-
Notifications
You must be signed in to change notification settings - Fork 8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ready release gin 1.9.1 #3620
ready release gin 1.9.1 #3620
Conversation
Codecov Report
@@ Coverage Diff @@
## master #3620 +/- ##
=======================================
Coverage 99.01% 99.01%
=======================================
Files 42 42
Lines 3157 3157
=======================================
Hits 3126 3126
Misses 21 21
Partials 10 10
Flags with carried forward coverage won't be shown. Click here to find out more. |
go.mod
Outdated
golang.org/x/arch v0.3.0 // indirect | ||
golang.org/x/crypto v0.8.0 // indirect | ||
golang.org/x/arch v0.0.0-20210923205945-b76863e36670 // indirect | ||
golang.org/x/crypto v0.7.0 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like these two got downgraded?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@herrberk thanks! fixed.
RE: CVE-2023-29401 | GO-2023-1737 | GHSA-2c4m-59x9-fr2g | Fix PR | Original Issue Hey @thinkerou, for starters: thanks so much for moving this forward! Your effort is noticed. Gin is one of the most, if not the most, popular http framework for Go. Many organizations use Gin as their framework of choice, including my workplace and myself for personal projects. I understand its hard, and in most cases not possible, to hold a community-ran project to strict SLAs; however the sentiment of the comments thread in #3556 is shared by many of us security-oriented folks who use Gin. It's been ~60 days since the issue was originally reported, with the reporter claiming to have tried to contact the maintainer numerous times via multiple different channels - and the fix is still not released. It would be awesome to have a better security story around fixing issues quickly with Gin... The timeline of this change was a bit too lengthy. Organizations out there in the best case have compliance goals to meet, and in the worst case have things running in the wild with tangible risk related to this CVE. Perhaps the Gin maintainers would consider widening the list of folks who can approve/merge and push releases, in particular for Once again, thank you and the rest of the Gin team <3 |
I second this, if a maintainer is away on vacation, etc. the project (especially the one that is used by 136k and has ~400 contributors) should be able to proceed without having to wait on them. Thoughts? @thinkerou @javierprovecho |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lets go!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixme pls
CHANGELOG.md
Outdated
### ENHANCEMENTS | ||
|
||
* refactor: use bytes.ReplaceAll directly [#3455](https://github.com/gin-gonic/gin/pull/3455) | ||
* Convert strings and slices using the officially recommended way [#3344](https://github.com/gin-gonic/gin/pull/3344) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Convert -> convert
start with lower case as context
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
thanks everyone! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please @appleboy, We need this fix!
We need this fix! |
❗ ❗ ❗ Who is authorized to merge this PR? We need this ASAP please @javierprovecho @manucorporat |
Hello, please, some administrator could please merge this PR, we need this |
hi, who can copy the pull request and commit it, I approve and merge. thanks! |
@adrianosela thanks a lot! let's go! |
v1.9.1 have released, please see https://github.com/gin-gonic/gin/releases/tag/v1.9.1, thanks! |
as title, @appleboy please review, thanks!