Skip to content

Bump the go_modules group across 1 directories with 10 updates#1

Closed
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/go_modules/go_modules-security-group-03bfd8e413
Closed

Bump the go_modules group across 1 directories with 10 updates#1
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/go_modules/go_modules-security-group-03bfd8e413

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot Bot commented on behalf of github Mar 1, 2024

Bumps the go_modules group with 5 updates in the / directory:

Package From To
github.com/gin-gonic/gin 1.7.7 1.9.1
github.com/libp2p/go-libp2p 0.5.2 0.27.8
github.com/btcsuite/btcd 0.20.1-beta 0.23.2
github.com/go-git/go-git/v5 5.3.0 5.11.0
github.com/nats-io/nats-server/v2 2.3.2 2.9.23

Updates github.com/gin-gonic/gin from 1.7.7 to 1.9.1

Release notes

Sourced from github.com/gin-gonic/gin's releases.

v1.9.1

Changelog

BUG FIXES

  • fix Request.Context() checks #3512

SECURITY

  • fix lack of escaping of filename in Content-Disposition #3556

ENHANCEMENTS

  • refactor: use bytes.ReplaceAll directly #3455
  • convert strings and slices using the officially recommended way #3344
  • improve render code coverage #3525

DOCS

  • docs: changed documentation link for trusted proxies #3575
  • chore: improve linting, testing, and GitHub Actions setup #3583

v1.9.0

Changelog

BREAK CHANGES

  • Stop useless panicking in context and render #2150

BUG FIXES

  • fix(router): tree bug where loop index is not decremented. #3460
  • fix(context): panic on NegotiateFormat - index out of range #3397
  • Add escape logic for header #3500 and #3503

SECURITY

  • Fix the GO-2022-0969 and GO-2022-0288 vulnerabilities #3333
  • fix(security): vulnerability GO-2023-1571 #3505

ENHANCEMENTS

  • feat: add sonic json support #3184
  • chore(file): Creates a directory named path #3316
  • fix: modify interface check way #3327
  • remove deprecated of package io/ioutil #3395
  • refactor: avoid calling strings.ToLower twice #3343
  • console logger HTTP status code bug fixed #3453
  • chore(yaml): upgrade dependency to v3 version #3456
  • chore(router): match method added to routergroup for multiple HTTP methods supporting #3464

... (truncated)

Changelog

Sourced from github.com/gin-gonic/gin's changelog.

Gin v1.9.1

BUG FIXES

  • fix Request.Context() checks #3512

SECURITY

  • fix lack of escaping of filename in Content-Disposition #3556

ENHANCEMENTS

  • refactor: use bytes.ReplaceAll directly #3455
  • convert strings and slices using the officially recommended way #3344
  • improve render code coverage #3525

DOCS

  • docs: changed documentation link for trusted proxies #3575
  • chore: improve linting, testing, and GitHub Actions setup #3583

Gin v1.9.0

BREAK CHANGES

  • Stop useless panicking in context and render #2150

BUG FIXES

  • fix(router): tree bug where loop index is not decremented. #3460
  • fix(context): panic on NegotiateFormat - index out of range #3397
  • Add escape logic for header #3500 and #3503

SECURITY

  • Fix the GO-2022-0969 and GO-2022-0288 vulnerabilities #3333
  • fix(security): vulnerability GO-2023-1571 #3505

ENHANCEMENTS

  • feat: add sonic json support #3184
  • chore(file): Creates a directory named path #3316
  • fix: modify interface check way #3327
  • remove deprecated of package io/ioutil #3395
  • refactor: avoid calling strings.ToLower twice #3343
  • console logger HTTP status code bug fixed #3453
  • chore(yaml): upgrade dependency to v3 version #3456
  • chore(router): match method added to routergroup for multiple HTTP methods supporting #3464
  • chore(http): add support for go1.20 http.rwUnwrapper to gin.responseWriter #3489

... (truncated)

Commits
  • 4ea0e64 Ready release gin 1.9.1 (by: thinkerou) (#3630)
  • bb1fc2e fix Request.Context() checks (#3512)
  • 2d4bbec fix lack of escaping of filename in Content-Disposition (#3556)
  • 9f5ecd4 chore(deps): bump actions/setup-go from 3 to 4 (#3543)
  • 20cd6bc chore(deps): bump github.com/go-playground/validator/v10 (#3610)
  • 6bdc725 Fix typos in ISSUE_TEMPLATE.md (#3616)
  • 1ab2689 chore(deps): bump golang.org/x/net from 0.9.0 to 0.10.0 (#3599)
  • 6a0556e improve render code coverage (#3525)
  • eac2daa chore: update dependencies for various packages and libraries (#3585)
  • 757a638 chore: improve linting, testing, and GitHub Actions setup (#3583)
  • Additional commits viewable in compare view

Updates github.com/libp2p/go-libp2p from 0.5.2 to 0.27.8

Release notes

Sourced from github.com/libp2p/go-libp2p's releases.

v0.27.8

This patch release contains backports of:

  • updating the qtls dependencies (qtls is quic-go's fork of crypto/tls). The new versions now contain a backport of the Go standard library fix included in the Go 1.20.7 / 1.19.12 release for quic-go's crypto/tls fork: golang/go@2350afd
  • core/crypto: restrict RSA keys to <= 8192 bits: libp2p/go-libp2p#2454. The analogous vulnerability in go-libp2p's crypto package.
  • swarm: don't open new streams over transient connections: libp2p/go-libp2p#2450. This fixes a regression introduced in v0.26.0.

Note that in order to be protected against the DoS attack making use of large RSA keys, it's necessary to update to this patch release AND to use the updated Go compiler (1.20.7 or 1.19.12, respectively).

Full Changelog: libp2p/go-libp2p@v0.27.7...v0.27.8

v0.27.7

What's Changed

  • fix: in the swarm move Connectedness emit after releasing conns #2373
  • identify: set stream deadlines for Identify and Identify Push streams #2382

Full Changelog: libp2p/go-libp2p@v0.27.6...v0.27.7

v0.27.6

What's Changed

  • Clean up stream scope in case of error

Full Changelog: libp2p/go-libp2p@v0.27.5...v0.27.6

v0.27.5

What's Changed

Full Changelog: libp2p/go-libp2p@v0.27.3...v0.27.5

v0.27.4

What's Changed

  • identify
    • Fixed an issue where we now avoid spuriously triggering pushes
    • Fixed an issue where signed peer records weren’t rejected if the signature didn’t match
  • swarm
    • Fixed duplicate tracking in dial worker loop

v0.27.3

This patch release contains a fix for a rare panic that occurs on Windows systems (backport of libp2p/go-libp2p#2276).

Full Changelog: libp2p/go-libp2p@v0.27.1...v0.27.3

v0.27.2

What's Changed

quic: fix race condition when generating random holepunch packet (libp2p/go-libp2p#2263) webtransport: initialize the certmanager when creating the transport (libp2p/go-libp2p#2268)

... (truncated)

Changelog

Sourced from github.com/libp2p/go-libp2p's changelog.

Table Of Contents

v0.28.0

🔦 Highlights

Smart Dialing

This release introduces smart dialing logic. Currently, libp2p dials all addresses of a remote peer in parallel, and aborts all outstanding dials as soon as the first one succeeds. Dialing many addresses in parallel creates a lot of churn on the client side, and unnecessary load on the network and on the server side, and is heavily discouraged by the networking community (see RFC 8305 for example).

When connecting to a peer we first determine the order to dial its addresses. This ranking logic considers a number of corner cases described in detail in the documentation of the swarm package (swarm.DefaultDialRanker). At a high level, this is what happens:

  • If a peer offers a WebTransport and a QUIC address (on the same IP:port), the QUIC address is preferred.
  • If a peer has a QUIC and a TCP address, the QUIC address is dialed first. Only if the connection attempt doesn't succeed within 250ms, a TCP connection is started.

Our measurements on the IPFS network show that for >90% of established libp2p connections, the first connection attempt succeeds, leading a dramatic decrease in the number of aborted connection attempts.

We also added new metrics to the swarm Grafana dashboard, showing:

  • The number of connection attempts it took to establish a connection
  • The delay introduced by the ranking logic

This feature should be safe to enable for nodes running in data centers and for most nodes in home networks. However, there are some (mostly home and corporate networks) that block all UDP traffic. If enabled, the current implementation of the smart dialing logic will lead to a regression, since it preferes QUIC addresses over TCP addresses. Nodes would still be able to connect, but connection establishment of the TCP connection would be delayed by 250ms.

In a future release (see #1605 for details), we will introduce a feature called blackhole detection. By observing the outcome of QUIC connection attempts, we can determine if UDP traffic is blocked (namely, if all QUIC connection attempts fail), and stop dialing QUIC in this case altogether. Once this detection logic is in place, smart dialing will be enabled by default.

More Metrics!

Since the last release, we've added metrics for:

WebTransport

... (truncated)

Commits

Updates golang.org/x/crypto from 0.0.0-20220315160706-3147a52a75dd to 0.9.0

Commits

Updates golang.org/x/net from 0.0.0-20220225172249-27dd8689420f to 0.10.0

Commits

Updates golang.org/x/sys from 0.0.0-20220327210214-530d0810a4d0 to 0.8.0

Commits

Updates github.com/btcsuite/btcd from 0.20.1-beta to 0.23.2

Release notes

Sourced from github.com/btcsuite/btcd's releases.

btcd v0.23.2

What's Changed

New Contributors

Full Changelog: btcsuite/btcd@v0.23.1...v0.23.2

btcd v0.23.1-beta

What's Changed

... (truncated)

Commits
  • 6b5418d Merge pull request #1898 from Roasbeef/v0-23-2-branch
  • 1a4af39 build: bump version to v0.23.2
  • d0aa747 Merge pull request #1896 from Roasbeef/witness-wire-hot-fix
  • f523d4c wire: remove erroneous witness size check in wire parsing
  • 38ee9a4 build: bump golang base image version to 1.17
  • ef4a8d3 doc: fix Tor hidden service setup link
  • 0f49e10 Merge pull request #1866 from darioush/bump-btcutils-versions
  • da4b534 Merge pull request #1865 from sputn1ck/musig2_0.3.0
  • 06ce960 btcec/schnorr/musig2: add infinity testvectors
  • 44eb8c6 btcec/schnorr/musig2: Allow infinity nonces
  • Additional commits viewable in compare view

Updates github.com/go-git/go-git/v5 from 5.3.0 to 5.11.0

Release notes

Sourced from github.com/go-git/go-git/v5's releases.

v5.11.0

What's Changed

New Contributors

Full Changelog: go-git/go-git@v5.10.1...v5.11.0

v5.10.1

What's Changed

New Contributors

Full Changelog: go-git/go-git@v5.10.0...v5.10.1

v5.10.0

What's Changed

... (truncated)

Commits
  • 5d08d3b Merge pull request #958 from pjbgf/workval
  • 5bd1d8f build: Ensure checkout is the first operation
  • b2c1982 git: worktree, Align validation with upstream rules
  • cec7da6 Merge pull request #953 from pjbgf/alternates
  • 8b47ceb storage: filesystem, Add option to set a specific FS for alternates
  • 4f61489 Merge pull request #941 from djmoch/filestats-rename
  • ae552ce Merge pull request #939 from dhoizner/fix-pull-after-shallow
  • cc1895b Merge pull request #950 from aymanbagabas/validate-ref
  • de1d5a5 git: validate reference names
  • d87110b Merge pull request #948 from go-git/dependabot/go_modules/cli/go-git/github.c...
  • Additional commits viewable in compare view

Updates github.com/nats-io/nats-server/v2 from 2.3.2 to 2.9.23

Release notes

Sourced from github.com/nats-io/nats-server/v2's releases.

Release v2.9.23

Changelog

Go Version

  • 1.20.10

Fixed

Accounts

  • Prevent bypassing authorization block when enabling system account access in accounts block (#4605). Backport from v2.10.2

Leafnodes

  • Prevent a leafnode cluster from receiving a message multiple times in a queue subscription (#4578). Backport from v2.10.2

JetStream

  • Hold lock when calculating the first message for subject in a message block (#4531). Backport from v2.10.0
  • Add self-healing mechanism to detect and delete orphaned Raft groups (#4647). Backport from v2.10.0
  • Prevent forward proposals in consumers after scaling down a stream (#4647). Backport from v2.10.0
  • Fix race condition during leader failover scenarios resulting in potential duplicate messages being sourced (#4592). Backport from v2.10.2

Complete Changes

nats-io/nats-server@v2.9.22...v2.9.23

Release v2.9.22

Changelog

Go Version

  • 1.20.8 (updated out-of-cycle since Go 1.19 is now EOL)

Dependencies

  • github.com/nats-io/jwt/v2 v2.5.0
  • golang.org/x/crypto v0.12.0
  • golang.org/x/sys v0.11.0

Improved

Monitoring

  • CORS Allow-Origin passthrough for monitoring server (#4423) Thanks to @​mdawar for the contribution!

JetStream

  • Improve consumer scaling reliability with filters and cluster restart (#4404)
  • Send event on lame duck mode (LDM) to avoid placing assets on shutting down nodes (#4405)
  • Skip filestore tombstones if downgrade from 2.10 occurs (#4452)
  • Adjust delivered and waiting count when consumer message delivery fails (#4472)

Fixed

Config

  • Allow empty configs and fix JSON compatibility (#4394, #4418)
  • Remove TLS OCSP debug log on reload (#4453)

... (truncated)

Commits
  • 45436e1 Release v2.9.23 (#4652)
  • 72ffa38 Release v2.9.23
  • 05fe77f Backport #4592 to 2.9 (#4651)
  • 6a73e68 [2.9.x] Bump Travis Go version to 1.20.10 (#4650)
  • 8b981a2 Backports from v2.10 for v2.9.23 release (#4647)
  • 28eb7c0 Only setup auto no-auth for $G account iff no authorization block was defined.
  • 9f16edd Make sure to not forward a message across a route for dq sub when we are a sp...
  • 0ac7895 Add in utility to detect and delete any NRG orphans.
  • 50722e9 When scaling a consumer down make sure to pop the loopAndForwardProposals go ...
  • 770cf2e Backport JetStream benchmarks improvements to 2.9.x (#4644)
  • Additional commits viewable in compare view

Updates golang.org/x/text from 0.3.7 to 0.14.0

Commits
  • 6c97a16 all: update go directive to 1.18
  • f488e19 unicode/norm: fix function name on comment
  • fb697c0 cmd/gotext: actually use -dir flag
  • f3e69ed cmd/gotext: fix misbehaviors
  • ab07ad1 all: remove repetitive words
  • e503480 encoding/japanese, language: shorten very long sub-test names
  • 2df65d7 all: regenerate for Unicode 15.0.0
  • e3c038a all: prepare for Unicode 15.0.0
  • 3a7a255 internal/export/idna: make more space for mapping index
  • d61dd50 go.mod: delete repeated "indirect"
  • Additional commits viewable in compare view

Updates gopkg.in/yaml.v3 from 3.0.0-20210107192922-496545a6307b to 3.0.1

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 5 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/gin-gonic/gin](https://github.com/gin-gonic/gin) | `1.7.7` | `1.9.1` |
| [github.com/libp2p/go-libp2p](https://github.com/libp2p/go-libp2p) | `0.5.2` | `0.27.8` |
| [github.com/btcsuite/btcd](https://github.com/btcsuite/btcd) | `0.20.1-beta` | `0.23.2` |
| [github.com/go-git/go-git/v5](https://github.com/go-git/go-git) | `5.3.0` | `5.11.0` |
| [github.com/nats-io/nats-server/v2](https://github.com/nats-io/nats-server) | `2.3.2` | `2.9.23` |


Updates `github.com/gin-gonic/gin` from 1.7.7 to 1.9.1
- [Release notes](https://github.com/gin-gonic/gin/releases)
- [Changelog](https://github.com/gin-gonic/gin/blob/master/CHANGELOG.md)
- [Commits](gin-gonic/gin@v1.7.7...v1.9.1)

Updates `github.com/libp2p/go-libp2p` from 0.5.2 to 0.27.8
- [Release notes](https://github.com/libp2p/go-libp2p/releases)
- [Changelog](https://github.com/libp2p/go-libp2p/blob/master/CHANGELOG.md)
- [Commits](libp2p/go-libp2p@v0.5.2...v0.27.8)

Updates `golang.org/x/crypto` from 0.0.0-20220315160706-3147a52a75dd to 0.9.0
- [Commits](https://github.com/golang/crypto/commits/v0.9.0)

Updates `golang.org/x/net` from 0.0.0-20220225172249-27dd8689420f to 0.10.0
- [Commits](https://github.com/golang/net/commits/v0.10.0)

Updates `golang.org/x/sys` from 0.0.0-20220327210214-530d0810a4d0 to 0.8.0
- [Commits](https://github.com/golang/sys/commits/v0.8.0)

Updates `github.com/btcsuite/btcd` from 0.20.1-beta to 0.23.2
- [Release notes](https://github.com/btcsuite/btcd/releases)
- [Changelog](https://github.com/btcsuite/btcd/blob/master/CHANGES)
- [Commits](btcsuite/btcd@v0.20.1-beta...v0.23.2)

Updates `github.com/go-git/go-git/v5` from 5.3.0 to 5.11.0
- [Release notes](https://github.com/go-git/go-git/releases)
- [Commits](go-git/go-git@v5.3.0...v5.11.0)

Updates `github.com/nats-io/nats-server/v2` from 2.3.2 to 2.9.23
- [Release notes](https://github.com/nats-io/nats-server/releases)
- [Changelog](https://github.com/nats-io/nats-server/blob/main/.goreleaser.yml)
- [Commits](nats-io/nats-server@v2.3.2...v2.9.23)

Updates `golang.org/x/text` from 0.3.7 to 0.14.0
- [Release notes](https://github.com/golang/text/releases)
- [Commits](golang/text@v0.3.7...v0.14.0)

Updates `gopkg.in/yaml.v3` from 3.0.0-20210107192922-496545a6307b to 3.0.1

---
updated-dependencies:
- dependency-name: github.com/gin-gonic/gin
  dependency-type: direct:production
  dependency-group: go_modules-security-group
- dependency-name: github.com/libp2p/go-libp2p
  dependency-type: direct:production
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/net
  dependency-type: direct:production
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/sys
  dependency-type: direct:production
  dependency-group: go_modules-security-group
- dependency-name: github.com/btcsuite/btcd
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: github.com/go-git/go-git/v5
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: github.com/nats-io/nats-server/v2
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/text
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: gopkg.in/yaml.v3
  dependency-type: indirect
  dependency-group: go_modules-security-group
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added the dependencies Pull requests that update a dependency file label Mar 1, 2024
@dependabot @github
Copy link
Copy Markdown
Author

dependabot Bot commented on behalf of github Mar 13, 2024

Superseded by #2.

@dependabot dependabot Bot closed this Mar 13, 2024
@dependabot dependabot Bot deleted the dependabot/go_modules/go_modules-security-group-03bfd8e413 branch March 13, 2024 21:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants