paketo-buildpacks / passenger

Apache License 2.0
0 stars 3 forks source link

Bump the go-modules group with 30 updates #495

Closed dependabot[bot] closed 8 months ago

dependabot[bot] commented 9 months ago

Bumps the go-modules group with 30 updates:

Package From To
github.com/onsi/gomega 1.30.0 1.31.1
github.com/paketo-buildpacks/occam 0.18.0 0.18.2
github.com/CycloneDX/cyclonedx-go 0.7.2 0.8.0
github.com/anchore/stereoscope 0.0.0-20230412183729-8602f1afc574 0.0.1
github.com/andybalholm/brotli 1.0.6 1.1.0
github.com/cloudflare/circl 1.3.6 1.3.7
github.com/containerd/containerd 1.7.10 1.7.11
github.com/docker/docker-credential-helpers 0.8.0 0.8.1
github.com/docker/go-connections 0.4.0 0.5.0
github.com/go-git/go-git/v5 5.10.1 5.11.0
github.com/google/go-containerregistry 0.17.0 0.19.0
github.com/google/uuid 1.4.0 1.6.0
github.com/klauspost/compress 1.17.4 1.17.6
github.com/opencontainers/runc 1.1.10 1.1.12
github.com/pierrec/lz4/v4 4.1.19 4.1.21
github.com/rivo/uniseg 0.4.4 0.4.7
github.com/sassoftware/go-rpmutils 0.2.0 0.3.0
github.com/shirou/gopsutil/v3 3.23.11 3.24.1
github.com/sylabs/sif/v2 2.15.0 2.15.1
github.com/testcontainers/testcontainers-go 0.26.0 0.28.0
github.com/wagoodman/go-progress 0.0.0-20230301185719-21920a456ad5 0.0.0-20230925121702-07e42b3cdba0
github.com/yusufpapurcu/wmi 1.2.3 1.2.4
golang.org/x/crypto 0.16.0 0.18.0
golang.org/x/mod 0.14.0 0.15.0
golang.org/x/net 0.19.0 0.21.0
golang.org/x/sync 0.5.0 0.6.0
golang.org/x/sys 0.15.0 0.17.0
golang.org/x/tools 0.16.0 0.16.1
google.golang.org/grpc 1.59.0 1.61.1
google.golang.org/protobuf 1.31.0 1.32.0

Updates github.com/onsi/gomega from 1.30.0 to 1.31.1

Release notes

Sourced from github.com/onsi/gomega's releases.

v1.31.1

1.31.1

Fixes

  • Inverted arguments order of FailureMessage of BeComparableToMatcher [e0dd999]
  • Update test in case keeping msg is desired [ad1a367]

Maintenance

  • Show how to import the format sub package [24e958d]
  • tidy up go.sum [26661b8]
  • bump dependencies [bde8f7a]

v1.31.0

1.31.0

Features

  • Async assertions include context cancellation cause if present [121c37f]

Maintenance

  • Bump minimum go version [dee1e3c]
  • docs: fix typo in example usage "occured" -> "occurred" [49005fe]
  • Bump actions/setup-go from 4 to 5 (#714) [f1c8757]
  • Bump github/codeql-action from 2 to 3 (#715) [9836e76]
  • Bump github.com/onsi/ginkgo/v2 from 2.13.0 to 2.13.2 (#713) [54726f0]
  • Bump golang.org/x/net from 0.17.0 to 0.19.0 (#711) [df97ecc]
  • docs: fix HaveExactElement typo (#712) [a672c86]
Changelog

Sourced from github.com/onsi/gomega's changelog.

1.31.1

Fixes

  • Inverted arguments order of FailureMessage of BeComparableToMatcher [e0dd999]
  • Update test in case keeping msg is desired [ad1a367]

Maintenance

  • Show how to import the format sub package [24e958d]
  • tidy up go.sum [26661b8]
  • bump dependencies [bde8f7a]

1.31.0

Features

  • Async assertions include context cancellation cause if present [121c37f]

Maintenance

  • Bump minimum go version [dee1e3c]
  • docs: fix typo in example usage "occured" -> "occurred" [49005fe]
  • Bump actions/setup-go from 4 to 5 (#714) [f1c8757]
  • Bump github/codeql-action from 2 to 3 (#715) [9836e76]
  • Bump github.com/onsi/ginkgo/v2 from 2.13.0 to 2.13.2 (#713) [54726f0]
  • Bump golang.org/x/net from 0.17.0 to 0.19.0 (#711) [df97ecc]
  • docs: fix HaveExactElement typo (#712) [a672c86]
Commits
  • 762b171 v1.31.1
  • 26661b8 tidy up go.sum
  • bde8f7a bump dependencies
  • 24e958d Show how to import the format sub package
  • ad1a367 Update test in case keeping msg is desired
  • e0dd999 Inverted arguments order of FailureMessage of BeComparableToMatcher
  • ba8bba2 v1.31.0
  • 121c37f Async assertions include context cancellation cause if present
  • dee1e3c Bump minimum go version
  • 49005fe docs: fix typo in example usage "occured" -> "occurred"
  • Additional commits viewable in compare view


Updates github.com/paketo-buildpacks/occam from 0.18.0 to 0.18.2

Release notes

Sourced from github.com/paketo-buildpacks/occam's releases.

v0.18.2

What's Changed

Full Changelog: https://github.com/paketo-buildpacks/occam/compare/v0.18.1...v0.18.2

v0.18.1

No release notes provided.

Commits
  • f37d228 Bump github.com/opencontainers/runc from 1.1.5 to 1.1.12
  • 1d68391 tests: adding tests for NewContainerFromInspectOutput function
  • 13e5704 fix: avoid accessing undefined host ports on while creating a new container f...
  • 0fb0353 Bump github.com/containerd/containerd from 1.7.7 to 1.7.11
  • See full diff in compare view


Updates github.com/CycloneDX/cyclonedx-go from 0.7.2 to 0.8.0

Release notes

Sourced from github.com/CycloneDX/cyclonedx-go's releases.

v0.8.0

This release ships with almost complete support for v1.5 of the CycloneDX specification.

The only exception being the extended data flow support, as used in SaaS BOMs.

Unfortunately, there are also breaking changes in this release:

  • The type of Metadata.Tools has changed from *[]Tool to *ToolsChoice, to facilitate the deprecation of Tool in the spec
    • ToolsChoice holds both legacy *[]Tool, as well as the new *[]Component and *[]Service fields
    • The Tool type, as well as the ToolsChoice.Tools field are marked as deprecated
    • During encoding and decoding, it is asserted that only one of both options can be present, in accordance with the "One of" constraint of the spec
    • When encoding to lower spec versions than v1.5 (using EncodeVersion), Components and Services are automatically converted to legacy Tools
    • It is strongly recommended to use Components and Services. However, when consuming BOMs, applications should still expect legacy Tools to be present, and handle them accordingly.

Changelog

Fixes

  • 64eb0c84b3d909db47c5154c17d075f68b0c85ae: fix: remove format linters that require extra tooling (@​nscuro)

Building and Packaging

  • 696aa66151e800a672c9ec860f30d8716ae6a025: build(deps): bump actions/checkout from 3.5.3 to 4.1.0 (@​dependabot[bot])
  • b50b319d1580d5b624cfc866bc108b589b328157: build(deps): bump actions/checkout from 4.1.0 to 4.1.1 (@​dependabot[bot])
  • 5cad1b0a7dad106950790fad960be5f7e62b2110: build(deps): bump actions/setup-go from 4.1.0 to 5.0.0 (@​dependabot[bot])
  • b0910619560e5b0b0fae51dc97c4a343983873fb: build(deps): bump gitpod/workspace-go from d3603c7 to 94ae638 (@​dependabot[bot])
  • 9e310b6d641245c89aa01f07a21b50c38f04b087: build(deps): bump gitpod/workspace-go from f37c673 to d3603c7 (@​dependabot[bot])
  • 89494fd98291ca8115e02cab78e2e47360352f00: build(deps): bump goreleaser/goreleaser-action from 4.4.0 to 5.0.0 (@​dependabot[bot])

Others

  • 61dd91e0bbe730454bef42bc0c1b0a3f97411c02: feat(spec1-5): add support for machine learning (@​nscuro)
  • f831960f0887c1f60681924e4d4382cd4bb52ff0: feat(spec1-5): update valid-vulnerability test snapshots (@​nscuro)
  • ffc9a4eb9204f5a31b7fb1d6cd907e6cc3e93578: ci: enable more linters (@​mmorel-35)
  • 3feda7530db8c959381261e44a96b201f79f908c: feat(spec1-5): add additional external reference types (@​nscuro)
  • bd66a368c5116c0420f49157a217e71cde1544be: feat(spec1-5): add support for CVSSv4 scoring method (@​nscuro)
  • d597bb9076e1856b9f2d3bb9d420728df8d43d9a: feat(spec1-5): add support for firstIssued and lastUpdated in vuln analysis (@​nscuro)
  • 2ae5445d02b8e6e7391a8a0eb4d1a5bb8a6f377c: feat(spec1-5): add support for additional compositions and composition identity (@​nscuro)
  • f856daa3212521eaf5f1dd69424b9c98eee2db52: feat(spec1-5): add support for formulation (@​nscuro)
  • 2fbde0e17ac5876ff525ccdc9d1eebf90918d306: feat(spec1-5): add support for identity, occurrences, and callstack evidence (@​nscuro)
  • 745a35a73d395923303817de650a60fe82cf8ec8: feat(spec1-5): add support for licensing (@​nscuro)
  • b02255f3784c608100b2ae3d1123e41500a50ff3: feat(spec1-5): add support for lifecycles (@​nscuro)
  • fe3a9040862e5fa088e84efb004fd9e338a783d7: feat(spec1-5): add support for ssvc scoring method (@​nscuro)
  • 7d2713f4459184df4628b839e4c01bae7fd6abcf: feat(spec1-5): add support for vulnerability proof of concept (@​nscuro)
  • 25b250ac0efea93283362584394a16ca602e260f: feat(spec1-5): add support for vulnerability rejected timestamps (@​nscuro)
  • c7a84ac4ba209f5860b1aedffa2f1e71414e4508: feat(spec1-5): handle deprecation of tools (@​nscuro)
Commits
  • b9654ae Merge pull request #90 from CycloneDX/spec-v1.5
  • 64eb0c8 fix: remove format linters that require extra tooling
  • c7a84ac feat(spec1-5): handle deprecation of tools
  • f856daa feat(spec1-5): add support for formulation
  • 2fbde0e feat(spec1-5): add support for identity, occurrences, and callstack evidence
  • 61dd91e feat(spec1-5): add support for machine learning
  • f831960 feat(spec1-5): update valid-vulnerability test snapshots
  • fe3a904 feat(spec1-5): add support for ssvc scoring method
  • 7d2713f feat(spec1-5): add support for vulnerability proof of concept
  • 2ae5445 feat(spec1-5): add support for additional compositions and composition identity
  • Additional commits viewable in compare view


Updates github.com/anchore/stereoscope from 0.0.0-20230412183729-8602f1afc574 to 0.0.1

Commits


Updates github.com/andybalholm/brotli from 1.0.6 to 1.1.0

Commits
  • 17e5901 Make my matchfinder work more accessible.
  • cf812c0 matchfinder: add M0
  • 1b6cf36 matchfinder: remove MultiHash
  • 265f3af matchfinder: penalize score for overlapping matches
  • a8d524a matchfinder: replace Score function with DistanceBitCost
  • 578645e matchfinder: add MultiHash
  • 24b2bfa matchfinder.M4: add Score function
  • 4a024e3 matchfinder.M4: add match chain
  • 3a1c5cd Fix typo in comment.
  • 0d2aef3 matchfinder.M4: factor out extendMatch2
  • Additional commits viewable in compare view


Updates github.com/cloudflare/circl from 1.3.6 to 1.3.7

Release notes

Sourced from github.com/cloudflare/circl's releases.

CIRCL v1.3.7

What's Changed

New Contributors

Full Changelog: https://github.com/cloudflare/circl/compare/v1.3.6...v1.3.7

Commits
  • c48866b Releasing CIRCL v1.3.7
  • 75ef91e kyber: remove division by q in ciphertext compression
  • 899732a build(deps): bump golang.org/x/crypto
  • See full diff in compare view


Updates github.com/containerd/containerd from 1.7.10 to 1.7.11

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.11

Welcome to the v1.7.11 release of containerd!

The eleventh patch release for containerd 1.7 contains various fixes and updates including one security issue.

Notable Updates

  • Fix Windows default path overwrite issue (#9440)
  • Update push to always inherit distribution sources from parent (#9452)
  • Update shim to use net dial for gRPC shim sockets (#9458)
  • Fix otel version incompatibility (#9483)
  • Fix Windows snapshotter blocking snapshot GC on remove failure (#9482)
  • Mask /sys/devices/virtual/powercap path in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)

Deprecation Warnings

  • Emit deprecation warning for AUFS snapshotter (#9436)
  • Emit deprecation warning for v1 runtime (#9450)
  • Emit deprecation warning for deprecated CRI configs (#9469)
  • Emit deprecation warning for CRI v1alpha1 usage (#9479)
  • Emit deprecation warning for CRIU config in CRI (#9481)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Samuel Karp
  • Derek McGowan
  • Phil Estes
  • Bjorn Neergaard
  • Danny Canter
  • Sebastiaan van Stijn
  • ruiwen-zhao
  • Akihiro Suda
  • Amit Barve
  • Charity Kathure
  • Maksym Pavlenko
  • Milas Bowman
  • Paweł Gronowski
  • Wei Fu

Changes

  • [release/1.7] Prepare release notes for v1.7.11 (#9491)

... (truncated)

Commits
  • 64b8a81 Merge pull request #9491 from dmcgowan/prepare-1.7.11
  • ea5a477 Merge pull request #9352 from thaJeztah/1.7_update_golang_1.20.11
  • 67d356c Merge pull request from GHSA-7ww5-4wqc-m92c
  • dfae68b Prepare release notes for v1.7.11
  • de6d8a8 Merge pull request #9482 from ambarve/sn_cleanup_1.7
  • ed7c689 Don't block snapshot garbage collection on Remove failures
  • 467de56 Merge pull request #9481 from ruiwen-zhao/cri-u
  • d94f8ff Merge pull request #9483 from dmcgowan/backport-1.7-fix-otel-http
  • 1fdefdd Add warning for CRIU config usage
  • 8e06899 Merge pull request #9479 from ruiwen-zhao/cri-api-warning
  • Additional commits viewable in compare view


Updates github.com/docker/docker-credential-helpers from 0.8.0 to 0.8.1

Release notes

Sourced from github.com/docker/docker-credential-helpers's releases.

v0.8.1

What's Changed

Full Changelog: https://github.com/docker/docker-credential-helpers/compare/v0.8.0...v0.8.1

Commits
  • 292722b Merge pull request #308 from thaJeztah/update_golang_1.21.6
  • 979dcc4 Merge pull request #309 from thaJeztah/update_golangci
  • f411a65 Dockerfile: update golangci-lint to v1.55.2
  • 9629bd7 update to go1.21.6
  • f642c26 Merge pull request #306 from thaJeztah/err_checks
  • 8fc3306 Merge pull request #307 from thaJeztah/bump_wincred
  • 6a3e64c move trimming whitespace to error-check helpers
  • 218f178 vendor: github.com/danieljoos/wincred v1.2.1
  • See full diff in compare view


Updates github.com/docker/go-connections from 0.4.0 to 0.5.0

Commits
  • fa09c95 Merge pull request #108 from thaJeztah/carry_6
  • 7a67a58 Swap CloseRead and CloseWrite
  • 481d3d2 Merge pull request #107 from thaJeztah/drop_legacy_go
  • 9548f9f tlsconfig: remove deprecated io/ioutil
  • c564c21 drop support for go1.17 and older
  • 7cbebcf gha: update actions
  • 2cf423f tlsconfig: move allTLSVersions var
  • dca283b tlsconfig: drop support for go1.12 and older
  • 21876c5 tlsconfig: drop support for go1.6 and older
  • 4d174db tlsconfig: drop support for go1.4 and older
  • Additional commits viewable in compare view


Updates github.com/go-git/go-git/v5 from 5.10.1 to 5.11.0

Release notes

Sourced from github.com/go-git/go-git/v5's releases.

v5.11.0

What's Changed

New Contributors

Full Changelog: https://github.com/go-git/go-git/compare/v5.10.1...v5.11.0

Commits
  • 5d08d3b Merge pull request #958 from pjbgf/workval
  • 5bd1d8f build: Ensure checkout is the first operation
  • b2c1982 git: worktree, Align validation with upstream rules
  • cec7da6 Merge pull request #953 from pjbgf/alternates
  • 8b47ceb storage: filesystem, Add option to set a specific FS for alternates
  • 4f61489 Merge pull request #941 from djmoch/filestats-rename
  • ae552ce Merge pull request #939 from dhoizner/fix-pull-after-shallow
  • cc1895b Merge pull request #950 from aymanbagabas/validate-ref
  • de1d5a5 git: validate reference names
  • d87110b Merge pull request #948 from go-git/dependabot/go_modules/cli/go-git/github.c...
  • Additional commits viewable in compare view


Updates github.com/google/go-containerregistry from 0.17.0 to 0.19.0

Release notes

Sourced from github.com/google/go-containerregistry's releases.

v0.19.0

What's Changed

Full Changelog: https://github.com/google/go-containerregistry/compare/v0.18.0...v0.19.0

v0.18.0

What's Changed

New Contributors

Full Changelog: https://github.com/google/go-containerregistry/compare/v0.17.0...v0.18.0

Commits


Updates github.com/google/uuid from 1.4.0 to 1.6.0

Release notes

Sourced from github.com/google/uuid's releases.

v1.6.0

1.6.0 (2024-01-16)

Features

Bug Fixes

v1.5.0

1.5.0 (2023-12-12)

Features

  • Validate UUID without creating new UUID (#141) (9ee7366)
Changelog

Sourced from github.com/google/uuid's changelog.

1.6.0 (2024-01-16)

Features

Bug Fixes

1.5.0 (2023-12-12)

Features

  • Validate UUID without creating new UUID (#141) (9ee7366)
Commits


Updates github.com/klauspost/compress from 1.17.4 to 1.17.6

Release notes

Sourced from github.com/klauspost/compress's releases.

v1.17.6

What's Changed

Full Changelog: https://github.com/klauspost/compress/compare/v1.17.5...v1.17.6

v1.17.5

What's Changed

New Contributors

Full Changelog: https://github.com/klauspost/compress/compare/v1.17.4...v1.17.5

Commits
  • 255a132 s2: Fix DecodeConcurrent deadlock on errors (#925)
  • e8251aa build: Remove garble compiler (#924)
  • 32f34cf build(deps): bump the github-actions group with 1 update (#921)
  • aac36dc zstd: Fix incorrect repeat coding in best mode (#923)
  • 9b0f130 Update README.md
  • 6662a21 s2: Document and test how to peek the stream for skippable blocks (#918)
  • 3deb878 s2: Fix up AddSkippableBlock more (#919)
  • 6ac58c9 s2: Fix incorrect length encoded by writer.AddSkippableBlock (#917)
  • 515f153 s2: Fix callbacks for skippable blocks and disallow 0xfe (Padding) for custom...
  • 01b2a79 zstd: Limit default window to 8MB (#913)
  • Additional commits viewable in compare view


Updates github.com/opencontainers/runc from 1.1.10 to 1.1.12

Release notes

Sourced from github.com/opencontainers/runc's releases.

runc 1.1.12 -- "Now you're thinking with Portals™!"

This is the twelfth patch release in the 1.1.z release branch of runc. It fixes a high-severity container breakout vulnerability involving leaked file descriptors, and users are strongly encouraged to update as soon as possible.

  • Fix CVE-2024-21626, a container breakout attack that took advantage of a file descriptor that was leaked internally within runc (but never leaked to the container process).

    In addition to fixing the leak, several strict hardening measures were added to ensure that future internal leaks could not be used to break out in this manner again.

    Based on our research, while no other container runtime had a similar leak, none had any of the hardening steps we've introduced (and some runtimes would not check for any file descriptors that a calling process may have leaked to them, allowing for container breakouts due to basic user error).

Static Linking Notices

The runc binary distributed with this release are statically linked with the following GNU LGPL-2.1 licensed libraries, with runc acting as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions, but in order to comply with the LGPL-2.1 (§6(a)), we have attached the complete source code for those libraries which (when combined with the attached runc source code) may be used to exercise your rights under the LGPL-2.1.

However we strongly suggest that you make use of your distribution's packages or download them from the authoritative upstream sources, especially since these libraries are related to the security of your containers.

Thanks to all of the contributors who made this release possible:

Signed-off-by: Aleksa Sarai cyphar@cyphar.com

... (truncated)

Changelog

Sourced from github.com/opencontainers/runc's changelog.

[1.1.12] - 2024-01-31

Now you're thinking with Portals™!

Security

  • Fix CVE-2024-21626, a container breakout attack that took advantage of a file descriptor that was leaked internally within runc (but never leaked to the container process). In addition to fixing the leak, several strict hardening measures were added to ensure that future internal leaks could not be used to break out in this manner again. Based on our research, while no other container runtime had a similar leak, none had any of the hardening steps we've introduced (and some runtimes would not check for any file descriptors that a calling process may have leaked to them, allowing for container breakouts due to basic user error).

[1.1.11] - 2024-01-01

Happy New Year!

Fixed

Changed

  • Support memory.peak and memory.swap.peak in cgroups v2. Add swapOnlyUsage in MemoryStats. This field reports swap-only usage. For cgroupv1, Usage and Failcnt are set by subtracting memory usage from memory+swap usage. For cgroupv2, Usage, Limit, and MaxUsage are set. (#4000, #4010, #4131)
  • build(deps): bump github.com/cyphar/filepath-securejoin. (#4140)
Commits
  • 51d5e94 VERSION: release 1.1.12
  • 2a4ed3e merge 1.1-ghsa-xr7r-f8xq-vfvv into release-1.1
  • e9665f4 init: don't special-case logrus fds
  • 683ad2f libcontainer: mark all non-stdio fds O_CLOEXEC before spawning init
  • b6633f4 cgroup: plug leaks of /sys/fs/cgroup handle
  • 284ba30 init: close internal fds before execve
  • fbe3eed setns init: do explicit lookup of execve argument early
  • 0994249 init: verify after chdir that cwd is inside the container
  • 506552a Fix File to Close
  • 099ff69 merge #4177 into opencontainers/runc:release-1.1
  • Additional commits viewable in compare view


Updates github.com/pierrec/lz4/v4 from 4.1.19 to 4.1.21

Commits
  • 294e765 Merge pull request #216 from evanphx/b-fix-tests
  • 6e17a24 Reverts bc1239ba, no longer needed to conform to legacy
  • 9542ba5 CI: update go versions to more recent ones
  • d9eb671 cmd/lz4c: update go.mod and fix issue #214
  • 219b252 Merge pull request #213 from corneliusroemer/patch-1
  • 58c6073 Update README.md: add @​latest to cli install command
  • e974631 Merge pull request #211 from oakad/issue_210
  • 7613989 CompressingReader: support older Go versions
  • 4a80a2f CompressingReader: account for possible out buffer state
  • f2ece5b CompressingReader: make sure to clear out buffer
  • Additional commits viewable in compare view


Updates github.com/rivo/uniseg from 0.4.4 to 0.4.7

Commits
  • 03509a9 Fixed wrong width calculation for variation selectors combined with regular c...
  • 601bbb3 Clarified some performance statements.
  • f302f7f Clarifications and improvements in the package documentation.
  • 0b9a924 Improved performance by using switch statements instead of maps for state tra...
  • e258aa1 Switched from transition map to switch statement to improve performance.
  • b74d4dc Some performance improvements by fast-tracking property search on ASCII chara...
  • 97691fc Merge pull request #47 from junegunn/eastasian-ambiguous
  • 1f39ebc Add comment
  • 272e3f0 Allow configuring the width of East Asian ambiguous width characters
  • 3628fa1 Merge pull request #42 from meowgorithm/unicode-v15.0.0
  • Additional commits viewable in compare view


Updates github.com/sassoftware/go-rpmutils from 0.2.0 to 0.3.0

Release notes

Sourced from github.com/sassoftware/go-rpmutils's releases.

v0.3.0

Features

dependabot[bot] commented 8 months ago

Superseded by #497.