rumpl/25.0_backport-history-config
  • acd023d c8d: Use the same logic to get the present images
  • 7a075ca Merge pull request #47344 from thaJeztah/25.0_backport_seccomp_updates
  • aff7177 Merge pull request #47337 from vvoland/cache-fix-older-windows-25
  • ed7c263 seccomp: add futex_wake syscall (kernel v6.7, libseccomp v2.5.5)
  • 74e3b4f seccomp: add futex_wait syscall (kernel v6.7, libseccomp v2.5.5)
  • 4cc0416 seccomp: add futex_requeue syscall (kernel v6.7, libseccomp v2.5.5)
  • f9f9e7f seccomp: add map_shadow_stack syscall (kernel v6.6, libseccomp v2.5.5)
  • 5fb4eb9 seccomp: add fchmodat2 syscall (kernel v6.6, libseccomp v2.5.5)
  • 67e9aa6 seccomp: add cachestat syscall (kernel v6.5, libseccomp v2.5.5)
  • Additional commits viewable in compare view

Updates github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4

Release notes

Sourced from github.com/sigstore/cosign/v2's releases.

v2.2.4

Bug Fixes

Features

  • Adds Support for Fulcio Client Credentials Flow, and Argument to Set Flow Explicitly (#3578)

Documentation

  • add oci bundle spec (#3622)
  • Correct help text of triangulate cmd (#3551)
  • Correct help text of verify-attestation policy argument (#3527)
  • feat: add OVHcloud MPR registry tested with cosign (#3639)

Testing

  • Refactor e2e-tests.yml workflow (#3627)
  • Clean up and clarify e2e scripts (#3628)
  • Don't ignore transparency log in tests if possible (#3528)
  • Make E2E tests hermetic (#3499)
  • add e2e test for pkcs11 token signing (#3495)

Full Changelog: sigstore/cosign@v2.2.3...v2.2.4

Changelog

Sourced from github.com/sigstore/cosign/v2's changelog.

v2.2.4

Bug Fixes

Features

  • Adds Support for Fulcio Client Credentials Flow, and Argument to Set Flow Explicitly (#3578)

Documentation

  • add oci bundle spec (#3622)
  • Correct help text of triangulate cmd (#3551)
  • Correct help text of verify-attestation policy argument (#3527)
  • feat: add OVHcloud MPR registry tested with cosign (#3639)

Testing

  • Refactor e2e-tests.yml workflow (#3627)
  • Clean up and clarify e2e scripts (#3628)
  • Don't ignore transparency log in tests if possible (#3528)
  • Make E2E tests hermetic (#3499)
  • add e2e test for pkcs11 token signing (#3495)
Commits

Updates helm.sh/helm/v3 from 3.14.2 to 3.14.3

Release notes

Sourced from helm.sh/helm/v3's releases.

Helm v3.14.3 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages

Installation and Upgrading

Download Helm v3.14.3. The common platform binaries are here:

This release was signed with 672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98E and can be found at @​mattfarina keybase account. Please use the attached signatures for verifying this release using gpg.

The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with bash.

What's Next

  • 3.14.4 will contain only bug fixes and be released on April 10, 2024.
  • 3.15.0 is the next feature release and will be on May 08, 2024.

Changelog

  • Add a note about --dry-run displaying secrets f03cc04caaa8f6d7c3e67cf918929150cf6f3f12 (Matt Farina)
  • add error messages 1a7330fe3802beeb3f897a1c701d8a4b9c1316c5 (George Jenkins)
  • Fix: Ignore alias validation error for index load d6acc0027dca47dec40ccdd66febd0c8bcf4813f (George Jenkins)
  • chore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.12 b2738fb782d149ffa4748cb0ee78d674986d04b0 (dependabot[bot])
  • chore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.2 5b0847e0e763e98bcbf8a12e8f9c5f7c11d123a1 (dependabot[bot])
  • Update architecture detection method 7e18c39f0753c73e4660f3796f01f5b33f2552b5 (weidongkl)
Commits
  • f03cc04 Add a note about --dry-run displaying secrets
  • 1a7330f add error messages
  • d6acc00 Fix: Ignore alias validation error for index load
  • b2738fb chore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.12
  • 5b0847e chore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.2
  • 7e18c39 Update architecture detection method
  • See full diff in compare view

Updates golang.org/x/net from 0.20.0 to 0.22.0

Commits
  • 7ee34a0 go.mod: update golang.org/x dependencies
  • c289c7a websocket: re-add documentation for DialConfig
  • 9fb4a8c http2: send an error of FLOW_CONTROL_ERROR when exceed the maximum octets
  • 3dfd003 websocket: add support for dialing with context
  • fa11427 quic: move package out of internal
  • 591be7f quic: fix UDP on big-endian Linux, tests on various architectures
  • 34cc446 quic: temporarily disable networking tests failing on various platforms
  • 4bdc6df quic: expand package docs, and document Stream
  • 22cbde9 quic: set ServerName in client connection TLSConfig
  • 57e4cc7 quic: handle PATH_CHALLENGE and PATH_RESPONSE frames
  • Additional commits viewable in compare view

Updates google.golang.org/protobuf from 1.32.0 to 1.33.0

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

updated-dependencies:
- dependency-name: github.com/containers/image/v5
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/docker/docker
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/sigstore/cosign/v2
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: helm.sh/helm/v3
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: google.golang.org/protobuf
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <[email protected]>
Copy link
Contributor Author

dependabot bot commented on behalf of github May 20, 2024

The following labels could not be found: go.

Copy link
Contributor Author

dependabot bot commented on behalf of github May 31, 2024

Superseded by #86.

@dependabot dependabot bot closed this May 31, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/go_modules-0bbef1db4e branch May 31, 2024 19:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants